GBox Documentation V102
Last update 21/12/2023, version 1

MENU

  • 1. Description
    • 1.1. Introduction
    • 1.2. Overview of the TAP
    • 1.3. Overview of the GCap
    • 1.4. Overview of the GCenter
    • 1.5. Overview of the GBox
      • 1.5.1. Server templates
      • 1.5.2. List of the GBox inputs / outputs
        • 1.5.2.1. Use of USB and VGA connectors
        • 1.5.2.2. Access to the server's management and configuration interface
        • 1.5.2.3. Interface network `Gbx0`
        • 1.5.2.4. Interface network `Gbx1`
        • 1.5.2.5. Electrical connection
        • 1.5.2.6. USB connector and LUKS key
  • 2. Operation
    • 2.1. Analysis engines
      • 2.1.1. Overview of the Grip engine
        • 2.1.1.1. Viewing the Grip status
        • 2.1.1.2. Updating Grip
        • 2.1.1.3. Configuring the Grip
      • 2.1.2. Overview of the Goasm engine
        • 2.1.2.1. Viewing of the Goasm current state
        • 2.1.2.2. Update Goasm
        • 2.1.2.3. Configuring Goasm
      • 2.1.3. Overview of the Gmalcore engine
        • 2.1.3.1. Viewing the Gmalcore status
        • 2.1.3.2. Gmalcore update
        • 2.1.3.3. Configuring Gmalcore
      • 2.1.4. Overview of the Gnest engine
        • 2.1.4.1. Viewing the Gnest status
        • 2.1.4.2. Gnest update
        • 2.1.4.3. Configuring the Gnest
        • 2.1.4.4. Configuring Sandbox services
      • 2.1.5. Overview of the Gdgadetect engine
        • 2.1.5.1. Introduction to the DGA Algorithm
        • 2.1.5.2. Analyse
        • 2.1.5.3. Displaying DGA alerts
        • 2.1.5.4. Viewing the Gdgadetect status
        • 2.1.5.5. Gdgadetect update
        • 2.1.5.6. Configuring Gdgadetect
    • 2.2. Archive management
      • 2.2.1. Operation
      • 2.2.2. Supported formats
      • 2.2.3. Archive password definition
    • 2.3. Files that can be analysed by the GBox
      • 2.3.1. Supported file types
      • 2.3.2. Unsupported file types
      • 2.3.3. Size
      • 2.3.4. Rights
    • 2.4. Results and analysis reports
      • 2.4.1. List of analysis reports
      • 2.4.2. Report details
    • 2.5. GBox Software Management
      • 2.5.1. Overview of GUM: dedicated module for managing updates
      • 2.5.2. Upgrade
        • 2.5.2.1. For minor updates
        • 2.5.2.2. In the case of a major update,
        • 2.5.2.3. Upgrade path
      • 2.5.3. Updates to detection signatures and/or anti-virus engines
      • 2.5.4. Applying a hotfix patch
      • 2.5.5. Configuring the GUM
        • 2.5.5.1. Various methods of updates
          • 2.5.5.1.1. Online update
          • 2.5.5.1.2. Local update.
