Table of contents

Manage Container Protection

Container Protection allows you to apply other protection modules to your containers. These modules are:

  • Real-time scene
  • Firewall
  • Intrusion protection

You need a Workload license to enable the container protection.

Apply real-time scan

This applies the real-time anti-malware scan that you have configured in the Anti-Malware module. By default, this functionality is On.

For more information on real-time scans, see About Anti-Malware.

  1. In the Computer or Policy editor, go to Settings > Container Protection.

  2. Go to the Real-time Scan section.

  3. From the Scan and monitor container file activities in real time drop-down, select:

    • No to turn off real-time scanning.
    • Yes to turn on real-time scanning.
  4. Click Save to save your changes.

Apply your firewall settings

This applies your firewall settings to your container network traffic. By default, this functionality is Off.

For more information on firewalls, see About Firewall

  1. In the Computer or Policy editor, go to Settings > Container Protection.

  2. Go to the Firewall section.

  3. From the Scan container network traffic drop-down, select:

    • No to turn off the firewall protection.
    • Yes to turn on the firewall protection.
  4. Click Save to save your changes.

Apply your intrusion prevention settings

This allows you to apply your intrusion protection rules. By default, this functionality is Off.

For more information on intrusion protection, see About Intrusion Protection.

  1. In the Computer or Policy editor, go to Settings > Container Protection.

  2. Go to the Container Protection section.

  3. From the Scan container network traffic drop-down, select:

    • No to turn off intrusion protection.
    • Yes to turn on intrusion protection.
  4. Click Save to save your changes.