docs/book/src/installation/guest/index.rst
===================
Preparing the Guest
===================
At this point you should have configured Cuckoo host component and you
should have designed and defined the number and the names of the virtual
machines you are going to use for malware execution.
Now it's time to create such machines and to configure them properly.
.. toctree::
creation
requirements
network
agent
saving
cloning