The deception technology currently wastes an attacker 30 days before they realize they breached a fake environment. All along, Microsoft collects actionable data that can be used by other security teams to create more complex profiles and better defenses.
2 Likes
This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.