      • 2.5.6. Release note
    • 2.6. Data use
    • 2.7. API
      • 2.7.1. Presentation
      • 2.7.2. Use via the swagger graphical interface
      • 2.7.3. Use via CURL
      • 2.7.4. Authentication and access to the GBox API
    • 2.8. GApps management
  • 3. Characteristics
    • 3.1. Mechanical characteristics
    • 3.2. Electrical characteristics
    • 3.3. Functional characteristics
  • 4. Presentation of accounts
    • 4.1. List of accounts
    • 4.2. Presentation of the account setup from the configuration menu
      • 4.2.1. Account from the configuration menu
      • 4.2.2. Related principles
        • 4.2.2.1. Authentication mode
        • 4.2.2.2. Password management
      • 4.2.3. Functions allowed in the setup account
    • 4.3. Presentation of the web interface accounts and their management
      • 4.3.1. Web interface accounts, groups, and rights
      • 4.3.2. Authorised functions for members of the Operators group
      • 4.3.3. Authorised functions for members of the Administrators group
      • 4.3.4. Functions allowed in the admin account
      • 4.3.5. Summary tables of the rights per group
        • 4.3.5.1. Access to icons
        • 4.3.5.2. Access to the General Menu commands
        • 4.3.5.3. Access to the Admin Menu commands
      • 4.3.6. Related principles
        • 4.3.6.1. Authentication mode
        • 4.3.6.2. Password management
          • 4.3.6.2.1. Changing one's own password
          • 4.3.6.2.2. Administrator management of passwords for other accounts
        • 4.3.6.3. Password management policy
      • 4.3.7. Creating local users
      • 4.3.8. Audit trail principle
        • 4.3.8.1. Authentication history function
        • 4.3.8.2. Historical function of all creations or deletions
        • 4.3.8.3. History function for all changes in user rights
  • 5. Presentation of graphical interfaces
    • 5.1. Presentation of the configuration menu
    • 5.2. Operators level graphical interface via web browser
      • 5.2.1. Overview of the Web UI graphical interface at the Operators level
        • 5.2.1.1. Navigation bar
        • 5.2.1.2. Title bar
        • 5.2.1.3. Central screen
      • 5.2.2. `Home` screen of the Web UI
        • 5.2.2.1. `Quick analysis` zone
        • 5.2.2.2. `Analysis history` zone
      • 5.2.3. `New analysis` screen of the Web UI
        • 5.2.3.1. Report display area
          • 5.2.3.1.1. Reduced report
          • 5.2.3.1.2. Full report
      • 5.2.4. `Reports` screen of the Web UI
        • 5.2.4.1. Overview of the `Reports` screen
        • 5.2.4.2. Zone enabling searches
        • 5.2.4.3. Configuration zone
        • 5.2.4.4. Reports area
        • 5.2.4.5. Detailed report
          • 5.2.4.5.1. Information included in this report
          • 5.2.4.5.2. List of sections included in the `Analysis sections`
          • 5.2.4.5.3. Chart details
      • 5.2.5. Current account management, member of the Operators Group
        • 5.2.5.1. `Update profile` screen
        • 5.2.5.2. `Change Password` screen
        • 5.2.5.3. Logout command
    • 5.3. Administrators level graphical interface via web browser
      • 5.3.1. Overview of the Web UI graphical interface at the Administrators level
        • 5.3.1.1. Navigation bar
        • 5.3.1.2. Title bar
        • 5.3.1.3. Central screen
        • 5.3.1.4. Admin Menu
      • 5.3.2. Overview of the traditional Web graphical interface (legacy Web UI)
        • 5.3.2.1. Presentation of the interface
        • 5.3.2.2. Description of the traditional interface
          • 5.3.2.2.1. Traditional interface navigation bar
        • 5.3.2.3. Central screen of the traditional interface
      • 5.3.3. Access to the Gatewatcher API
      • 5.3.4. `Admin/Templates` screen of the Web UI
        • 5.3.4.1. Template Creation Zone
