Fortinet black logo

Administration Guide

Deploying deception

Copy Link
Copy Doc ID f93d05fe-c1b1-11ec-9fd1-fa163e15d75b:285638
Download PDF

Deploying deception

To deploy FortiDeceptor to optimize the deception surface, see the following best practices.

Deception decoy best practices

Deception token best practices

AD integration best practices

Deployment best practices checklist

Network topology best practices