Lucy Awareness
Visit our WebsiteContact Support
  • Wiki Overview
  • Guides
    • Quick Guides
      • Create Your First Campaign
        • Adding a New Client
        • Register an Attack Domain
        • Campaign Setup
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Whitelisting
    • Installing Lucy
      • On-Premise vs Cloud Installation
      • Architecture
      • Hardware Requirements
      • Network Communication
      • Installing Lucy
      • Post Installation
    • Manage Blacklisted Domains
      • Managing Google SafeBrowsing Alerts
    • Whitelisting a Lucy Server
      • Google Workspace Whitelisting
      • Microsoft O365 Whitelisting
      • File Attack Whitelisting
    • Attack Simulations
      • Attack Types
        • Data Entry Attack
        • Hyperlink Attack
        • File Attack
        • Portable Media
        • Smishing
        • Lures
        • QR Codes
        • Ransomware Emulation
        • Technical Malware Test
          • Malware Toolkit Test Suite
        • Mail & Web Filter Test
        • Email Spoofing Test
      • Attack Template Customization
      • Firewall Protection Interval
      • Email Tracking Technologies
      • Advanced Information Gathering
      • Regular Expressions in Login Fields
      • Copy a Website
      • Redirecting Users
    • Awareness Training
      • Awareness Template Customization
      • Awareness Only Campaigns
        • Using Multiple Awareness Trainings
      • Use extended method of tracking the end of the quiz
    • Reporting Plugin
      • Deploying Office 365
      • Deploying Outlook Native
      • Deploying Gmail
  • Application Screens Reference
    • Statistics Dashboard
    • Campaigns Dashboards
    • Campaigns
      • New Campaign
        • Wizard Mode
          • Selecting an Attack
          • Attack Settings
          • Awareness Settings
          • Recipients
          • Review
        • Expert Mode
      • Campaign Settings
        • Configuration
          • Base Settings
          • Awareness Settings
          • Attack Settings
          • Schedule
            • Schedule Plan
          • Recipients
        • Advanced Settings
          • User Settings
          • Filters
          • Custom Fields
          • Reminders
        • Campaign Checks
        • Logs
        • Results
          • Summary
          • Statistics
          • Reports
          • Exports
    • Templates
      • Attack Templates
      • Awareness Templates
      • File Templates
      • Report Templates
      • Campaign Templates
      • Training Diploma
      • Download templates
      • Variables in Lucy
    • Users
      • Recipient Groups
      • End Users
      • End User Portal Settings
      • Administrative Users
      • Reputation Levels
    • Settings
      • Common System Settings
        • Domains
          • Supported TLDs
        • Firewall
        • Web Proxy
        • Mail Settings
        • SMTP Servers
        • SSL Settings
          • SSL for Campaigns
        • SMS Settings
        • Filter Settings
        • API Whitelist
          • API Routes
        • LDAP Servers
          • LDAP Sync Tool
        • LDAP Settings
        • Azure Applications
        • Azure AD Settings
        • SSO Configuration
      • Advanced System Settings
        • Advanced Settings
        • SSH Password
      • Submitted Email Settings
        • Custom Rules & Score Factors
        • Abuse Reports
        • Incident Autoresponder
        • Plugin Settings
      • Clients
        • Client Invoices
        • Client Invoice Settings
      • Backup and Restore
        • Backup Settings
      • Benchmark Sectors
      • Whitelabeling
      • File Browser
    • Incidents
    • Support
      • Status
        • Status
        • System Monitoring
        • System Health Check
        • Notifications
      • System Tests
        • Test Email
        • Performance Test
        • Spam Test
        • Mail Spoofing Test
        • Mail and Web Filter Test
      • System Logs
      • Manual
      • Update
      • Reboot
      • Mail Manager
      • Terms & Conditions
    • Account Settings
      • Two Factor Authentication
      • License
      • Invoices
    • Notifications
  • Release Notes
    • 5.4
    • 5.3.5
    • 5.3.4
    • 5.3.3
    • 5.3.2
    • 5.3.1
    • 5.3
    • 5.2.1
    • 5.2
    • 5.1
    • 5.0
    • Version 4
      • 4.14
      • 4.13
      • 4.12.1
      • 4.11
      • 4.10.1
      • 4.9.5
      • 4.9.2
      • 4.9.1
  • Legal
    • EULA
    • Privacy Policy
    • DPA, Customer and Partner Info
    • Service Level Agreement
    • Confidentiality of Campaign Data
  • When to Contact Us
    • Contact Technical Support
Powered by GitBook
On this page
  • Supported Operating System for Docker Installation
  • Supported Linux Distributions
  • Hardware Requirements

Was this helpful?