          • 5.3.4.1.1. The Creation of the default template section
          • 5.3.4.1.2. Creating a custom template
            • 5.3.4.1.2.1. Grip settings
            • 5.3.4.1.2.2. Gnest parameters
        • 5.3.4.2. Template Management Zone
      • 5.3.5. `Analysers` screen of the Web UI
        • 5.3.5.1. Grip engine
          • 5.3.5.1.1. Viewing the Grip status
        • 5.3.5.2. Goasm engine
        • 5.3.5.3. Gdgadetect engine
          • 5.3.5.3.1. Introduction to the DGA Algorithm
          • 5.3.5.3.2. Analyse
          • 5.3.5.3.3. Displaying DGA alerts
        • 5.3.5.4. Gnest engine
        • 5.3.5.5. `Gnest configuration` screen
        • 5.3.5.6. Gmalcore engine
        • 5.3.5.7. `Gmalcore configuration` screen
      • 5.3.6. `Admin- GUM - Config` screen of the legacy Web UI
      • 5.3.7. `Admin- GUM - Updates` screen of the legacy Web UI
      • 5.3.8. `Admin- GUM - Hotfix` screen of the legacy Web UI
      • 5.3.9. `Admin- GUM - Upgrade` screen of the legacy Web UI
      • 5.3.10. `Admin-GBox - Diagnostics` screen of the Web UI
      • 5.3.11. `Admin-GBox - Accounts` screen of the Web UI
        • 5.3.11.1. The `Authentications history` section of the `Accounts` submenu
        • 5.3.11.2. The `Creations/Deletions history` section of the `Accounts` submenu
        • 5.3.11.3. The `Permissions history` section of the `Accounts` submenu
        • 5.3.11.4. The `Users management` section of the `Accounts` submenu
        • 5.3.11.5. The `API tokens` section of the `Accounts` submenu
      • 5.3.12. `Admin-GBox- Users management` screen of the Web UI
        • 5.3.12.1. `Create user` window
        • 5.3.12.2. `Edit user` window
      • 5.3.13. `Admin-GBOX- Configuration` screen of the Web UI
        • 5.3.13.1. Dashboard selector for the `Configuration` screen
        • 5.3.13.2. `Configuration` screen display area
          • 5.3.13.2.1. `License configuration` screen
          • 5.3.13.2.2. `Proxy settings` screen
          • 5.3.13.2.3. SSL settings screen
            • 5.3.13.2.3.1. `In use certificate details` area
            • 5.3.13.2.3.2. `Custom Certificate` area
            • 5.3.13.2.3.3. `Alternative available certificate details` area
      • 5.3.14. Current account management, member of the Administrators Group
        • 5.3.14.1. `Update profile` screen
        • 5.3.14.2. `Change Password` screen
        • 5.3.14.3. Logout command
    • 5.4. API graphical interface
      • 5.4.1. Overview of the API GBOX interface
        • 5.4.1.1. Detail for an endpoint
          • 5.4.1.1.1. `Responses` field if the `Try it out` button is not enabled.
            • 5.4.1.1.1.1. Example of an output template
          • 5.4.1.1.2. Example with default values
          • 5.4.1.1.3. `Responses` field if the `Try it out` button is enabled.
      • 5.4.2. Endpoint list
  • 6. Use cases
    • 6.1. Introduction
      • 6.1.1. Use case: member of the Operators group
      • 6.1.2. Configuration case: setup account
      • 6.1.3. Administration case: member of the Administrators group
    • 6.2. How to connect to the GBox
      • 6.2.1. Direct connection to the server
      • 6.2.2. Remote HTTP connection via iDRAC (iDRAC on a DELL server)
      • 6.2.3. Remote connection to the configuration menu using SSH via the iDRAC interface in serial port forwarding mode
      • 6.2.4. Remote connection to the configuration menu using SSH
      • 6.2.5. Connection via a web browser
    • 6.3. How to connect to GCenter
    • 6.4. How to use the GBox: Operators level
      • 6.4.1. Accessing the GBox
      • 6.4.2. Analysing a file
      • 6.4.3. Managing the current account
    • 6.5. How to administer the GBox: setup or Administrators level
      • 6.5.1. Accessing the GBox
      • 6.5.2. Configuring the GBOX
      • 6.5.3. Managing Web UI accounts
