Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Attack vectors vs deception

This section shows the best practices for attack vectors vs deception.

Compromised internal endpoint using lateral movement

Lateral movement based on AD mapping

Lateral movement based on Mimikatz / PTH

Attack vectors vs deception

This section shows the best practices for attack vectors vs deception.

Compromised internal endpoint using lateral movement

Lateral movement based on AD mapping

Lateral movement based on Mimikatz / PTH