FAQs
Need a hand? We've got you.
Check out some of our common questions below, or get in touch with our support team.
Infrastructure
Infrastructure
A Linux server and a virtual environment containing the software you want to monitor
Red Hat Enterprise Linux 8 and any OS that is binary-compatible with RHEL8.
CPU: 4
RAM: 4Gb
DISK: 50GB
Download and run the self-extracting installer file.
Enter basic information.
Open a web browser and start building tests.
Videos are recorded in mp4 format.
Videos can be stored locally or on network storage.
You can set an archive policy to manage your saved videos.
Yes, provision a RHEL8 server at your remote location and install 2 Steps. Then, connect the remote server to the central server.
Building tests
Building tests
Web applications (websites/SaaS)
Windows
Virtualisation (Citrix, Azure VDI, VMWare)
MainFrame
2 Steps can handle multiple authentication apps such as Google Authenticator, Microsoft Authenticator, Duo, etc. It can also retrieve one-time pins that are sent to mobile devices.
Yes, 2 Steps uses image-based conditional statements and standard conditional statements, such as "ifs".
Yes. Our tests are broken up into logical collections of commands called "checkpoints". These checkpoints are also shared with other tests, including pushing and pulling changes between tests. This creates a reusable library of functions.
Yes. 2 Steps can be integrated with custom scripts to perform actions such as pushing or retrieving data into different systems.
Integrations
Integrations
Yes. 2 Steps has a powerful default alerting engine that can send emails and make Web API calls to existing alerting endpoints.
2 Steps can also be configured to forward monitoring data to data lakes such as Splunk and BSEM Helix.
You can build custom dashboards using 2 Steps raw data with several formats, including OTEL.
No. The default install includes the Chrome browser configuration, and Firefox can easily be added.
Security
Security
The 2 Steps on-prem deployment model means our system resides inside the client site. There is no “phone home” functionality and no need for additional internet access.
2 Steps must be given user credentials for the application it automates and network access to the system.
The client controls the Linux host on which the software runs and is free to implement security controls such as full disk encryption and access controls.
Yes. There are many different configurations available within 2 Steps. It also has controls that can enable tests and results to be kept within a chosen user base or department.