These tests are benign and do not pose any risk to your enterprise. The Cyber Assessment Tool loads in your browser just like a normal page, and performs a series of simulations using normal web requests that are designed to closely emulate malicious actions. The simulations cover an array of common attacks used to steal confidential information, deliver malware to unwitting users, and maintain control of compromised systems.
As the simulations are performed, our system verifies the behavior was successful, and presents the results in real time. We provide a report so that you can determine if any of the behavior was detected by your security systems. For each simulation, the report contains a detailed description, along with indicators of compromise, which can be used to take a fine-grained look into how your security tools reacted.