Virtual Machines Templates can be delivered for honeypot implementation. You can create new templates and scenarios.
Real scenarios. Attacker will not be able to detect it as a honeypot but everything will be monitored.
Manage Indicators of Compromise, Investigation Management, MISP Integration and Cuckoo Sandbox native integration.