Fortinet black logo

Administration Guide

Lure Resources

Lure Resources

Use the Lure Resources page to view the current lure, upload resources such as Word and PDF files to automatically generate lures, and import a user name list from an LDAP server.

Uploading lure resources

Upload a lure resource to automatically generate lures. There are two types of lure resource:

  • Documents: Word and PDF files that generate authentic directories and files over the Decoy network shares.
  • Credential: Username (with password) list files that generate authentic credentials access to the network Decoys.
To upload a lure resource:
  1. Go to Deception > Lure Resources.
  2. Click Upload. The Upload New Lure Resource dialog opens.
  3. From the Lure Type dropdown, select the lure type.

    • Credential - Fake Users (txt): Upload a list file with fake users and passwords.
    • Documents - Template (docx,pdf,zip): Upload files as a template. FortiDeceptor will insert content to build honey docs.
    • Documents - Fake Content (zip): Upload Zip Word Document (.docx), PDF, Excel (.xlsx,.xlsm,.xltm,.xltx) then upload .zip file directly to FortiDeceptor.
    • Credential – AWS Key (txt): Upload a list file with AWS users and passwords.

      Requirements:

      • Create AWS IAM users with no permissions. (Without real AWS user, the AWS platform will not generate a log that indicates the user access.)
      • Upload a text file with the correct AWS Region, AWS Access Key ID, AWS Secret Access in the format below.

        AWS Access Key ID:AWS Secret Access:AWS Region:AWSusername

      For more information, see Deploying AWS deception keys.

    • Deception SMB Token Drives (txt): Upload a text file which includes a list of customized directory names. FortiDeceptor will use the file to generate a SMB Token.

    Tooltip

    The Credential - Fake Users (txt) and Documents - Template (doc,docx,pdf,zip) options include sample files to help you create a resource.

  4. Enter an optional Tag, such as any.
  5. In the Resource File field, click Choose a file to upload the resource, or drag and drop it onto the field.
  6. Click Save.

Importing users from LDAP

To import an LDAP user list:
  1. Go to Deception > Lure Resources.
  2. Click Import Users from LDAP.
  3. Configure the import settings.

    VersionSelect the version from the dropdown.
    Bind DNUsername used to connect to the LDAP service on the specified LDAP Server.
    LDAP URL

    Enter the LDAP URL using the following format:

    [protocol///]host[:port][/basedn[?attribute,...][?scope][?filter]]

    Bind PasswordEnter the Bind DN's password.
    CA CertificatesSelect a certificate from the dropdown.
    Search LimitSearch sub-tree depth.
    TCP TimeoutEnter the TCP connection timeout in seconds.
    Search TimeoutEnter the search timeout in seconds.
    SASL Bind UserThe username to authenticate a DN on the directory server using SASL.
    SASL Bind MechanismThe username and password for authentication.

    Tag

    Enter a tag for the import.

  4. Click Save.

Examples: Import Users from LDAP

Open LDAP example:

"dn": "uid=test,o=org,dc=example,dc=com",

"url": "ldap://192.168.0.100/o=org,dc=example,dc=com?uid?sub?(objectclass=*)",

"password": "password"

Windows AD example:

"version": "3",

"dn": "cn=users,cn=usergroup,dc=example,dc=com",

"url": "ldap:192.168.0.100/cn=usergroup,dc=example,dc=com?sAMAccountName?sub?(objectClass=user)",

"password": "password"

Support is offered if the format of the tree can parse uid/sAMAccountName in the search results. Ensure the URL queries the proper data.

Lure Resources

Use the Lure Resources page to view the current lure, upload resources such as Word and PDF files to automatically generate lures, and import a user name list from an LDAP server.

Uploading lure resources

Upload a lure resource to automatically generate lures. There are two types of lure resource:

  • Documents: Word and PDF files that generate authentic directories and files over the Decoy network shares.
  • Credential: Username (with password) list files that generate authentic credentials access to the network Decoys.
To upload a lure resource:
  1. Go to Deception > Lure Resources.
  2. Click Upload. The Upload New Lure Resource dialog opens.
  3. From the Lure Type dropdown, select the lure type.

    • Credential - Fake Users (txt): Upload a list file with fake users and passwords.
    • Documents - Template (docx,pdf,zip): Upload files as a template. FortiDeceptor will insert content to build honey docs.
    • Documents - Fake Content (zip): Upload Zip Word Document (.docx), PDF, Excel (.xlsx,.xlsm,.xltm,.xltx) then upload .zip file directly to FortiDeceptor.
    • Credential – AWS Key (txt): Upload a list file with AWS users and passwords.

      Requirements:

      • Create AWS IAM users with no permissions. (Without real AWS user, the AWS platform will not generate a log that indicates the user access.)
      • Upload a text file with the correct AWS Region, AWS Access Key ID, AWS Secret Access in the format below.

        AWS Access Key ID:AWS Secret Access:AWS Region:AWSusername

      For more information, see Deploying AWS deception keys.

    • Deception SMB Token Drives (txt): Upload a text file which includes a list of customized directory names. FortiDeceptor will use the file to generate a SMB Token.

    Tooltip

    The Credential - Fake Users (txt) and Documents - Template (doc,docx,pdf,zip) options include sample files to help you create a resource.

  4. Enter an optional Tag, such as any.
  5. In the Resource File field, click Choose a file to upload the resource, or drag and drop it onto the field.
  6. Click Save.

Importing users from LDAP

To import an LDAP user list:
  1. Go to Deception > Lure Resources.
  2. Click Import Users from LDAP.
  3. Configure the import settings.

    VersionSelect the version from the dropdown.
    Bind DNUsername used to connect to the LDAP service on the specified LDAP Server.
    LDAP URL

    Enter the LDAP URL using the following format:

    [protocol///]host[:port][/basedn[?attribute,...][?scope][?filter]]

    Bind PasswordEnter the Bind DN's password.
    CA CertificatesSelect a certificate from the dropdown.
    Search LimitSearch sub-tree depth.
    TCP TimeoutEnter the TCP connection timeout in seconds.
    Search TimeoutEnter the search timeout in seconds.
    SASL Bind UserThe username to authenticate a DN on the directory server using SASL.
    SASL Bind MechanismThe username and password for authentication.

    Tag

    Enter a tag for the import.

  4. Click Save.

Examples: Import Users from LDAP

Open LDAP example:

"dn": "uid=test,o=org,dc=example,dc=com",

"url": "ldap://192.168.0.100/o=org,dc=example,dc=com?uid?sub?(objectclass=*)",

"password": "password"

Windows AD example:

"version": "3",

"dn": "cn=users,cn=usergroup,dc=example,dc=com",

"url": "ldap:192.168.0.100/cn=usergroup,dc=example,dc=com?sAMAccountName?sub?(objectClass=user)",

"password": "password"

Support is offered if the format of the tree can parse uid/sAMAccountName in the search results. Ensure the URL queries the proper data.