forked from p34709852/monkey
Docs: Copyedits to reports/ransomware.md
This commit is contained in:
parent
f48cac3c77
commit
3ac481fb6b
|
@ -7,16 +7,15 @@ description: "Provides information about ransomware simulation on your network"
|
|||
---
|
||||
|
||||
{{% notice info %}}
|
||||
Check out [the documentation for the Infection Monkey's ransomware
|
||||
simulation]({{< ref "/usage/scenarios/ransomware-simulation" >}}) and [the
|
||||
documentation for other reports available in the Infection Monkey]({{< ref
|
||||
"/reports" >}}).
|
||||
Check out [the Infection Monkey's ransomware simulation documentation]({{< ref
|
||||
"/usage/scenarios/ransomware-simulation" >}}) and [the documentation for other
|
||||
available reports]({{< ref "/reports" >}}).
|
||||
{{% /notice %}}
|
||||
|
||||
The Infection Monkey can be configured to [simulate a ransomware
|
||||
attack](/usage/scenarios/ransomware-simulation) on your network. The
|
||||
**Ransomware Report** provides you with insight into how ransomware might
|
||||
behave within your environment.
|
||||
attack](/usage/scenarios/ransomware-simulation) on your network. After running,
|
||||
it generates a **Ransomware Report** that provides you with insight into how
|
||||
ransomware might behave within your environment.
|
||||
|
||||
The report is split into three sections:
|
||||
|
||||
|
@ -31,7 +30,7 @@ The breach section shows when and where the ransomware infection began.
|
|||
![Breach](/images/usage/reports/ransomware_report_1_breach.png "Breach")
|
||||
|
||||
|
||||
## Lateral Movement
|
||||
## Lateral movement
|
||||
|
||||
The lateral movement section provides information about how the simulated
|
||||
ransomware was able to propagate through your network.
|
||||
|
@ -44,7 +43,7 @@ Movement](/images/usage/reports/ransomware_report_2_lateral_movement.png
|
|||
|
||||
## Attack
|
||||
|
||||
The attack section shows which files the simulated ransomware successfully
|
||||
encrypted and the total number of files that were encrypted on your network.
|
||||
The attack section shows the details of what the simulated ransomware
|
||||
successfully encrypted, including a list of specific files.
|
||||
|
||||
![Attack](/images/usage/reports/ransomware_report_3_attack.png "Attack")
|
||||
|
|
Loading…
Reference in New Issue