diff --git a/docs/content/setup/_index.md b/docs/content/setup/_index.md index e6493bbac..bc114f2e4 100644 --- a/docs/content/setup/_index.md +++ b/docs/content/setup/_index.md @@ -20,3 +20,7 @@ Once you're done setting the Monkey up, check out our [Getting Started](../usage {{% notice tip %}} You can find information about [operating system compatibility and support here](../reference/operating_systems_support). {{% /notice %}} + +{{% notice tip %}} +You can find the binary checksums of our installers to verify their integrity [in this page](../usage/file-checksums). +{{% /notice %}} \ No newline at end of file diff --git a/docs/content/usage/getting-started.md b/docs/content/usage/getting-started.md index 631957506..63d2bbaec 100644 --- a/docs/content/usage/getting-started.md +++ b/docs/content/usage/getting-started.md @@ -7,11 +7,13 @@ pre: " " tags: ["usage"] --- +If you haven't deployed the Monkey Island yet, please [refer to our setup documentation](/setup) + ## Using the Infection Monkey -After deploying the Monkey Island in your environment, navigate to `https://:5000`. +After deploying the Monkey Island in your environment, navigate to `https://:5000`. -### First-time setup +### First-time login On your first login, you'll be asked to set up a username and password for the Monkey Island server. [See this page for more details](../accounts-and-security). diff --git a/docs/content/usage/use-cases/_index.md b/docs/content/usage/use-cases/_index.md index 6595a50a6..389d5328a 100644 --- a/docs/content/usage/use-cases/_index.md +++ b/docs/content/usage/use-cases/_index.md @@ -8,7 +8,7 @@ pre = " " # Use cases -This section describes possible use cases for the "Infection Monkey" and helps to +This section describes possible use cases for the Infection Monkey and helps to understand how this tool can be configured. You can also refer to [our FAQ](../../faq) for more specific questions and answers. @@ -16,9 +16,6 @@ You can also refer to [our FAQ](../../faq) for more specific questions and answe No worries! The Monkey uses safe exploiters and does not cause any permanent system modifications that impact security or operations. {{% /notice %}} -#### Section contents: -- [Network breach](./network-breach) - Simulate internal network breach. -- [Network segmentation](./network-segmentation) - Test network segmentation. -- [Credential leak](./credential-leak) - Assess the impact of successful phishing attack or other form of credential leak. -- [IDS/IPS Test](./ids-test) - Test your network defence solutions. -- [Other](./other) - Tips and tricks about configuring monkey for your needs. +## Section contents + +{{% children description=True %}} diff --git a/docs/content/usage/use-cases/credential-leak.md b/docs/content/usage/use-cases/credential-leak.md index 77acd8d31..498e1ff54 100644 --- a/docs/content/usage/use-cases/credential-leak.md +++ b/docs/content/usage/use-cases/credential-leak.md @@ -1,7 +1,8 @@ --- title: "Credential Leak" date: 2020-08-12T13:04:25+03:00 -draft: true +draft: false +description: "Assess the impact of successful phishing attack, insider threat, or other form of credentials leak." weight: 4 --- diff --git a/docs/content/usage/use-cases/ids-test.md b/docs/content/usage/use-cases/ids-test.md index 9d5cbb154..89b1bbfb3 100644 --- a/docs/content/usage/use-cases/ids-test.md +++ b/docs/content/usage/use-cases/ids-test.md @@ -1,7 +1,8 @@ --- title: "IDS/IPS Test" date: 2020-08-12T13:07:47+03:00 -draft: true +draft: false +description: "Test your network defence solutions." weight: 5 --- @@ -24,7 +25,7 @@ Running the Monkey on both the Island and on a few other machines in the network as it increases coverage and propagation rates. -![Post breach configuration](/images/usage/scenarios/ids-test.png "Post breach configuration") +![Post breach configuration](/images/usage/use-cases/ids-test.PNG "Post breach configuration") ## Assessing results @@ -50,5 +51,5 @@ While running this scenario, be on the lookout for the action that should arise: Lastly, check Zero Trust and Mitre ATT&CK reports, to see which attacks can be executed on the network and how to fix it. - ![Map](/images/usage/scenarios/map-full-cropped.png "Map") + ![Map](/images/usage/use-cases/map-full-cropped.png "Map") diff --git a/docs/content/usage/use-cases/network-breach.md b/docs/content/usage/use-cases/network-breach.md index 84b0a9ab9..46aee7228 100644 --- a/docs/content/usage/use-cases/network-breach.md +++ b/docs/content/usage/use-cases/network-breach.md @@ -1,7 +1,8 @@ --- title: "Network Breach" date: 2020-08-12T13:04:55+03:00 -draft: true +draft: false +description: "Simulate an internal network breach and assess the potential impact." weight: 1 --- diff --git a/docs/content/usage/use-cases/network-segmentation.md b/docs/content/usage/use-cases/network-segmentation.md index 6884b0c48..8b418c1b6 100644 --- a/docs/content/usage/use-cases/network-segmentation.md +++ b/docs/content/usage/use-cases/network-segmentation.md @@ -1,7 +1,8 @@ --- title: "Network Segmentation" date: 2020-08-12T13:05:05+03:00 -draft: true +draft: false +description: "Test network segmentation policies for apps that need ringfencing or tiers that require microsegmentation." weight: 3 --- diff --git a/docs/content/usage/use-cases/other.md b/docs/content/usage/use-cases/other.md index 71405114d..b709d8ba3 100644 --- a/docs/content/usage/use-cases/other.md +++ b/docs/content/usage/use-cases/other.md @@ -1,7 +1,8 @@ --- title: "Other" date: 2020-08-12T13:07:55+03:00 -draft: true +draft: false +description: "Tips and tricks about configuring monkey for your needs." weight: 100 ---