-
Introduction 00:15:36
-
Demonstration 00:34:22
-
Q&A 00:08:21
InsightIDR Customer Webcast: Deception Technology
InsightIDR’s easy-to-deploy deception suite lets you create traps for attackers — each one crafted to identify malicious behavior earlier in the attack chain.
This installment of the InsightIDR Customer Webcast series will cover deception technology within InsightIDR. InsightIDR’s easy-to-deploy deception suite lets you create traps for attackers — each one crafted to identify malicious behavior earlier in the attack chain.
You'll learn about deployment and best practices for various deception traps in InsightIDR, including:
- Honeypots: deploy assets to capture information about access and exploitation attempts
- Honey Users: add a user to the Active Directory that matches how you typically configure usernames but also conveys it may be a domain admin
- Honey Files: deploy files that appear to be valuable, such as a financial report or something with personally identifiable information (PII)
- Honey Credentials: inject fake honey credentials on your endpoints to deceive attackers