Skip to content

Commit

Permalink
Docs: Modify scenarios documentation
Browse files Browse the repository at this point in the history
- Move ransomware out of scenarios/
- Move everything in custom-scenarios/ to scenarios/

Issue #3400
PR #3473
  • Loading branch information
shreyamalviya authored and mssalvatore committed Jul 7, 2023
1 parent d4d6471 commit 0ecf368
Show file tree
Hide file tree
Showing 8 changed files with 8 additions and 34 deletions.
5 changes: 2 additions & 3 deletions docs/content/reports/ransomware.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,13 +7,12 @@ description: "Provides information about ransomware simulation on your network"
---

{{% notice info %}}
Check out [the Infection Monkey's ransomware simulation documentation]({{< ref
"/usage/scenarios/ransomware-simulation" >}}) and [the documentation for other
Check out [the documentation for other
available reports]({{< ref "/reports" >}}).
{{% /notice %}}

The Infection Monkey can be configured to [simulate a ransomware
attack](/usage/scenarios/ransomware-simulation) on your network. After running,
attack](/usage/ransomware-simulation) on your network. After running,
it generates a **Ransomware Report** that provides you with insight into how
ransomware might behave within your environment.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,8 @@ title: " Ransomware Simulation"
date: 2021-06-23T18:13:59+05:30
draft: false
description: "Simulate a ransomware attack on your network and assess the potential damage."
weight: 1
pre: "<i class='fa fa-lock'></i>"
weight: 6
pre: "<i class='fa fa-lock'></i> "
---

The Infection Monkey is capable of simulating a ransomware attack on your
Expand Down
15 changes: 4 additions & 11 deletions docs/content/usage/scenarios/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,21 +8,14 @@ pre = "<i class='fas fa-map-marked-alt'></i> "

# Scenarios

This section describes the different attack scenarios that the Infection Monkey can simulate.

{{% notice note %}}
Don't worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations.
{{% /notice %}}

The Infection Monkey has pre-built scenarios to simulate common types of attacks that take place. These scenarios, when selected, manipulate the configuration to only show you what you need to see for that scenario. This makes it possible for you to quickly run the Monkey on your network in order to accomplish a specific objective.

Choosing the "Custom" scenario will allow you to fine-tune your simulation and access all available features. [Read more about configuring a custom simulation.](/custom-scenario/_index.md)

![Choose scenario](/images/island/landing_page/choose_scenario.png "Choose a scenario")

To exit a scenario and select another one, click on "Reset".
![Reset](/images/island/others/reset_modal.png "Reset")
The Infection Monkey is a versatile breach and attack simulation tool. It allows
you to configure the simulation according to your needs.
You can enhance, optimize, and fine-tune the Monkey's behavior.

## Section contents
Here are some examples with instructions on how to configure them.

{{% children description=True style="p"%}}
18 changes: 0 additions & 18 deletions docs/content/usage/scenarios/custom-scenario/_index.md

This file was deleted.

File renamed without changes.

0 comments on commit 0ecf368

Please sign in to comment.