      • 6.5.4. Managing the account setup from the configuration menu
      • 6.5.5. Managing network
      • 6.5.6. Managing the analysis engines
      • 6.5.7. Managing the GBox server
      • 6.5.8. Managing the analysis templates
      • 6.5.9. Monitoring the GBox
      • 6.5.10. Using the API
      • 6.5.11. Managing the software via GUM
  • 7. use case : setup account
    • 7.1. Direct connection to the configuration menu with a keyboard and monitor
      • 7.1.1. Introduction
      • 7.1.2. Preliminary operations
      • 7.1.3. Procedure for connecting the monitor and keyboard
      • 7.1.4. Procedure for finding out or changing the iDRAC network settings via the BIOS
    • 7.2. HTTP access to the configuration menu via iDRAC (DELL server)
      • 7.2.1. Introduction
      • 7.2.2. Preliminary operations
      • 7.2.3. Procedure
    • 7.3. SSH access to the configuration menu via the iDRAC interface in serial port redirection mode
      • 7.3.1. Introduction
      • 7.3.2. Preliminary operations
      • 7.3.3. Procedure on the remote PC running Linux
      • 7.3.4. Procedure on the remote PC running Windows
    • 7.4. SSH access to the configuration menu
      • 7.4.1. Introduction
      • 7.4.2. Preliminary operations
      • 7.4.3. Procedure on the remote PC running Linux
      • 7.4.4. Procedure on the remote PC running Windows
    • 7.5. `About` command
      • 7.5.1. Introduction
      • 7.5.2. Prerequisites
      • 7.5.3. Preliminary operations
      • 7.5.4. Procedure
    • 7.6. `Keymap` command
      • 7.6.1. Introduction
      • 7.6.2. Prerequisites
      • 7.6.3. Preliminary operations
      • 7.6.4. Procedure
    • 7.7. `Password` command
      • 7.7.1. Introduction
      • 7.7.2. Prerequisites
      • 7.7.3. Preliminary operations
      • 7.7.4. Procedure
    • 7.8. `Network` command
      • 7.8.1. Introduction
      • 7.8.2. Prerequisites
      • 7.8.3. Preliminary operations
      • 7.8.4. Procedure to access the `Network Setup` submenu
      • 7.8.5. Procedure for viewing the current configuration
      • 7.8.6. Procedure for viewing the network interface status
      • 7.8.7. Procedure for changing the GBox's general parameters
      • 7.8.8. Procedure for modifying the network interface parameters
      • 7.8.9. Procedure for taking modifications into account
    • 7.9. `Gapps` command
      • 7.9.1. Introduction
      • 7.9.2. Prerequisites
      • 7.9.3. Preliminary operations
      • 7.9.4. Procedure
    • 7.10. `Services` command
      • 7.10.1. Introduction
      • 7.10.2. Prerequisites
      • 7.10.3. Preliminary operations
      • 7.10.4. Procedure for accessing the `Services` menu
      • 7.10.5. Malcore engine service access procedure
      • 7.10.6. Procedure for accessing the Sandbox services of the Gnest engine
        • 7.10.6.1. Procedure for enabling the Internet connection
        • 7.10.6.2. Procedure for disabling the Internet connection
    • 7.11. `Reset` command
      • 7.11.1. Introduction
      • 7.11.2. Prerequisites
      • 7.11.3. Preliminary operations
      • 7.11.4. Procedure
    • 7.12. `Restart` command
      • 7.12.1. Introduction
      • 7.12.2. Prerequisites
      • 7.12.3. Preliminary operations
      • 7.12.4. Procedure
    • 7.13. `Shutdown` command
      • 7.13.1. Introduction
      • 7.13.2. Prerequisites
      • 7.13.3. Preliminary operations
      • 7.13.4. Procedure
    • 7.14. `Exit` command
      • 7.14.1. Introduction
      • 7.14.2. Prerequisites
      • 7.14.3. Preliminary operations
      • 7.14.4. Procedure
  • 8. Use case : operator group
    • 8.1. Connection to the web interface via a browser
      • 8.1.1. Introduction
      • 8.1.2. Prerequisites
      • 8.1.3. Preliminary operations
      • 8.1.4. Procedure
    • 8.2. Analyses with the GBox
      • 8.2.1. Quick procedure for analysing a file
