forked from p15670423/monkey
Docs: Copyedits to reports/ransomware.md
This commit is contained in:
parent
f48cac3c77
commit
3ac481fb6b
|
@ -7,16 +7,15 @@ description: "Provides information about ransomware simulation on your network"
|
||||||
---
|
---
|
||||||
|
|
||||||
{{% notice info %}}
|
{{% notice info %}}
|
||||||
Check out [the documentation for the Infection Monkey's ransomware
|
Check out [the Infection Monkey's ransomware simulation documentation]({{< ref
|
||||||
simulation]({{< ref "/usage/scenarios/ransomware-simulation" >}}) and [the
|
"/usage/scenarios/ransomware-simulation" >}}) and [the documentation for other
|
||||||
documentation for other reports available in the Infection Monkey]({{< ref
|
available reports]({{< ref "/reports" >}}).
|
||||||
"/reports" >}}).
|
|
||||||
{{% /notice %}}
|
{{% /notice %}}
|
||||||
|
|
||||||
The Infection Monkey can be configured to [simulate a ransomware
|
The Infection Monkey can be configured to [simulate a ransomware
|
||||||
attack](/usage/scenarios/ransomware-simulation) on your network. The
|
attack](/usage/scenarios/ransomware-simulation) on your network. After running,
|
||||||
**Ransomware Report** provides you with insight into how ransomware might
|
it generates a **Ransomware Report** that provides you with insight into how
|
||||||
behave within your environment.
|
ransomware might behave within your environment.
|
||||||
|
|
||||||
The report is split into three sections:
|
The report is split into three sections:
|
||||||
|
|
||||||
|
@ -31,7 +30,7 @@ The breach section shows when and where the ransomware infection began.
|
||||||
![Breach](/images/usage/reports/ransomware_report_1_breach.png "Breach")
|
![Breach](/images/usage/reports/ransomware_report_1_breach.png "Breach")
|
||||||
|
|
||||||
|
|
||||||
## Lateral Movement
|
## Lateral movement
|
||||||
|
|
||||||
The lateral movement section provides information about how the simulated
|
The lateral movement section provides information about how the simulated
|
||||||
ransomware was able to propagate through your network.
|
ransomware was able to propagate through your network.
|
||||||
|
@ -44,7 +43,7 @@ Movement](/images/usage/reports/ransomware_report_2_lateral_movement.png
|
||||||
|
|
||||||
## Attack
|
## Attack
|
||||||
|
|
||||||
The attack section shows which files the simulated ransomware successfully
|
The attack section shows the details of what the simulated ransomware
|
||||||
encrypted and the total number of files that were encrypted on your network.
|
successfully encrypted, including a list of specific files.
|
||||||
|
|
||||||
![Attack](/images/usage/reports/ransomware_report_3_attack.png "Attack")
|
![Attack](/images/usage/reports/ransomware_report_3_attack.png "Attack")
|
||||||
|
|
Loading…
Reference in New Issue