System Configuration
This section describes how to manage system configuration for threat management. The following topics are addressed:
- Guest Images
- YARA Rules
- Custom Whitelists, Blacklists, and Passwords
- Static Analysis Tools
- AV-Suite
- Riskware
- Filter Analysis Tools
- Configuring the Maximum File Size for Analysis Using the CLI
- Changing the Time-To-Live for Local Signature Rules
- VM Throttling
- Local Intel Feeds for One-Way Content Sharing
For details about enabling Dynamic Threat Intelligence (DTI) network access and the configuration tasks, refer to the Malware Analysis System Administration Guide.