  1. Guides
  2. Installing Lucy

Hardware Requirements

PreviousArchitectureNextNetwork Communication

Last updated 21 days ago

Was this helpful?

Supported Operating System for Docker Installation

LUCY runs on Docker. Docker Engine is supported on Linux, Cloud, Windows, and OS X.

What is Docker?

is a platform that allows developers to automate the deployment of applications inside lightweight, portable, self-sufficient containers. These containers can run on any system that has Docker installed, ensuring that the software works consistently across different environments.

Key Features of Docker:

  • Portability: Docker containers can be run on any machine with Docker installed, making it easy to move Lucy between environments.

  • Isolation: Each Docker container runs in isolation, which means it doesn't interfere with other containers or the host system.

  • Efficiency: Containers share the host system's kernel, making them more lightweight and faster to start compared to traditional virtual machines.

How Lucy Uses Docker

Using Docker, Lucy can be deployed consistently and efficiently across different systems. Here's how Docker is used in the context of Lucy:

  1. Containerization: Lucy is packaged as a Docker container, which includes all the necessary software and dependencies. This ensures that Lucy runs the same way on any system with Docker installed.

  2. Port Management: The installer script ensures that the necessary network ports (25, 80, and 443) are available and not used by other services. These ports, such as handling web traffic and email communications, are essential for Lucy's operations.

  3. Automated Installation: The installer script automates setting up Docker (if it's not already installed) and configuring it to run Lucy. This reduces the complexity of installation and ensures that all necessary steps are followed correctly.

  4. Isolation and Security: Running Lucy in a Docker container isolates it from other applications on the host system. This improves security and reduces the risk of conflicts with other software.

Supported Linux Distributions

  • Ubuntu: 20.04 LTS, 22.04 LTS

  • Debian: 9.x, 10.x (Legacy)

  • Red Hat/CentOS: 9.x

Other Operating Systems

Virtualization platforms such as VMware or VirtualBox are compatible with most common operating systems. Users are encouraged to refer to their specific vendor's documentation for detailed compatibility information.

Compatibility with Operating Systems and Platforms:

Docker containers support a wide range of environments, including but not limited to:

  • Amazon EC2

  • Arch Linux

  • CentOS

  • CRUX Linux

  • Fedora

  • FrugalWare

  • Gentoo

  • IBM SoftLayer

  • Install on Joyent Public Cloud

  • Mac OS X

  • Microsoft Azure platform

  • Oracle Linux

  • Rackspace Cloud

  • Red Hat Enterprise Linux

  • openSUSE and SUSE Linux Enterprise

  • Ubuntu

  • Windows

Supported Browsers:

LUCY's phishing and awareness templates are designed to function seamlessly across a wide range of browsers to ensure broad accessibility for users. Here’s a list of supported browsers:

  • Browsers:

    • Chrome (desktop and mobile)

    • Firefox (desktop and mobile)

    • Microsoft Edge (desktop and mobile)

    • Opera (desktop and mobile)

    • Safari (desktop and mobile)


Hardware Requirements

Small Campaigns (up to 2000 recipients)

  • RAM: 8 GB

  • CPU: 4 Core

  • Hard Disk: 100 GB

Medium Campaigns (up to 50,000 recipients)

  • RAM: 16 GB

  • CPU: 8 Core

  • Hard Disk: 300 GB

Large Campaigns (up to 100,000 recipients)

  • RAM: 32 GB

  • CPU: 16 Core

  • Hard Disk: 500 GB

Hardware Recommendations
  • Initial Setup: Ensure that your initial hardware setup meets the minimum requirements for your expected campaign size. It's better to allocate more resources upfront to avoid performance bottlenecks.

  • Storage Planning: Given the potential need for additional templates and the data generated by campaigns, planning for ample storage from the beginning is wise. Consider future expansion when selecting your hard disk size.

  • Flexible Scaling: If you are hosting your LUCY instance on a VPS, take advantage of the ability to scale your resources as needed. This can be particularly useful for handling peak loads during large campaigns.

VPS Hosting

For users opting for a Virtual Private Server (VPS) hosted by LUCY:

Use Built-in Tools: Regularly utilize LUCY's and to keep your system running efficiently. These tools can provide valuable insights into how well your hardware is coping with the demands of your campaigns.

Dynamic Resource Scaling. LUCY provides the capability to automatically scale computing resources, including CPU and RAM, to meet the demands of your campaign. This feature ensures optimal performance of campaigns by adjusting resources in real time, eliminating the need for manual adjustments. In case of hardware limitations, users are encouraged to contact the for assistance in scaling their Virtual Private Server (VPS).

Docker
performance testing
monitoring tools
support department