Intelligent deception technology exploits the need of an attacker to discover
as much as they can about where they are in the organization’s network
immediately post compromise. This is a process not a single event.
We have covered active directory and credential breadcrumbs,and file and