- Deploy decoy accounts and credentials across AD and cloud
- Detect misuse, lateral movement, and privilege escalation
- Pre-integrated for deployment, monitoring, and alerting
- Aligns with Falcon risk insights to deliver early detection
- Detect misuse through decoy interaction, not just policies
- Reveal attacker intent early in the identity kill chain
- Deploy at scale with no agents or tuning
- Add high-fidelity signals from identity-focused deception
What the Research Shows
CrowdStrike’s own analysis highlights honeytokens as a key innovation for detecting identity-based threats. These types of attacks often evade traditional monitoring, especially when adversaries reuse legitimate credentials.
When attackers masquerade as real users, their behavior blends in with normal activity. Techniques like AD login interception and protocol manipulation don’t leave logs or obvious evidence.
Acalvio’s honeytoken accounts and tokens add a high-fidelity layer that reveals stealthy movement—giving SOC teams early warning even for zero-day threats. That’s why CrowdStrike Falcon® Identity Protection includes native support for honeytoken monitoring and response.

ShadowPlex surfaces threats that bypass traditional access and behavior monitoring.
- Detect credential theft using planted honeytokens in memory, endpoints, and cloud stores
- Identify misuse of service, machine, and privileged accounts before escalation
- Correlate identity misuse across hybrid AD and cloud identity systems
- Reveal attacker behavior that evades behavioral or policy-based detection

Extend CrowdStrike’s access controls with layered, intent-based detection.
- Augment Falcon Identity with real-time alerts on honeytoken engagement
- Deploy deception accounts that appear legitimate to adversaries
- Detect privilege abuse, credential harvesting, and identity traversal
- Deliver enriched signals to Falcon for faster, more accurate response

Catch stealthy identity misuse early—before traditional tools alert.
- Monitor for credential use that should never happen
- Expose lateral movement masked as legitimate access
- Detect Kerberoasting and other stealthy AD enumeration
- Flag threats without relying on baselines or user behavior models

Scale intent-based detection across identity systems—without added complexity.
- Deploy deception without agents or impact to users
- Cover on-prem AD and cloud identities, including Azure AD
- Integrate natively via Falcon Identity Protection APIs
- Automatically refresh decoys to stay ahead of attacker discovery

Why Honeytoken Accounts and Honeytokens Matter Falcon® Identity Protection excels at monitoring access—but attackers don’t always play by the rules.
Modern threats don’t just authenticate—they steal, reuse, and abuse credentials that slip past policy-based defenses. Privileged accounts, service identities, and machine credentials remain exposed, even in well-configured environments. These are the gaps adversaries exploit for lateral movement and privilege escalation—often without triggering Falcon’s policy alerts.
Acalvio ShadowPlex closes that gap. By deploying deceptive honeytoken accounts and credentials across your hybrid identity fabric, it exposes credential misuse with high-fidelity, intent-based detection. These decoys seamlessly integrate with CrowdStrike Falcon Identity Protection, providing an early warning system for identity threats that bypass conventional controls.

Seamless Integration: Acalvio ShadowPlex and CrowdStrike Falcon® Identity Protection
Acalvio ShadowPlex is pre-integrated with CrowdStrike Falcon® that provides immediate value:
- Acalvio’s integration with CrowdStrike Identity Protection is powered by the Acalvio SaaS Service
- No software installation on the enterprise network
- Scalable architecture protects multiple Active Directory Domains & thousands of endpoints
- Single console solution – managed using the CrowdStrike Falcon® console
- Administrators can control the variety and count of Honeytoken Accounts & Honeytokens.
How Honeytokens Work
CrowdStrike has identified honeytokens as a critical capability for Identity Protection in their recent research on security innovations. Acalvio honeytokens are designed to surface this activity with high-fidelity deception, providing visibility even into zero-day threats and adding an essential layer for Zero Trust-aligned Identity Protection strategies.

