Fortinet black logo

Administration Guide

Deploying deception

Copy Link
Copy Doc ID d90909a9-1ca9-11ec-8c53-00505692583a:285638
Download PDF

Deploying deception

To deploy FortiDeceptor to optimize the deception surface, see the following best practices.

Deception decoy best practices

Deception token best practices

AD integration best practices

Deployment best practices checklist

Network topology best practices