Configuring FortiDeceptor Manager and GCP Client
After FortiDeceptor is deployed, get the appliance authorization key and configure FortiDeceptor Manager. After FortiDeceptor is configured, you can deploy the decoys and endpoints.
We recommend setting up a security policy and trusted host to ensure the FortiDeceptor is running in a safe environment. |