Fortinet black logo

Administration Guide

Deploying deception

Copy Link
Copy Doc ID 5e5f427d-b811-11eb-92d0-00505692583a:285638
Download PDF

Deploying deception

To deploy FortiDeceptor to optimize the deception surface, see the following best practices.

Deception decoy best practices

Deception lure best practices

AD integration best practices

Deployment best practices checklist

Network topology best practices