The Monkey’s Security Report is built to provide you with actionable recommendations and insight to the Attacker’s view of your network. You can download a PDF of this example report:
The report is split into 3 main categories: “Overview”, “Recommendations” and “The network from the Monkey’s eyes”.
The overview section of the report provides high-level information about the Monkey execution and the main security findings that the Monkey has found.
The report starts with information about the execution, including how long the simulation took and from which machine the infection started from.
The report will show which credentials were used for brute-forcing.
The report shows which exploits were attempted in this simulation and which targets the Monkey scanned and tried to exploit.
The report highlights the most important security threats and issues the Monkey discovered during the attack.
This section contains the Monkey’s recommendations for improving your security - what mitigations you need to implement.
This section contains the Infection Map and some summary tables on servers the Monkey has found.
This part shows the network map and a breakdown of how many machines were breached.
This part shows the attack surface the Monkey has found.
This part shows which exploits and Post Breach Actions the Monkey has performed in this simulation.
This part shows which credentials the Monkey was able to steal from breached machines in this simulation.