Virtual Machines Templates can be delivered for honeypot implementation. You can create new templates and scenarios.
Real scenarios. Attacker will not be able to detect it as a honeypot but everything will be monitored.