Discuss how to safely execute and analyze suspicious files in an isolated environment. Report results, bugs, and use cases of the built-in sandbox feature.