diff --git a/docs/content/setup/_index.md b/docs/content/setup/_index.md
index e6493bbac..bc114f2e4 100644
--- a/docs/content/setup/_index.md
+++ b/docs/content/setup/_index.md
@@ -20,3 +20,7 @@ Once you're done setting the Monkey up, check out our [Getting Started](../usage
 {{% notice tip %}}
 You can find information about [operating system compatibility and support here](../reference/operating_systems_support).
 {{% /notice %}}
+
+{{% notice tip %}}
+You can find the binary checksums of our installers to verify their integrity [in this page](../usage/file-checksums).
+{{% /notice %}}
\ No newline at end of file
diff --git a/docs/content/usage/getting-started.md b/docs/content/usage/getting-started.md
index 631957506..63d2bbaec 100644
--- a/docs/content/usage/getting-started.md
+++ b/docs/content/usage/getting-started.md
@@ -7,11 +7,13 @@ pre: "<i class='fas fa-play-circle'></i> "
 tags: ["usage"]
 ---
 
+If you haven't deployed the Monkey Island yet, please [refer to our setup documentation](/setup)
+
 ## Using the Infection Monkey
 
-After deploying the Monkey Island in your environment, navigate to `https://<server-ip>:5000`.
+After deploying the Monkey Island in your environment, navigate to `https://<server-ip>:5000`. 
 
-### First-time setup
+### First-time login
 
 On your first login, you'll be asked to set up a username and password for the Monkey Island server. [See this page for more details](../accounts-and-security).
 
diff --git a/docs/content/usage/use-cases/_index.md b/docs/content/usage/use-cases/_index.md
index 6595a50a6..389d5328a 100644
--- a/docs/content/usage/use-cases/_index.md
+++ b/docs/content/usage/use-cases/_index.md
@@ -8,7 +8,7 @@ pre = "<i class='fas fa-map-marked-alt'></i> "
 
 # Use cases
 
-This section describes possible use cases for the "Infection Monkey" and helps to 
+This section describes possible use cases for the Infection Monkey and helps to 
 understand how this tool can be configured.
 You can also refer to [our FAQ](../../faq) for more specific questions and answers.
 
@@ -16,9 +16,6 @@ You can also refer to [our FAQ](../../faq) for more specific questions and answe
 No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations.
 {{% /notice %}}
 
-#### Section contents:
-- [Network breach](./network-breach) - Simulate internal network breach.
-- [Network segmentation](./network-segmentation) - Test network segmentation.
-- [Credential leak](./credential-leak) - Assess the impact of successful phishing attack or other form of credential leak. 
-- [IDS/IPS Test](./ids-test) - Test your network defence solutions.
-- [Other](./other) - Tips and tricks about configuring monkey for your needs.
+## Section contents
+
+{{% children description=True %}}
diff --git a/docs/content/usage/use-cases/credential-leak.md b/docs/content/usage/use-cases/credential-leak.md
index 77acd8d31..498e1ff54 100644
--- a/docs/content/usage/use-cases/credential-leak.md
+++ b/docs/content/usage/use-cases/credential-leak.md
@@ -1,7 +1,8 @@
 ---
 title: "Credential Leak"
 date: 2020-08-12T13:04:25+03:00
-draft: true
+draft: false
+description: "Assess the impact of successful phishing attack, insider threat, or other form of credentials leak."
 weight: 4
 ---
 
diff --git a/docs/content/usage/use-cases/ids-test.md b/docs/content/usage/use-cases/ids-test.md
index 9d5cbb154..89b1bbfb3 100644
--- a/docs/content/usage/use-cases/ids-test.md
+++ b/docs/content/usage/use-cases/ids-test.md
@@ -1,7 +1,8 @@
 ---
 title: "IDS/IPS Test"
 date: 2020-08-12T13:07:47+03:00
-draft: true
+draft: false
+description: "Test your network defence solutions."
 weight: 5
 ---
 
@@ -24,7 +25,7 @@ Running the Monkey on both the Island and on a few other machines in the network
  as it increases coverage and propagation rates.
 
 
-![Post breach configuration](/images/usage/scenarios/ids-test.png "Post breach configuration")
+![Post breach configuration](/images/usage/use-cases/ids-test.PNG "Post breach configuration")
 
 ## Assessing results
 
@@ -50,5 +51,5 @@ While running this scenario, be on the lookout for the action that should arise:
 Lastly, check Zero Trust and Mitre ATT&CK reports, to see which attacks can be executed on the network and how to
  fix it.
  
- ![Map](/images/usage/scenarios/map-full-cropped.png "Map")
+ ![Map](/images/usage/use-cases/map-full-cropped.png "Map")
 
diff --git a/docs/content/usage/use-cases/network-breach.md b/docs/content/usage/use-cases/network-breach.md
index 84b0a9ab9..46aee7228 100644
--- a/docs/content/usage/use-cases/network-breach.md
+++ b/docs/content/usage/use-cases/network-breach.md
@@ -1,7 +1,8 @@
 ---
 title: "Network Breach"
 date: 2020-08-12T13:04:55+03:00
-draft: true
+draft: false
+description: "Simulate an internal network breach and assess the potential impact."
 weight: 1
 ---
 
diff --git a/docs/content/usage/use-cases/network-segmentation.md b/docs/content/usage/use-cases/network-segmentation.md
index 6884b0c48..8b418c1b6 100644
--- a/docs/content/usage/use-cases/network-segmentation.md
+++ b/docs/content/usage/use-cases/network-segmentation.md
@@ -1,7 +1,8 @@
 ---
 title: "Network Segmentation"
 date: 2020-08-12T13:05:05+03:00
-draft: true
+draft: false
+description: "Test network segmentation policies for apps that need ringfencing or tiers that require microsegmentation."
 weight: 3
 ---
 
diff --git a/docs/content/usage/use-cases/other.md b/docs/content/usage/use-cases/other.md
index 71405114d..b709d8ba3 100644
--- a/docs/content/usage/use-cases/other.md
+++ b/docs/content/usage/use-cases/other.md
@@ -1,7 +1,8 @@
 ---
 title: "Other"
 date: 2020-08-12T13:07:55+03:00
-draft: true
+draft: false
+description: "Tips and tricks about configuring monkey for your needs."
 weight: 100
 ---