docs: Modify scenarios' explanation to be less technical and introduce custom scenarios

This commit is contained in:
Shreya Malviya 2021-07-29 16:35:52 +05:30
parent 2d83ea642a
commit 52401357e8
1 changed files with 3 additions and 1 deletions

View File

@ -14,7 +14,9 @@ This section describes the different attack scenarios that the Infection Monkey
Don't worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations. Don't worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations.
{{% /notice %}} {{% /notice %}}
The Infection Monkey has pre-built scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the default configuration values and only show the configuration fields relevant to the selected scenario. This makes it possible for you to quickly run the Monkey on your network in order to accomplish a specific objective. The Infection Monkey has pre-built scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the configuration to only show you what you need to see for that scenario. This makes it possible for you to quickly run the Monkey on your network in order to accomplish a specific objective.
Choosing the "Custom" scenario will allow you to fine-tune your simulation and access all available features. [Read more about configuring a custom simulation.](/custom-scenario/_index.md)
![Choose scenario](/images/usage/scenarios/choose-scenario.png "Choose a scenario") ![Choose scenario](/images/usage/scenarios/choose-scenario.png "Choose a scenario")