Запись действий (видео) вредоносного файла внутри виртуальной машины гипервизора MVX (Fireeye)
Attack Validator Controller Daemon
Name : avc
NA Heart-Beat timeout (ms) : 30000
VM Ping Retry Delay (ms) : 5000
VM Ping Retry Max : 20
AE Start timeout (ms) : 180000
AE Postrun timeout (ms) : 45000
AE Terminate timeout (ms) : 60000
VNC Recording Enabled : no
OS Monitor Alive timeout (ms) : 30000
OS Monitor New Change timeout (ms) : 60000
OS Monitor Eventlog Debugging : no
OS Monitor Memory Dump : no
OS Change Save Limit : 0
Replay Trace Dir : /data/replay-traces
Web Max Run TMO (ms) : 240000
Web Network Activity TMO (ms) : 45000
VM Extract Files Enabled : no
VM Extract Files Only Malicious : yes
Malware VM Ping TMO (ms) : 30000
Behavior and Logic Engine enabled (BALE) : yes
OS Correlation Engine Used : BALE
OS Monitor Mouse Simulation : yes
NX#_debug show avc config
NX#_debug avc config vnc_rec enable
Name : avc
NA Heart-Beat timeout (ms) : 30000
VM Ping Retry Delay (ms) : 5000
VM Ping Retry Max : 20
AE Start timeout (ms) : 180000
AE Postrun timeout (ms) : 45000
AE Terminate timeout (ms) : 60000
VNC Recording Enabled : no
OS Monitor Alive timeout (ms) : 30000
OS Monitor New Change timeout (ms) : 60000
OS Monitor Eventlog Debugging : no
OS Monitor Memory Dump : no
OS Change Save Limit : 0
Replay Trace Dir : /data/replay-traces
Web Max Run TMO (ms) : 240000
Web Network Activity TMO (ms) : 45000
VM Extract Files Enabled : no
VM Extract Files Only Malicious : yes
Malware VM Ping TMO (ms) : 30000
Behavior and Logic Engine enabled (BALE) : yes
OS Correlation Engine Used : BALE
OS Monitor Mouse Simulation : yes