Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Related Videos

sidebar video

FortiDeceptor Windows Customization

  • 624 views
  • 1 years ago

Administration Guide

Deploy Decoy VM

Use the Deception pages to deploy Decoy VMs on your network. When a hacker gains unauthorized access to Decoy VMs, their movements can be monitored to understand how they attack the network.

To use FortiDeceptor to monitor the network:

Task

Location in GUI

More information

Check the Deception OS is available Go to Deception > Deception OS See Deception OS.
Auto-detect or specify the network where the Decoy VMs are deployed Go to Deception > Deployment Network See Deployment Network.
Deploy the Decoy VM on the network Go to Deception > Deployment Wizard See Deploy Decoy VMs with the Deployment Wizard.
Start or stop the deployed Decoy VMs, or download the FortiDeceptor token package to manually install it on computers Go to Deception > Decoy Status See Monitor Decoy Status.

Specify the IP address that is to be considered safe

Go to Deception > Safe List

See Configure a Safe List.

This is useful when you want to log in to the deployment network without being flagged as an attacker.

View and work with lure resources Go to Deception > Lure Resources See Lure Resources.

For more information, see Deception deployment best practices.

Related Videos

sidebar video

FortiDeceptor Windows Customization

  • 624 views
  • 1 years ago

Deploy Decoy VM

Use the Deception pages to deploy Decoy VMs on your network. When a hacker gains unauthorized access to Decoy VMs, their movements can be monitored to understand how they attack the network.

To use FortiDeceptor to monitor the network:

Task

Location in GUI

More information

Check the Deception OS is available Go to Deception > Deception OS See Deception OS.
Auto-detect or specify the network where the Decoy VMs are deployed Go to Deception > Deployment Network See Deployment Network.
Deploy the Decoy VM on the network Go to Deception > Deployment Wizard See Deploy Decoy VMs with the Deployment Wizard.
Start or stop the deployed Decoy VMs, or download the FortiDeceptor token package to manually install it on computers Go to Deception > Decoy Status See Monitor Decoy Status.

Specify the IP address that is to be considered safe

Go to Deception > Safe List

See Configure a Safe List.

This is useful when you want to log in to the deployment network without being flagged as an attacker.

View and work with lure resources Go to Deception > Lure Resources See Lure Resources.

For more information, see Deception deployment best practices.