The last step is to monitor and respond to the activity on your deception layer. You need to have a system that can collect, analyze, and alert you on the relevant events and indicators, as well as a plan to mitigate the risks. Logging and recording everything that happens on the deception layer is essential; this includes the attacker's IP address, tools, techniques, commands, queries, and data exfiltration attempts. You should also use tools like SIEM, threat intelligence, or deception analytics to enrich and contextualize the information. It's important to alert and notify the relevant stakeholders and teams with tools like email, SMS, or dashboard. Finally, use tools like firewall, IPS, or endpoint security to contain and remediate the attack. Network deception is a powerful way to enhance security; by following these best practices you can deter, detect, and disrupt attackers while protecting your real network and data.