Acalvio makes deploying Honeytoken Accounts and Honeytokens with Falcon fast, scalable, and effective:
- AI-Driven Design: Automatically recommends token types, volume, and placement based on Active Directory structure and endpoint characteristics.
- Flexible Deployment: Supports broad coverage across domains, cloud workloads, and hybrid environments without agent sprawl.
- Hidden from Users, Visible to Attackers: Tokens blend into live environments but trigger immediate alerts on adversary engagement.
- Aligned to Falcon Policies: Integrates cleanly with CrowdStrike Falcon® Identity Protection to extend detection and response workflows.
Real Use Cases with CrowdStrike Falcon®

Use Case: An attacker compromises a low-privilege endpoint and begins enumerating service accounts to escalate privileges.
How It Works:
Acalvio deploys deceptive service accounts and credentials that are indistinguishable from real ones. When an attacker interacts with them, Falcon Identity Protection triggers a policy-driven response to isolate the endpoint.

Use Case: Credentials are dumped or harvested but not yet used—leaving no signal for traditional tools.
How It Works:
Honeytokens are embedded in memory and system artifacts that should never be accessed in normal workflows. When touched, they trigger high-fidelity alerts within Falcon before credentials are exploited.

Use Case: Adversaries move laterally using valid credentials and legitimate tools like RDP or PsExec.
How It Works:
Deceptive accounts placed across hybrid identity systems are monitored for use. Any interaction—logon, query, or enumeration—exposes traversal that would otherwise blend into normal activity. Falcon takes action based on these verified signals.

Use Case: Analysts are buried in alert fatigue with little context for prioritization.
How It Works:
Deception-generated alerts are based on active engagement—no speculation, no guesswork. When Falcon ingests these alerts, it enriches them with contextual telemetry, enabling focused investigation and faster remediation.

Acalvio ShadowPlex is fully integrated with CrowdStrike Falcon® Identity Protection, delivering immediate operational value without complexity:
- Built-in Honeytoken Support: Falcon natively monitors Acalvio-deployed honeytoken accounts and triggers high-fidelity detections on access or modification, exposing adversary behavior with precision.
- Unified Console Management: Honeytokens are deployed and managed directly from the CrowdStrike Falcon® console, giving SOC teams centralized visibility and control.
- Enterprise Scalability: No software to install. Supports large, distributed environments across multiple Active Directory domains and thousands of endpoints.
- Granular Control: Admins can define the type, volume, and placement of honeytoken accounts and tokens to align deception with their identity protection strategy.
Benefits for CrowdStrike Falcon® Identity Protection Customers

Detect threats that evade policy-based detection, like credential misuse and lateral movement using valid accounts.

Add intent-based alerts to Falcon’s visibility, reducing noise and giving analysts precise indicators of compromise.

Deploy deceptive identities directly into Falcon-managed environments to expose attackers without disrupting authentication flows.
Frequently Asked Questions
Honeytoken accounts are deceptive accounts (representing human and service accounts, and application identities) created in the Active Directory (AD), that are specifically designed to blend into the domain.
Honeytokens are deceptive credentials and data that are embedded in legitimate assets such as OS caches, application configuration files, Windows registry entries, Falcon-managed endpoints, and cloud workloads. Any usage or manipulation of these deception artifacts is a very reliable indicator of an identity threat.
A canary token is a simple deceptive artifact that acts as a tripwire, providing an alert when an attacker accesses one.
Acalvio Honey Accounts and Honeytokens is a much more comprehensive and effective solution based on deception technology. Acalvio automates the recommendation of Honey Accounts and deployment of Honeytokens so that they blend in with the environment and appear attractive to attackers. Unlike in the case of canary tokens, where deployment is usually manual, Acalvio Honey Accounts and Honeytokens can be easily deployed at an enterprise scale with minimal effort. In addition, unlike in the case of canary tokens, that usually only provide alerts for suspicious activity, the Acalvio solution integrates with Crowdstrike identity Protection to provide response actions.
Acalvio ShadowPlex Honeytoken accounts and Honeytokens for CrowdStrike Falcon® Identity Protection are based on Deception Technology and provide a new layer in the Defense-in-Depth offering for identity protection. They are a class of Deception Technology techniques that are proven to be extremely powerful and efficient in detecting a variety of identity threats.
Acalvio ShadowPlex leverages the Falcon® Identity Protection Honey Account monitoring and containment policy to provide a scalable and effective deception-based identity threat detection solution.