        • 8.2.1.1. Introduction
          • 8.2.1.1.1. Supported file types
          • 8.2.1.1.2. Unsupported file types
          • 8.2.1.1.3. Compressed files
        • 8.2.1.2. Prerequisites
        • 8.2.1.3. Preliminary operations
        • 8.2.1.4. Procedure for analysing a file
        • 8.2.1.5. Procedure for analysing download information
        • 8.2.1.6. Procedure for analysing the report
      • 8.2.2. Quick procedure for analysing a domain
        • 8.2.2.1. Introduction
        • 8.2.2.2. Prerequisites
        • 8.2.2.3. Preliminary operations
        • 8.2.2.4. Procedure
      • 8.2.3. Procedure for analysing a file in the `New analysis` screen
        • 8.2.3.1. Introduction
          • 8.2.3.1.1. Supported file types
          • 8.2.3.1.2. Unsupported file types
          • 8.2.3.1.3. Compressed files
        • 8.2.3.2. Prerequisites
        • 8.2.3.3. Preliminary operations
        • 8.2.3.4. Procedure
        • 8.2.3.5. Error messages
      • 8.2.4. Procedure to analyse the list of reports on the `Reports` page
        • 8.2.4.1. Introduction
        • 8.2.4.2. Prerequisites
        • 8.2.4.3. Preliminary operations
        • 8.2.4.4. Procedure for filtering reports using the search field (1)
        • 8.2.4.5. Procedure for filtering reports using advanced search fields
        • 8.2.4.6. How to analyse the contents of a report
      • 8.2.5. Procedure to analyse the contents of a report
        • 8.2.5.1. Introduction
        • 8.2.5.2. Prerequisites
        • 8.2.5.3. Preliminary operations
        • 8.2.5.4. Report selection procedure
        • 8.2.5.5. Procedure for analysing reports with an `Error` status
        • 8.2.5.6. Procedure for analysing reports having a `Malicious` status
    • 8.3. Local user management
      • 8.3.1. Changing the current account password
        • 8.3.1.1. Introduction
        • 8.3.1.2. Prerequisites
        • 8.3.1.3. Preliminary operations
        • 8.3.1.4. Procedure
      • 8.3.2. Changing some of the current user's information
        • 8.3.2.1. Introduction
        • 8.3.2.2. Prerequisites
        • 8.3.2.3. Preliminary operations
        • 8.3.2.4. Procedure
    • 8.4. Logging out of the GBox web interface
      • 8.4.1. Introduction
      • 8.4.2. Prerequisites
      • 8.4.3. Preliminary operations
      • 8.4.4. Procedure
  • 9. Use case : administrator level
    • 9.1. Connection to the web interface via a browser
      • 9.1.1. Introduction
      • 9.1.2. Prerequisites
      • 9.1.3. Preliminary operations
      • 9.1.4. Procedure
    • 9.2. Management of detection engines
      • 9.2.1. Procedure to configure the Gnest engine
        • 9.2.1.1. Introduction
          • 9.2.1.1.1. Gnest engine functions
          • 9.2.1.1.2. Configuring the Gnest
          • 9.2.1.1.3. Description of procedures
        • 9.2.1.2. Prerequisites
        • 9.2.1.3. Preliminary operations
        • 9.2.1.4. Procédure for accessing the `Gnest configuration` screen
        • 9.2.1.5. Procedure for creating one or more virtual machines
        • 9.2.1.6. Procedure for displaying the history of virtual machines
        • 9.2.1.7. Procedure for deleting a virtual machine
        • 9.2.1.8. Procedure for deleting several virtual machines by batch
      • 9.2.2. Procédure to configure the Gmalcore engine
        • 9.2.2.1. Introduction
        • 9.2.2.2. Prerequisites
        • 9.2.2.3. Preliminary operations
        • 9.2.2.4. Procedure for checking whether Gmalcore engines have started
          • 9.2.2.4.1. Procedure for the `Ready` status
          • 9.2.2.4.2. Procedure for the `Not Ready` status
      • 9.2.3. Procedure to analyse the engines monitoring
        • 9.2.3.1. Introduction
        • 9.2.3.2. Prerequisites
        • 9.2.3.3. Preliminary operations
