Fortinet black logo

Administration Guide

Attack vectors vs deception

Copy Link
Copy Doc ID 5e5f427d-b811-11eb-92d0-00505692583a:892781
Download PDF

Attack vectors vs deception

This section shows the best practices for attack vectors vs deception.

Compromised internal endpoint using lateral movement

Lateral movement based on AD mapping

Lateral movement based on Mimikatz / PTH