Fortinet white logo
Fortinet white logo

Administration Guide

Attack vectors vs deception

Attack vectors vs deception

This section shows the best practices for attack vectors vs deception.

Compromised internal endpoint using lateral movement

Lateral movement based on AD mapping

Lateral movement based on Mimikatz / PTH