# Guides

- [Quick Guides](https://wiki.lucysecurity.com/guides/quick-guides.md)
- [Create Your First Campaign](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign.md)
- [Adding a New Client](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/adding-a-new-client.md)
- [Register an Attack Domain](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/register-an-attack-domain.md)
- [Campaign Setup](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/campaign-setup.md)
- [Selecting an Attack](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/campaign-setup/selecting-an-attack.md)
- [Attack Settings](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/campaign-setup/attack-settings.md)
- [Awareness Settings](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/campaign-setup/awareness-settings.md)
- [Recipients](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/campaign-setup/recipients.md)
- [Review](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/campaign-setup/review.md)
- [Whitelisting](https://wiki.lucysecurity.com/guides/quick-guides/create-your-first-campaign/whitelisting.md)
- [Installing Lucy](https://wiki.lucysecurity.com/guides/installing-lucy.md)
- [On-Premise vs Cloud Installation](https://wiki.lucysecurity.com/guides/installing-lucy/on-premise-vs-cloud-installation.md)
- [Architecture](https://wiki.lucysecurity.com/guides/installing-lucy/architecture.md)
- [Hardware Requirements](https://wiki.lucysecurity.com/guides/installing-lucy/hardware-requirements.md)
- [Network Communication](https://wiki.lucysecurity.com/guides/installing-lucy/network-communication.md)
- [Installing Lucy](https://wiki.lucysecurity.com/guides/installing-lucy/installing-lucy.md)
- [Post Installation Setup](https://wiki.lucysecurity.com/guides/installing-lucy/post-installation-setup.md)
- [Manage Blacklisted Domains](https://wiki.lucysecurity.com/guides/manage-blacklisted-domains.md)
- [Managing Google SafeBrowsing Alerts](https://wiki.lucysecurity.com/guides/manage-blacklisted-domains/managing-google-safebrowsing-alerts.md)
- [Whitelisting a Lucy Server](https://wiki.lucysecurity.com/guides/whitelisting-a-lucy-server.md)
- [Google Workspace Whitelisting](https://wiki.lucysecurity.com/guides/whitelisting-a-lucy-server/google-workspace-whitelisting.md)
- [Microsoft O365 Whitelisting](https://wiki.lucysecurity.com/guides/whitelisting-a-lucy-server/microsoft-o365-whitelisting.md)
- [File Attack Whitelisting](https://wiki.lucysecurity.com/guides/whitelisting-a-lucy-server/file-attack-whitelisting.md)
- [Attack Simulations](https://wiki.lucysecurity.com/guides/attack-simulations.md)
- [Attack Types](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types.md)
- [Data Entry Attack](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/data-entry-attack.md)
- [Hyperlink Attack](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/hyperlink-attack.md)
- [File Attack](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/file-attack.md)
- [Portable Media](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/portable-media.md)
- [Smishing](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/smishing.md)
- [Lures](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/lures.md)
- [QR Codes](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/qr-codes.md)
- [Ransomware Emulation](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/ransomware-emulation.md)
- [Technical Malware Test](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/technical-malware-test.md)
- [Malware Toolkit Test Suite](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/technical-malware-test/malware-toolkit-test-suite.md): The Toolkit tests if the target system is vulnerable to miscellaneous malware technologies.
- [Mail & Web Filter Test](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/mail-and-web-filter-test.md)
- [Email Spoofing Test](https://wiki.lucysecurity.com/guides/attack-simulations/attack-types/email-spoofing-test.md)
- [Attack Template Customization](https://wiki.lucysecurity.com/guides/attack-simulations/attack-template-customization.md)
- [Firewall Protection Interval](https://wiki.lucysecurity.com/guides/attack-simulations/firewall-protection-interval.md)
- [Email Tracking Technologies](https://wiki.lucysecurity.com/guides/attack-simulations/email-tracking-technologies.md)
- [Advanced Information Gathering](https://wiki.lucysecurity.com/guides/attack-simulations/advanced-information-gathering.md)
- [Regular Expressions in Login Fields](https://wiki.lucysecurity.com/guides/attack-simulations/regular-expressions-in-login-fields.md)
- [Copy a Website](https://wiki.lucysecurity.com/guides/attack-simulations/copy-a-website.md)
- [Redirecting Users](https://wiki.lucysecurity.com/guides/attack-simulations/redirecting-users.md)
- [Awareness Training](https://wiki.lucysecurity.com/guides/awareness-training.md)
- [Awareness Template Customization](https://wiki.lucysecurity.com/guides/awareness-training/awareness-template-customization.md)
- [Awareness Only Campaigns](https://wiki.lucysecurity.com/guides/awareness-training/awareness-only-campaigns.md)
- [Using Awareness Groups](https://wiki.lucysecurity.com/guides/awareness-training/awareness-only-campaigns/using-awareness-groups.md)
- [Use extended method of tracking the end of the quiz](https://wiki.lucysecurity.com/guides/awareness-training/use-extended-method-of-tracking-the-end-of-the-quiz.md)
- [Reporting Plugin](https://wiki.lucysecurity.com/guides/reporting-plugin.md)
- [Deploying Office 365](https://wiki.lucysecurity.com/guides/reporting-plugin/deploying-office-365.md)
- [Deploying Outlook Native (Deprecated)](https://wiki.lucysecurity.com/guides/reporting-plugin/deploying-outlook-native-deprecated.md)
- [Deploying Gmail](https://wiki.lucysecurity.com/guides/reporting-plugin/deploying-gmail.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://wiki.lucysecurity.com/guides.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
