Skip to content

Commit cfc0fca

Browse files
committed
polished
1 parent 00c51e0 commit cfc0fca

2 files changed

Lines changed: 18 additions & 15 deletions

File tree

articles/defender-for-cloud/anti-malware.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,19 @@ description: Learn how to configure Container runtime Antimalware detection and
44
#customer intent: As a security admin, I want to configure container runtime antimalware policies so that I can detect and prevent malware in my containerized workloads.
55
author: ElazarK
66
ms.author: elkrieger
7-
ms.date: 02/16/2026
7+
ms.date: 02/22/2026
88
ms.topic: how-to
99
---
1010

1111
# Antimalware detection and blocking
1212

13-
Container runtime antimalware detection and blocking happens when a container runs an executable that the system identifies as malware.
13+
Container runtime antimalware detects and blocks malware when a container runs an executable that the system identifies as malicious software.
1414

15-
This feature provides alerts when it identifies malware and allows you to block it. You can define antimalware policies to specify conditions for generating alerts and blocking, helping you distinguish between legitimate activities and potential threats. 
15+
This feature sends alerts when it identifies malware and lets you block malware.
1616

17-
Container runtime antimalware detection and blocking is integrated into the Defender for Containers plan and is available for the Azure (AKS), Amazon (EKS), and Google (GKE) clouds. 
17+
You can define antimalware policies that set conditions for alerts and blocking. These policies help you distinguish legitimate activity from potential threats.
18+
19+
Container runtime antimalware detection and blocking is part of the Defender for Containers plan. This feature is available for Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE).
1820

1921
## Prerequisites
2022

@@ -33,7 +35,7 @@ Container runtime antimalware detection and blocking is integrated into the Defe
3335
| CPU | 50m | 300m |
3436
| Memory | 128Mi | 500Mi |
3537

36-
- Learn more about [antimalware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
38+
Learn more about [antimalware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
3739

3840
### Components
3941

@@ -102,22 +104,23 @@ After 30 minutes, the sensors on the protected clusters are updated with the new
102104

103105
## Manage antimalware rules
104106

105-
Based on the alerts you receive and your review of them, you might need to adjust your rules in the antimalware policy. This adjustment could involve refining conditions, adding new rules, or removing rules that generate too many false positives. The goal is to ensure that the defined antimalware policies and their rules effectively balance security needs with operational efficiency. 
107+
Based on the alerts you receive and review, you might need to adjust the rules in the antimalware policy. This adjustment might include refining conditions, adding rules, or removing rules that generate many false positives. The goal is to balance security needs with operational efficiency by using effective antimalware policies and rules.
106108

107-
The effectiveness of antimalware detection relies on your active engagement in configuring, monitoring, and adjusting policies to suit your environment's unique requirements.
109+
Effective antimalware detection relies on your active role in configuring, monitoring, and adjusting policies for your environment.
108110

109-
You can arrange the rules based on priority by selecting the up or down arrow. The rule with the highest priority (lowest number) is evaluated first. If a rule match occurs, the action designated by the rule happens and the evaluation ends. If no match is found, the next rule is evaluated. If no match occurs with any of the existing rules, the default rules are applied.
111+
You can arrange rules by priority by selecting the up or down arrow. The rule with the highest priority (the lowest number) runs first. If a rule matches, the rule action runs and the evaluation ends. If no rule matches, the system evaluates the next rule. If no rule matches, the system applies the default rules.
110112

111-
You can manage each rule by using the toolbar.
113+
You can manage each rule by using the toolbar controls.
112114

113115
:::image type="content" source="media/anti-malware/rule-toolbar.png" alt-text="Screenshot that shows the toolbar that can be used to manage the rules." lightbox="media/anti-malware/rule-toolbar.png":::
114116

115-
The toolbar allows you to edit, duplicate, delete, enable, and disable rules. Simply select a rule and the desired action.
117+
The toolbar lets you edit, duplicate, delete, enable, and disable rules. Select a rule and an action.
116118

117-
Disabling a rule allows you to keep the rule and its configuration without applying it. This option is useful if you want to temporarily stop a rule from being applied without losing its configuration.
119+
Disabling a rule lets you keep the rule and its configuration without applying the rule. This option is useful if you want to stop a rule temporarily without losing its configuration.
118120

119-
After you configure your rules, select**Save**to apply the changes and create the policy. Within 30 minutes, the sensors on the protected clusters are updated with the new policy. 
121+
After you configure your rules, select **Save** to apply the changes and create the policy. Within 30 minutes, the sensors on the protected clusters update with the new policy.
120122

121-
## Related content
123+
## Next step
122124

123-
- [Overview of Container security in Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction)
125+
> [!div class="nextstep"]
126+
> [Overview of Container security in Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction)

articles/defender-for-cloud/binary-drift-detection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how binary drift detecting and blocking can help you detect u
44
ms.topic: how-to
55
author: Elazark
66
ms.author: elkrieger
7-
ms.date: 01/13/2026
7+
ms.date: 02/22/2026
88
#customer intent: As a user, I want to understand how binary drift detection and blocking can help me detect unauthorized external processes within containers.
99
---
1010

0 commit comments

Comments
 (0)