Docs: Copyedits to reports/ransomware.md

This commit is contained in:
Mike Salvatore 2021-08-10 16:31:16 -04:00
parent f48cac3c77
commit 3ac481fb6b
1 changed files with 9 additions and 10 deletions

View File

@ -7,16 +7,15 @@ description: "Provides information about ransomware simulation on your network"
--- ---
{{% notice info %}} {{% notice info %}}
Check out [the documentation for the Infection Monkey's ransomware Check out [the Infection Monkey's ransomware simulation documentation]({{< ref
simulation]({{< ref "/usage/scenarios/ransomware-simulation" >}}) and [the "/usage/scenarios/ransomware-simulation" >}}) and [the documentation for other
documentation for other reports available in the Infection Monkey]({{< ref available reports]({{< ref "/reports" >}}).
"/reports" >}}).
{{% /notice %}} {{% /notice %}}
The Infection Monkey can be configured to [simulate a ransomware The Infection Monkey can be configured to [simulate a ransomware
attack](/usage/scenarios/ransomware-simulation) on your network. The attack](/usage/scenarios/ransomware-simulation) on your network. After running,
**Ransomware Report** provides you with insight into how ransomware might it generates a **Ransomware Report** that provides you with insight into how
behave within your environment. ransomware might behave within your environment.
The report is split into three sections: The report is split into three sections:
@ -31,7 +30,7 @@ The breach section shows when and where the ransomware infection began.
![Breach](/images/usage/reports/ransomware_report_1_breach.png "Breach") ![Breach](/images/usage/reports/ransomware_report_1_breach.png "Breach")
## Lateral Movement ## Lateral movement
The lateral movement section provides information about how the simulated The lateral movement section provides information about how the simulated
ransomware was able to propagate through your network. ransomware was able to propagate through your network.
@ -44,7 +43,7 @@ Movement](/images/usage/reports/ransomware_report_2_lateral_movement.png
## Attack ## Attack
The attack section shows which files the simulated ransomware successfully The attack section shows the details of what the simulated ransomware
encrypted and the total number of files that were encrypted on your network. successfully encrypted, including a list of specific files.
![Attack](/images/usage/reports/ransomware_report_3_attack.png "Attack") ![Attack](/images/usage/reports/ransomware_report_3_attack.png "Attack")