This document discusses decoy documents, which are machine-generated documents containing bogus credentials and beacons. They are used to detect insider threats by enticing attackers to steal fake information and alerting administrators. Decoy documents are generated to appear believable and enticing using realistic names and data of interest to attackers. They are embedded with watermarks, beacons, and markers to detect unauthorized access and exfiltration. The Decoy Document Distributor system generates and monitors decoy documents containing honeytokens like fake login credentials and bank information.