Fortinet black logo

Administration Guide

Deception deployment best practices

Copy Link
Copy Doc ID f93d05fe-c1b1-11ec-9fd1-fa163e15d75b:587898
Download PDF

Appendix A - Deception deployment best practices

This section provides best practices principles and use cases on how to deploy FortiDeceptor in different network topologies.

The section covers the following topics:

Deception strategy

FortiDeceptor platform

Deploying deception

Attack vectors vs deception

Deploying tokens using AD GPO logon script

Configuring trunk ports on FortiDeceptor VM

Appendix A - Deception deployment best practices

This section provides best practices principles and use cases on how to deploy FortiDeceptor in different network topologies.

The section covers the following topics:

Deception strategy

FortiDeceptor platform

Deploying deception

Attack vectors vs deception

Deploying tokens using AD GPO logon script

Configuring trunk ports on FortiDeceptor VM