Fortinet white logo
Fortinet white logo

Administration Guide

Deception

Deception

Use the Deception module to customize, deploy, and monitor decoys.

This section includes the following topics:

  • Deception OS

    View the deception OSes available for creating Decoy VMs. You can also upload a deception OS package or synchronize the deception OS list.

  • Custom Decoy Image

    Create custom OS images for the decoy. FortiDeceptor supports Decoy Customization with a purchased FDC Custom Decoy Subscription.

  • Deployment Network

    Set up a monitoring interface in a VLAN or a subnet.

  • Lure Resources

    View the current lure, upload resources such as Word and PDF files to automatically generate lures, and import a user name list from an LDAP server.

  • Deployment Wizard

    Create and deploy Decoy VMs on your network. Decoy VMs appear as real endpoints to hackers and can collect valuable information about attacks

  • Decoy Status

    Monitor the status of the Decoys on your network.

  • Deception Token

    Use a FortiDeceptor token package to add breadcrumbs on real endpoints and lure an attacker to a Decoy VM.

  • Deployment Map

    View the entire network showing real endpoints and decoy VMs.

  • Asset Discovery

    Generate Asset Inventory by passively fingerprinting the OS and other parameters for the assets in OT/IT/IoT networks.

  • Safe List

    Add an IP address that is considered legitimate without generating an Event or Incident when accessing decoys.

Deception

Deception

Use the Deception module to customize, deploy, and monitor decoys.

This section includes the following topics:

  • Deception OS

    View the deception OSes available for creating Decoy VMs. You can also upload a deception OS package or synchronize the deception OS list.

  • Custom Decoy Image

    Create custom OS images for the decoy. FortiDeceptor supports Decoy Customization with a purchased FDC Custom Decoy Subscription.

  • Deployment Network

    Set up a monitoring interface in a VLAN or a subnet.

  • Lure Resources

    View the current lure, upload resources such as Word and PDF files to automatically generate lures, and import a user name list from an LDAP server.

  • Deployment Wizard

    Create and deploy Decoy VMs on your network. Decoy VMs appear as real endpoints to hackers and can collect valuable information about attacks

  • Decoy Status

    Monitor the status of the Decoys on your network.

  • Deception Token

    Use a FortiDeceptor token package to add breadcrumbs on real endpoints and lure an attacker to a Decoy VM.

  • Deployment Map

    View the entire network showing real endpoints and decoy VMs.

  • Asset Discovery

    Generate Asset Inventory by passively fingerprinting the OS and other parameters for the assets in OT/IT/IoT networks.

  • Safe List

    Add an IP address that is considered legitimate without generating an Event or Incident when accessing decoys.