1.1 KiB
+++ title = "Scenarios" date = 2020-08-12T12:52:59+03:00 weight = 3 chapter = true pre = " " +++
Scenarios
This section describes Scenarios in the Infection Monkey.
{{% notice note %}} Don't worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations. {{% /notice %}}
The Infection Monkey has pre-existing scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the default configuration values and only show the configuration fields relevant to the selected scenario. This makes it possible for you to quickly run the Monkey on your network with a targeted configuration.
To exit a scenario and select another one, click on "Start Over".
You can also refer to our FAQ for more specific questions and answers.
Section contents
{{% children description=True style="p"%}}