        • 9.2.3.4. How to access the `Analysers` screen
        • 9.2.3.5. Procedure for checking that engines are in good condition
        • 9.2.3.6. Procedure for updating Gnest and Gmalcore engines
    • 9.3. Template management
      • 9.3.1. Creating an analysis template
        • 9.3.1.1. Introduction
        • 9.3.1.2. Prerequisites
        • 9.3.1.3. Preliminary operations
        • 9.3.1.4. Procedure for accessing the `Admin/Templates` window for an administrator account
        • 9.3.1.5. Quick template creation procedure
        • 9.3.1.6. Procedure for creating a custom template (`Custom template` zone)
      • 9.3.2. Managing the analysis templates
        • 9.3.2.1. Introduction
        • 9.3.2.2. Prerequisites
        • 9.3.2.3. Preliminary operations
        • 9.3.2.4. Procedure for accessing the `Admin/Templates` window for an administrator account
        • 9.3.2.5. Procedure for changing the existing template
        • 9.3.2.6. Procedure for deleting a template
        • 9.3.2.7. Procedure for deleting a template defined by default
    • 9.4. GBox Software Management
      • 9.4.1. Configuring automatic updates via GUM
        • 9.4.1.1. Introduction
        • 9.4.1.2. Prerequisites
        • 9.4.1.3. Preliminary operations
        • 9.4.1.4. How to access the `Configuration` screen
        • 9.4.1.5. Procedure for configuring the online mode
        • 9.4.1.6. Procedure for configuring the local mode
      • 9.4.2. Manual installation of a signature update
        • 9.4.2.1. Introduction
        • 9.4.2.2. Prerequisites
        • 9.4.2.3. Preliminary operations
        • 9.4.2.4. Procedure for accessing the `Admin/GUM/Updates` screen window
        • 9.4.2.5. Procedure for updating signature files in manual mode
        • 9.4.2.6. Procedure for checking that Gmalcore engines are in good condition
      • 9.4.3. Installing a hotfix patch
        • 9.4.3.1. Introduction
        • 9.4.3.2. Prerequisites
        • 9.4.3.3. Preliminary operations
        • 9.4.3.4. Procedure for accessing the `Admin/GUM/Hotfix` screen window
        • 9.4.3.5. How to apply a patch
      • 9.4.4. Installing an upgrade
        • 9.4.4.1. Introduction
        • 9.4.4.2. Prerequisites
        • 9.4.4.3. Preliminary operations
        • 9.4.4.4. Procedure for accessing the `Admin/GUM/Updates` screen window
        • 9.4.4.5. Procedure for applying an upgrade
    • 9.5. GBox configuration
      • 9.5.1. Configuring the GBox for the first connection
        • 9.5.1.1. Introduction
        • 9.5.1.2. Prerequisites
        • 9.5.1.3. Preliminary operations
        • 9.5.1.4. Procedure for changing the GBox's general parameters
        • 9.5.1.5. Procedure for configuring GBx0 management network interface parameters
        • 9.5.1.6. Procedure for configuring the GBx1 network interface parameters of Gnest virtual machines to the Internet
        • 9.5.1.7. Licence entry procedure
        • 9.5.1.8. Procedure for configuring the SSL certificate
        • 9.5.1.9. Licence entry procedure
        • 9.5.1.10. Postliminary procedures
      • 9.5.2. Operating a GBox
        • 9.5.2.1. Introduction
        • 9.5.2.2. Prerequisites
        • 9.5.2.3. Preliminary operations
        • 9.5.2.4. User management procedure
        • 9.5.2.5. Manage the analysis engines
        • 9.5.2.6. Procedure for managing analysis templates
        • 9.5.2.7. Procedure for association with the GCenter
      • 9.5.3. Modifying the licence
        • 9.5.3.1. Introduction
        • 9.5.3.2. Prerequisites
        • 9.5.3.3. Preliminary operations
        • 9.5.3.4. How to access the `LICENCE` screen
        • 9.5.3.5. Licence update procedure
      • 9.5.4. Configuring a proxy
        • 9.5.4.1. Introduction
        • 9.5.4.2. Prerequisites
        • 9.5.4.3. Preliminary operations
