Honeypot and Decoy Files
Last updated
Last updated
The Catalogic GuardMode has the Honeypot feature, which creates decoy files in a designated folder. These files are intentionally vulnerable to malware, so the Catalogic GuardMode Agent can detect suspicious activities before the malware spreads.
You can set up specific directories as honeypots, for example, directories containing data of particular concern. GuardMode will add to such directory files with known extensions and checksums that, if modified, indicate a high likelihood of malicious activity. Note that the directory used as a honeypot can still be utilized as a fully functional directory. Only the decoy files created in the honeypot location by the GuardMode Agent will be specially monitored.
To add a new honeypot, use the GuardMode API (see for more information). If your GuardMode Agent is registered as a DPX security node, you can go to the Node’s Security tab in DPX and add the honeypot deployment path. The decoy files will be transferred to the indicated location seconds later.
The format of the path depends on your OS.
For Windows:
For Linux:
Attention! The directory you want to add as a honeypot location must be an existing directory on your machine.
By default, GuardMode Agent uses predefined decoy files and puts them in the honeypot location. To use custom decoy files, add them to the /opt/catalogic/guard-mode/agent/Files
directory and restart the agent, using the following command:
The honeypot will be updated with the files located in the /Files
directory.