Topics on this page
Manage Container Protection
Container Protection allows you to apply other protection modules to your containers. These modules are:
- Real-time scan
- Firewall
- Intrusion protection
You need a Workload license to enable the container protection.
Apply real-time scan
This applies the real-time anti-malware scan that you have configured in the Anti-Malware module. By default, this functionality is Off.
-
In the Computer or Policy editor, go to Settings > Container Protection.
-
Go to the Real-time Scan section.
-
From Scan and monitor container file activities in real time, select one of the following:
- No to disable real-time scanning.
- Yes to enable real-time scanning.
-
Click Save.
For more information on real-time scans, see About Anti-Malware.
Apply your firewall settings
The following steps allow you to apply your firewall settings to your container network traffic. By default, this functionality is Off.
-
In the Computer or Policy editor, go to Settings > Container Protection.
-
Go to Firewall.
-
From Scan container network traffic, select one of the following:
- No to disable the firewall protection.
- Yes to enable the firewall protection.
-
Click Save.
For more information on firewalls, see About Firewall
Apply your intrusion prevention settings
The following steps allow you to apply your intrusion protection rules. By default, this functionality is Off.
-
In the Computer or Policy editor, go to Settings > Container Protection.
-
Go to Container Protection.
-
From Scan container network traffic, select one of the following:
- No to disable intrusion protection.
- Yes to enable intrusion protection.
-
Click Save.
For more information on intrusion protection, see About Intrusion Protection.