Utilization

This section covers the general operation and use of Sandfly.

Quick Start Overview
Getting Started Quickly Sandfly Dashboard Sandfly is easy to setup. Once you have installed the Server and Node, perform the following steps outli...
Tue, 4 Oct, 2022 at 4:09 PM
Interpreting Results
How to Interpret Any Alarms Sandfly is written very carefully to not have false alarms. Many of the threats Sandfly detects are so specific to a comprom...
Tue, 9 Aug, 2022 at 6:01 PM
Custom Sandfly Operation
Custom sandflies can be cloned to enhance the system sandflies or create entirely new methods of security analysis that may be unique to your operational en...
Wed, 22 Feb, 2023 at 1:55 PM
Sandfly API
The Sandfly server provides a REST API to further expand its functionality. The full list of calls for the Sandfly API are available at: https://api.s...
Thu, 26 Jan, 2023 at 4:34 PM
External Credential Provider Interface
Sandfly typically uses credentials stored in its own database to log in to target hosts with SSH. These credentials are encrypted using a public key, and on...
Fri, 27 Jan, 2023 at 2:09 PM