Table of contents

Manage Container Protection

Container Protection allows you to apply other protection modules to your containers. These modules are:

  • Real-time scan
  • Firewall
  • Intrusion protection

You need a Workload license to enable the container protection.

Apply real-time scan

This applies the real-time anti-malware scan that you have configured in the Anti-Malware module. By default, this functionality is Off.

  1. In the Computer or Policy editor, go to Settings > Container Protection.

  2. Go to the Real-time Scan section.

  3. From Scan and monitor container file activities in real time, select one of the following:

    • No to disable real-time scanning.
    • Yes to enable real-time scanning.
  4. Click Save.

For more information on real-time scans, see About Anti-Malware.

Apply your firewall settings

The following steps allow you to apply your firewall settings to your container network traffic. By default, this functionality is Off.

  1. In the Computer or Policy editor, go to Settings > Container Protection.

  2. Go to Firewall.

  3. From Scan container network traffic, select one of the following:

    • No to disable the firewall protection.
    • Yes to enable the firewall protection.
  4. Click Save.

For more information on firewalls, see About Firewall

Apply your intrusion prevention settings

The following steps allow you to apply your intrusion protection rules. By default, this functionality is Off.

  1. In the Computer or Policy editor, go to Settings > Container Protection.

  2. Go to Container Protection.

  3. From Scan container network traffic, select one of the following:

    • No to disable intrusion protection.
    • Yes to enable intrusion protection.
  4. Click Save.

For more information on intrusion protection, see About Intrusion Protection.