Fortinet black logo

Best practices

This guide provides best practices principles and use cases on how to deploy FortiDeceptor in different network topologies.

The guide covers the following topics:

Deception strategy

FortiDeceptor platform

Deploying deception

Attack vectors vs deception

Deploying tokens using AD GPO logon script

Configuring trunk ports on FortiDeceptor VM