This document summarizes research on using adaptive honeypots to engage attackers and obtain threat intelligence. It discusses using honeypots to emulate production systems and interact with attackers to learn their tactics, techniques and procedures. The researchers propose modeling attacker engagement as a Markov decision process to find optimal long-term engagement policies that adapt to unknown attack models. Reinforcement learning is suggested to help defenders learn engagement policies based on actual honeypot interactions and gather more threat intelligence over time. Security metrics are also proposed to evaluate the effectiveness and safety of different engagement strategies.