--- title: "Ransomware report" date: 2021-08-05T13:23:10+03:00 weight: 4 draft: false description: "Provides information about ransomware simulation on your network" --- {{% notice info %}} Check out [the Infection Monkey's ransomware simulation documentation]({{< ref "/usage/scenarios/ransomware-simulation" >}}) and [the documentation for other available reports]({{< ref "/reports" >}}). {{% /notice %}} The Infection Monkey can be configured to [simulate a ransomware attack](/usage/scenarios/ransomware-simulation) on your network. After running, it generates a **Ransomware Report** that provides you with insight into how ransomware might behave within your environment. The report is split into three sections: - [Breach](#breach) - [Lateral Movement](#lateral-movement) - [Attack](#attack) ## Breach The breach section shows when and where the ransomware infection began. ![Breach](/images/usage/reports/ransomware_report_1_breach.png "Breach") ## Lateral movement The lateral movement section provides information about how the simulated ransomware was able to propagate through your network. ![Lateral Movement](/images/usage/reports/ransomware_report_2_lateral_movement.png "Lateral Movement") ## Attack The attack section shows the details of what the simulated ransomware successfully encrypted, including a list of specific files. ![Attack](/images/usage/reports/ransomware_report_3_attack.png "Attack")