IX. Defenses and Bypass – Deception

  • Understand how Deception can be effective deployed as a defense mechanism in AD.

  • Deploy decoy user objects, which have interesting properties set, which have ACL rights over other users and have high privilege access in the domain along with available protections.

  • Deploy computer objects and Group objects to deceive an adversary.

  • Learn how adversaries can identify decoy objects and how defenders can avoid the detection.

Last updated

Was this helpful?