diff --git a/docs/content/setup/_index.md b/docs/content/setup/_index.md
index e6493bbac..bc114f2e4 100644
--- a/docs/content/setup/_index.md
+++ b/docs/content/setup/_index.md
@@ -20,3 +20,7 @@ Once you're done setting the Monkey up, check out our [Getting Started](../usage
{{% notice tip %}}
You can find information about [operating system compatibility and support here](../reference/operating_systems_support).
{{% /notice %}}
+
+{{% notice tip %}}
+You can find the binary checksums of our installers to verify their integrity [in this page](../usage/file-checksums).
+{{% /notice %}}
\ No newline at end of file
diff --git a/docs/content/usage/getting-started.md b/docs/content/usage/getting-started.md
index 631957506..63d2bbaec 100644
--- a/docs/content/usage/getting-started.md
+++ b/docs/content/usage/getting-started.md
@@ -7,11 +7,13 @@ pre: " "
tags: ["usage"]
---
+If you haven't deployed the Monkey Island yet, please [refer to our setup documentation](/setup)
+
## Using the Infection Monkey
-After deploying the Monkey Island in your environment, navigate to `https://:5000`.
+After deploying the Monkey Island in your environment, navigate to `https://:5000`.
-### First-time setup
+### First-time login
On your first login, you'll be asked to set up a username and password for the Monkey Island server. [See this page for more details](../accounts-and-security).
diff --git a/docs/content/usage/use-cases/_index.md b/docs/content/usage/use-cases/_index.md
index 6595a50a6..389d5328a 100644
--- a/docs/content/usage/use-cases/_index.md
+++ b/docs/content/usage/use-cases/_index.md
@@ -8,7 +8,7 @@ pre = " "
# Use cases
-This section describes possible use cases for the "Infection Monkey" and helps to
+This section describes possible use cases for the Infection Monkey and helps to
understand how this tool can be configured.
You can also refer to [our FAQ](../../faq) for more specific questions and answers.
@@ -16,9 +16,6 @@ You can also refer to [our FAQ](../../faq) for more specific questions and answe
No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations.
{{% /notice %}}
-#### Section contents:
-- [Network breach](./network-breach) - Simulate internal network breach.
-- [Network segmentation](./network-segmentation) - Test network segmentation.
-- [Credential leak](./credential-leak) - Assess the impact of successful phishing attack or other form of credential leak.
-- [IDS/IPS Test](./ids-test) - Test your network defence solutions.
-- [Other](./other) - Tips and tricks about configuring monkey for your needs.
+## Section contents
+
+{{% children description=True %}}
diff --git a/docs/content/usage/use-cases/credential-leak.md b/docs/content/usage/use-cases/credential-leak.md
index 77acd8d31..498e1ff54 100644
--- a/docs/content/usage/use-cases/credential-leak.md
+++ b/docs/content/usage/use-cases/credential-leak.md
@@ -1,7 +1,8 @@
---
title: "Credential Leak"
date: 2020-08-12T13:04:25+03:00
-draft: true
+draft: false
+description: "Assess the impact of successful phishing attack, insider threat, or other form of credentials leak."
weight: 4
---
diff --git a/docs/content/usage/use-cases/ids-test.md b/docs/content/usage/use-cases/ids-test.md
index 9d5cbb154..89b1bbfb3 100644
--- a/docs/content/usage/use-cases/ids-test.md
+++ b/docs/content/usage/use-cases/ids-test.md
@@ -1,7 +1,8 @@
---
title: "IDS/IPS Test"
date: 2020-08-12T13:07:47+03:00
-draft: true
+draft: false
+description: "Test your network defence solutions."
weight: 5
---
@@ -24,7 +25,7 @@ Running the Monkey on both the Island and on a few other machines in the network
as it increases coverage and propagation rates.
-![Post breach configuration](/images/usage/scenarios/ids-test.png "Post breach configuration")
+![Post breach configuration](/images/usage/use-cases/ids-test.PNG "Post breach configuration")
## Assessing results
@@ -50,5 +51,5 @@ While running this scenario, be on the lookout for the action that should arise:
Lastly, check Zero Trust and Mitre ATT&CK reports, to see which attacks can be executed on the network and how to
fix it.
- ![Map](/images/usage/scenarios/map-full-cropped.png "Map")
+ ![Map](/images/usage/use-cases/map-full-cropped.png "Map")
diff --git a/docs/content/usage/use-cases/network-breach.md b/docs/content/usage/use-cases/network-breach.md
index 84b0a9ab9..46aee7228 100644
--- a/docs/content/usage/use-cases/network-breach.md
+++ b/docs/content/usage/use-cases/network-breach.md
@@ -1,7 +1,8 @@
---
title: "Network Breach"
date: 2020-08-12T13:04:55+03:00
-draft: true
+draft: false
+description: "Simulate an internal network breach and assess the potential impact."
weight: 1
---
diff --git a/docs/content/usage/use-cases/network-segmentation.md b/docs/content/usage/use-cases/network-segmentation.md
index 6884b0c48..8b418c1b6 100644
--- a/docs/content/usage/use-cases/network-segmentation.md
+++ b/docs/content/usage/use-cases/network-segmentation.md
@@ -1,7 +1,8 @@
---
title: "Network Segmentation"
date: 2020-08-12T13:05:05+03:00
-draft: true
+draft: false
+description: "Test network segmentation policies for apps that need ringfencing or tiers that require microsegmentation."
weight: 3
---
diff --git a/docs/content/usage/use-cases/other.md b/docs/content/usage/use-cases/other.md
index 71405114d..b709d8ba3 100644
--- a/docs/content/usage/use-cases/other.md
+++ b/docs/content/usage/use-cases/other.md
@@ -1,7 +1,8 @@
---
title: "Other"
date: 2020-08-12T13:07:55+03:00
-draft: true
+draft: false
+description: "Tips and tricks about configuring monkey for your needs."
weight: 100
---