        • 9.5.4.4. How to access the `PROXY` screen
        • 9.5.4.5. `PROXY` configuration procedure
      • 9.5.5. Installing an SSL certificate
        • 9.5.5.1. Introduction
        • 9.5.5.2. Prerequisites
        • 9.5.5.3. Preliminary operations
        • 9.5.5.4. How to access the `SSL` screen
        • 9.5.5.5. Custom certificate configuration procedure
    • 9.6. GBox administration
      • 9.6.1. Generating and loading files for diagnosis
        • 9.6.1.1. Introduction
        • 9.6.1.2. Prerequisites
        • 9.6.1.3. Preliminary operations
        • 9.6.1.4. How to access the `Diagnostics` screen
        • 9.6.1.5. Procedure for generating and loading diagnostic files
      • 9.6.2. Using an API endpoint
        • 9.6.2.1. Introduction
        • 9.6.2.2. Prerequisites
        • 9.6.2.3. Preliminary operations
        • 9.6.2.4. Procedure for accessing the GBox API
        • 9.6.2.5. Procedure to execute an endpoint
        • 9.6.2.6. Procedure for changing the token related to the request
    • 9.7. User account management
      • 9.7.1. Creating local users
        • 9.7.1.1. Introduction
        • 9.7.1.2. Prerequisites
        • 9.7.1.3. Preliminary operations
        • 9.7.1.4. How to access the `Users management` screen
        • 9.7.1.5. How to create a new user
      • 9.7.2. Changing the current account password
        • 9.7.2.1. Introduction
        • 9.7.2.2. Prerequisites
        • 9.7.2.3. Preliminary operations
        • 9.7.2.4. Procedure
      • 9.7.3. Changing some of a local user's information
        • 9.7.3.1. Introduction
        • 9.7.3.2. Prerequisites
        • 9.7.3.3. Preliminary operations
        • 9.7.3.4. How to access the `Users management` screen
        • 9.7.3.5. Procedure for changing certain user information
      • 9.7.4. Resetting a user's password
        • 9.7.4.1. Introduction
        • 9.7.4.2. Prerequisites
        • 9.7.4.3. Preliminary operations
        • 9.7.4.4. How to access the `Users management` screen
        • 9.7.4.5. Procedure for resetting a user's password
      • 9.7.5. Deleting a user
        • 9.7.5.1. Introduction
        • 9.7.5.2. Prerequisites
        • 9.7.5.3. Preliminary operations
        • 9.7.5.4. How to access the `Users management` screen
        • 9.7.5.5. How to delete a new user
      • 9.7.6. Viewing the authentication history
        • 9.7.6.1. Introduction
        • 9.7.6.2. Prerequisites
        • 9.7.6.3. Preliminary operations
        • 9.7.6.4. How to access the `Users management` screen
        • 9.7.6.5. Procedure
      • 9.7.7. Viewing the history of user creations or deletions
        • 9.7.7.1. Introduction
        • 9.7.7.2. Prerequisites
        • 9.7.7.3. Preliminary operations
        • 9.7.7.4. How to access the `Creations/Deletions history` screen
        • 9.7.7.5. Procedure
      • 9.7.8. Viewing the history function for all changes in user rights
        • 9.7.8.1. Introduction
        • 9.7.8.2. Prerequisites
        • 9.7.8.3. Preliminary operations
        • 9.7.8.4. How to access the `Creations/Deletions history` screen
        • 9.7.8.5. Procedure
      • 9.7.9. Creating or deleting an API access token
        • 9.7.9.1. Introduction
        • 9.7.9.2. Prerequisites
        • 9.7.9.3. Preliminary operations
        • 9.7.9.4. How to access the `Permissions history` screen
        • 9.7.9.5. How to create a new token
        • 9.7.9.6. Procedure for deleting a token
    • 9.8. Logging out of the GBox web interface
      • 9.8.1. Prerequisites
      • 9.8.2. Preliminary operations
      • 9.8.3. Procedure
  • 10. Glossary
  • Index
GBox Documentation V102
  • 3. Characteristics

3. Characteristics

  • 3.1. Mechanical characteristics
  • 3.2. Electrical characteristics
  • 3.3. Functional characteristics
Précédent Suivant

© Copyright 2023, Gatewatcher.