# CL0P, LockBit, DPRK and Standalone Protections Setup Information

# Infrastructure Configuration

For guidance on setting up the overall infrastructure used for emulation of CL0P, LockBit, and DPRK, please see Getting Started. Setup steps include setup for the victim hosts, support infrastructure, and attacker infrastructure.

# Infrastructure Overview

For an overview of the infrastructure used, including network layout, lists of hosts, and other details used to emulate the CL0P, LockBit, and DPRK adversaries, checkout Infrastructure Overview.

# Configuration Overview

For an overview of configurations applied per-scenario and for supporting infrastructure, checkout Configuration Overview.

# Traffic Redirection Overview

For an overview of traffic redirection used for obfuscation during emulation of CL0P, LockBit, and DPRK adversaries, please see the Traffic Redirection.