InsightIDR Customer Webcast: Deception Technology

InsightIDR Customer Webcast: Deception Technology

InsightIDR’s easy-to-deploy deception suite lets you create traps for attackers — each one crafted to identify malicious behavior earlier in the attack chain.

rate limit

Code not recognized.

About this course

This installment of the InsightIDR Customer Webcast series will cover deception technology within InsightIDR. InsightIDR’s easy-to-deploy deception suite lets you create traps for attackers — each one crafted to identify malicious behavior earlier in the attack chain.

You'll learn about deployment and best practices for various deception traps in InsightIDR, including:

  • Honeypots: deploy assets to capture information about access and exploitation attempts
  • Honey Users: add a user to the Active Directory that matches how you typically configure usernames but also conveys it may be a domain admin
  • Honey Files: deploy files that appear to be valuable, such as a financial report or something with personally identifiable information (PII)
  • Honey Credentials: inject fake honey credentials on your endpoints to deceive attackers

Curriculum00:58:19

  • Introduction 00:15:36
  • Demonstration 00:34:22
  • Q&A 00:08:21

About this course

This installment of the InsightIDR Customer Webcast series will cover deception technology within InsightIDR. InsightIDR’s easy-to-deploy deception suite lets you create traps for attackers — each one crafted to identify malicious behavior earlier in the attack chain.

You'll learn about deployment and best practices for various deception traps in InsightIDR, including:

  • Honeypots: deploy assets to capture information about access and exploitation attempts
  • Honey Users: add a user to the Active Directory that matches how you typically configure usernames but also conveys it may be a domain admin
  • Honey Files: deploy files that appear to be valuable, such as a financial report or something with personally identifiable information (PII)
  • Honey Credentials: inject fake honey credentials on your endpoints to deceive attackers

Curriculum00:58:19

  • Introduction 00:15:36
  • Demonstration 00:34:22
  • Q&A 00:08:21