From 192ca814e0284e1a6246c98c0e231acdfec3bef0 Mon Sep 17 00:00:00 2001 From: Archer Bowen Date: Tue, 13 Aug 2024 15:49:52 +0000 Subject: [PATCH] Apply suggestions from code review --- .../simulation_components/system/applications/c2_suite.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/source/simulation_components/system/applications/c2_suite.rst b/docs/source/simulation_components/system/applications/c2_suite.rst index fff670e7..c3044d1d 100644 --- a/docs/source/simulation_components/system/applications/c2_suite.rst +++ b/docs/source/simulation_components/system/applications/c2_suite.rst @@ -38,7 +38,7 @@ Currently, the C2 Server offers three commands: +---------------------+---------------------------------------------------------------------------+ -It's important to note that in order to keep the PrimAITE realistic from a cyber perspective, +It's important to note that in order to keep PrimAITE realistic from a cyber perspective, The C2 Server application should never be visible or actionable upon directly by the blue agent. This is because in the real world, C2 servers are hosted on ephemeral public domains that would not be accessible by private network blue agent.