From 12a85cbe9dd7760fc6f6cffbe9b8ea7372fc6f09 Mon Sep 17 00:00:00 2001 From: Shreya Date: Fri, 14 Aug 2020 19:35:08 +0530 Subject: [PATCH] Review changes --- docs/content/usage/reports/mitre.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/content/usage/reports/mitre.md b/docs/content/usage/reports/mitre.md index b5c4c7ee0..db700c4e9 100644 --- a/docs/content/usage/reports/mitre.md +++ b/docs/content/usage/reports/mitre.md @@ -24,8 +24,8 @@ The Monkey rates your network on the attack techniques it attempted. For each te - {{< label danger Red >}}: The Monkey **successfully used** the technique in the simulation. That means your network is vulnerable to this technique being employed. - {{< label warning Yellow >}}: The Monkey **tried to use** the technique, but didn’t manage to. That means your network isn’t vulnerable to the way Monkey employs this technique. -- {{< label unused "Dark Gray" >}}: The Monkey **didn't try** the technique this time. Perhaps it wasn't relevant to this network. -- {{< label disabled "Light Gray" >}}: The Monkey **didn't try** the technique this time since it wasn't configured. +- {{< label unused "Dark Gray" >}}: The Monkey **didn't try** the technique. Perhaps it wasn't relevant to this network. +- {{< label disabled "Light Gray" >}}: The Monkey **didn't try** the technique since it wasn't configured. Then, you can see exactly HOW the technique was used in this attack, and also what you should do to mitigate it, by clicking on the technique and seeing the details. For example, let’s look at the [**Brute Force**](https://attack.mitre.org/techniques/T1110/) technique that’s a part of employing the [**Credentials Access**](https://attack.mitre.org/tactics/TA0006/) tactic: