Fortinet black logo

Configuring FortiDeceptor Manager and GCP Client

After FortiDeceptor is deployed, get the appliance authorization key and configure FortiDeceptor Manager. After FortiDeceptor is configured, you can deploy the decoys and endpoints.

Tooltip

We recommend setting up a security policy and trusted host to ensure the FortiDeceptor is running in a safe environment.

To configure FortiDeceptor:
  1. Get the authentication key.
  2. Configure client.
  3. Configure FortiDeceptor manager.
  4. Deploy the decoys.
  5. Deploy the endpoints.