Fortinet black logo

Administration Guide

Deception

Copy Link
Copy Doc ID 250a63c1-9b8e-11ee-a142-fa163e15d75b:125704
Download PDF

Deception

Use the Deception module to customize, deploy, and monitor decoys.

This section includes the following topics:

  • Deception OS

    View the deception OSes available for creating Decoy VMs. You can also upload a deception OS package or synchronize the deception OS list.

  • Custom Decoy Image

    Create custom OS images for the decoy. FortiDeceptor supports Decoy Customization with a purchased FDC Custom Decoy Subscription.

  • Deployment Network

    Set up a monitoring interface in a VLAN or a subnet.

  • Lure Resources

    View the current lure, upload resources such as Word and PDF files to automatically generate lures, and import a user name list from an LDAP server.

  • Deployment Wizard

    Create and deploy Decoy VMs on your network. Decoy VMs appear as real endpoints to hackers and can collect valuable information about attacks

  • Decoy Status

    Monitor the status of the Decoys on your network.

  • Deception Token

    Use a FortiDeceptor token package to add breadcrumbs on real endpoints and lure an attacker to a Decoy VM.

  • Deployment Map

    View the entire network showing real endpoints and decoy VMs.

  • Asset Discovery

    Generate Asset Inventory by passively fingerprinting the OS and other parameters for the assets in OT/IT/IoT networks.

  • Safe List

    Add an IP address that is considered legitimate without generating an Event or Incident when accessing decoys.

Deception

Use the Deception module to customize, deploy, and monitor decoys.

This section includes the following topics:

  • Deception OS

    View the deception OSes available for creating Decoy VMs. You can also upload a deception OS package or synchronize the deception OS list.

  • Custom Decoy Image

    Create custom OS images for the decoy. FortiDeceptor supports Decoy Customization with a purchased FDC Custom Decoy Subscription.

  • Deployment Network

    Set up a monitoring interface in a VLAN or a subnet.

  • Lure Resources

    View the current lure, upload resources such as Word and PDF files to automatically generate lures, and import a user name list from an LDAP server.

  • Deployment Wizard

    Create and deploy Decoy VMs on your network. Decoy VMs appear as real endpoints to hackers and can collect valuable information about attacks

  • Decoy Status

    Monitor the status of the Decoys on your network.

  • Deception Token

    Use a FortiDeceptor token package to add breadcrumbs on real endpoints and lure an attacker to a Decoy VM.

  • Deployment Map

    View the entire network showing real endpoints and decoy VMs.

  • Asset Discovery

    Generate Asset Inventory by passively fingerprinting the OS and other parameters for the assets in OT/IT/IoT networks.

  • Safe List

    Add an IP address that is considered legitimate without generating an Event or Incident when accessing decoys.