Fortinet black logo

Administration Guide

Attack vectors vs deception

Copy Link
Copy Doc ID bbcf80bf-3975-11eb-96b9-00505692583a:892781
Download PDF

Attack vectors vs deception

This section shows the best practices for attack vectors vs deception.

Compromised internal endpoint using lateral movement

Lateral movement based on AD mapping

Lateral movement based on Mimikatz / PTH