Deception
Use the Deception module to customize, deploy, and monitor decoys.
This section includes the following topics:
- Deception OS
View the deception OSes available for creating Decoy VMs. You can also upload a deception OS package or synchronize the deception OS list.
- Custom Decoy Image
Create custom OS images for the decoy. FortiDeceptor supports Decoy Customization with a purchased FDC Custom Decoy Subscription.
- Deployment Network
Set up a monitoring interface in a VLAN or a subnet.
- Lure Resources
View the current lure, upload resources such as Word and PDF files to automatically generate lures, and import a user name list from an LDAP server.
- Deployment Wizard
Create and deploy Decoy VMs on your network. Decoy VMs appear as real endpoints to hackers and can collect valuable information about attacks
- Decoy Status
Monitor the status of the Decoys on your network.
- Deception Token
Use a FortiDeceptor token package to add breadcrumbs on real endpoints and lure an attacker to a Decoy VM.
- Deployment Map
View the entire network showing real endpoints and decoy VMs.
- Asset Discovery
Generate Asset Inventory by passively fingerprinting the OS and other parameters for the assets in OT/IT/IoT networks.
- Safe List
Add an IP address that is considered legitimate without generating an Event or Incident when accessing decoys.