Fortinet black logo

Deploy Decoy VM

Deploy Decoy VM

The Deception menu allows you to deploy Decoy VMs on your network. When a hacker gains unauthorized access to the Decoy VMs, their movements can be monitored to understand how they attack the network.

To use FortiDeceptor to monitor the network:
  1. Go to Deception > Deception OS to check the Deception OS available. See View Available Deception OS
  2. Go to Deception > Deployment Network to Auto-Detect or specify the network where the Decoy VMs will be deployed. See Set up the Deployment Network
  3. Go to Deception > Deployment Wizard to deploy the Decoy VM on the network. See Deploy Decoy VMs with the Deployment Wizard
  4. Go to Deception > Decoy & Lure Status to see the Decoy VM deployed, start, stop, or download the FortiDeceptor Token Package to manually install on computers. See Monitor Decoy & Lure Status
  5. Go to Deception > Decoy Map to see the network of Decoy VMs. See View the Decoy Map
  6. Go to Deception > Whitelist to specify the network that is to be considered safe. This is useful if the administrator wants to log into the deployment network and not be flagged as an attacker. See Configure a Whitelist

Deploy Decoy VM

The Deception menu allows you to deploy Decoy VMs on your network. When a hacker gains unauthorized access to the Decoy VMs, their movements can be monitored to understand how they attack the network.

To use FortiDeceptor to monitor the network:
  1. Go to Deception > Deception OS to check the Deception OS available. See View Available Deception OS
  2. Go to Deception > Deployment Network to Auto-Detect or specify the network where the Decoy VMs will be deployed. See Set up the Deployment Network
  3. Go to Deception > Deployment Wizard to deploy the Decoy VM on the network. See Deploy Decoy VMs with the Deployment Wizard
  4. Go to Deception > Decoy & Lure Status to see the Decoy VM deployed, start, stop, or download the FortiDeceptor Token Package to manually install on computers. See Monitor Decoy & Lure Status
  5. Go to Deception > Decoy Map to see the network of Decoy VMs. See View the Decoy Map
  6. Go to Deception > Whitelist to specify the network that is to be considered safe. This is useful if the administrator wants to log into the deployment network and not be flagged as an attacker. See Configure a Whitelist