search cancel

Deception for Endpoint Protection

book

Article ID: 150722

calendar_today

Updated On:

Products

Endpoint Protection

Issue/Introduction

 Deception for Endpoint Protection

Resolution

Overview

Deception is available with Symantec Endpoint Protection 14.1. Symantec Endpoint Protection can deploy these deception techniques and monitor them without the need for any honey pots, new network segments, or additional agents.

Installation downloads

You can get the Process Termination Deception policies, and the instructions for using them, by downloading the full installation file for Symantec Endpoint Protection 14.0.1 or later from MySymantec. Once the file is downloaded, look for the instructions and the files in the Tools\Deception folder. For information on using MySymantec, see: Getting Started: Everything you need to hit the ground running.

You can get the full suite of deceptors by contacting Endpoint Protection Technical Support.

Implementation

Deception can be deployed in the environment and can monitor alerts in-house. For configuration assistance services for your Deception policies, please engage Symantec Consulting Services. Alternately, customers of Symantec Managed Security Services (MSS) can leverage their MSS integration for Deception alerts.

For more information

Read the Deception white paper, A Look at Deception-How to Start Playing Offense against Advanced Attackers.