Fortinet black logo

Administration Guide

Attack vectors vs deception

Copy Link
Copy Doc ID 250a63c1-9b8e-11ee-a142-fa163e15d75b:892781
Download PDF

Attack vectors vs deception

This section shows the best practices for attack vectors vs deception.

Compromised internal endpoint using lateral movement

Lateral movement based on AD mapping

Lateral movement based on Mimikatz / PTH