diff --git a/docs/content/reports/ransomware.md b/docs/content/reports/ransomware.md index d7396dc71..cd16d5e7c 100644 --- a/docs/content/reports/ransomware.md +++ b/docs/content/reports/ransomware.md @@ -7,16 +7,15 @@ description: "Provides information about ransomware simulation on your network" --- {{% notice info %}} -Check out [the documentation for the Infection Monkey's ransomware -simulation]({{< ref "/usage/scenarios/ransomware-simulation" >}}) and [the -documentation for other reports available in the Infection Monkey]({{< ref -"/reports" >}}). +Check out [the Infection Monkey's ransomware simulation documentation]({{< ref +"/usage/scenarios/ransomware-simulation" >}}) and [the documentation for other +available reports]({{< ref "/reports" >}}). {{% /notice %}} The Infection Monkey can be configured to [simulate a ransomware -attack](/usage/scenarios/ransomware-simulation) on your network. The -**Ransomware Report** provides you with insight into how ransomware might -behave within your environment. +attack](/usage/scenarios/ransomware-simulation) on your network. After running, +it generates a **Ransomware Report** that provides you with insight into how +ransomware might behave within your environment. The report is split into three sections: @@ -31,7 +30,7 @@ The breach section shows when and where the ransomware infection began. ![Breach](/images/usage/reports/ransomware_report_1_breach.png "Breach") -## Lateral Movement +## Lateral movement The lateral movement section provides information about how the simulated ransomware was able to propagate through your network. @@ -44,7 +43,7 @@ Movement](/images/usage/reports/ransomware_report_2_lateral_movement.png ## Attack -The attack section shows which files the simulated ransomware successfully -encrypted and the total number of files that were encrypted on your network. +The attack section shows the details of what the simulated ransomware +successfully encrypted, including a list of specific files. ![Attack](/images/usage/reports/ransomware_report_3_attack.png "Attack")