From d3ab7c7bf3a1a1f09d0bf9318ebde5c9d8ce211b Mon Sep 17 00:00:00 2001 From: Shreya Malviya Date: Wed, 28 Jul 2021 18:43:28 +0530 Subject: [PATCH] docs: Reword scenarios' explanation Co-authored-by: Mike Salvatore --- docs/content/usage/scenarios/_index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/content/usage/scenarios/_index.md b/docs/content/usage/scenarios/_index.md index ae9542716..e4848d1f8 100644 --- a/docs/content/usage/scenarios/_index.md +++ b/docs/content/usage/scenarios/_index.md @@ -14,7 +14,7 @@ This section describes the different attack Scenarios that the Infection Don't worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations. {{% /notice %}} -The Infection Monkey has pre-existing scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the default configuration values and only show the configuration fields relevant to the selected scenario. This makes it possible for you to quickly run the Monkey on your network with a targeted configuration. +The Infection Monkey has pre-built scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the default configuration values and only show the configuration fields relevant to the selected scenario. This makes it possible for you to quickly run the Monkey on your network in order to accomplish a specific objective. ![Choose scenario](/images/usage/scenarios/choose-scenario.png "Choose a scenario")