Deploy Decoy VM
Use the Deception pages to deploy Decoy VMs on your network. When a hacker gains unauthorized access to Decoy VMs, their movements can be monitored to understand how they attack the network.
To use FortiDeceptor to monitor the network:
Task |
Location in GUI |
More information |
---|---|---|
Check the Deception OS is available | Go to Deception > Deception OS | See Deception OS. |
Auto-detect or specify the network where the Decoy VMs are deployed | Go to Deception > Deployment Network | See Deployment Network. |
Deploy the Decoy VM on the network | Go to Deception > Deployment Wizard | See Deployment Wizard. |
Start or stop the deployed Decoy VMs, or download the FortiDeceptor token package to manually install it on computers | Go to Deception > Decoy Status | See Decoy Status. |
Specify the IP address that is to be considered safe |
Go to Deception > Safe List |
See Safe List. This is useful when you want to log in to the deployment network without being flagged as an attacker. |
View and work with lure resources | Go to Deception > Lure Resources | See Lure Resources. |
For more information, see Deception deployment best practices.