You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/anti-malware.md
+17-14Lines changed: 17 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,17 +4,19 @@ description: Learn how to configure Container runtime Antimalware detection and
4
4
#customer intent: As a security admin, I want to configure container runtime antimalware policies so that I can detect and prevent malware in my containerized workloads.
5
5
author: ElazarK
6
6
ms.author: elkrieger
7
-
ms.date: 02/16/2026
7
+
ms.date: 02/22/2026
8
8
ms.topic: how-to
9
9
---
10
10
11
11
# Antimalware detection and blocking
12
12
13
-
Container runtime antimalware detection and blocking happens when a container runs an executable that the system identifies as malware.
13
+
Container runtime antimalware detects and blocks malware when a container runs an executable that the system identifies as malicious software.
14
14
15
-
This feature provides alerts when it identifies malware and allows you to block it. You can define antimalware policies to specify conditions for generating alerts and blocking, helping you distinguish between legitimate activities and potential threats.
15
+
This feature sends alerts when it identifies malware and lets you block malware.
16
16
17
-
Container runtime antimalware detection and blocking is integrated into the Defender for Containers plan and is available for the Azure (AKS), Amazon (EKS), and Google (GKE) clouds.
17
+
You can define antimalware policies that set conditions for alerts and blocking. These policies help you distinguish legitimate activity from potential threats.
18
+
19
+
Container runtime antimalware detection and blocking is part of the Defender for Containers plan. This feature is available for Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE).
18
20
19
21
## Prerequisites
20
22
@@ -33,7 +35,7 @@ Container runtime antimalware detection and blocking is integrated into the Defe
33
35
| CPU | 50m | 300m |
34
36
| Memory | 128Mi | 500Mi |
35
37
36
-
-Learn more about [antimalware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
38
+
Learn more about [antimalware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
37
39
38
40
### Components
39
41
@@ -102,22 +104,23 @@ After 30 minutes, the sensors on the protected clusters are updated with the new
102
104
103
105
## Manage antimalware rules
104
106
105
-
Based on the alerts you receive and your review of them, you might need to adjust your rules in theantimalwarepolicy. This adjustment could involve refining conditions, adding new rules, or removing rules that generate too many false positives. The goal is to ensure that the defined antimalware policies and their rules effectively balance security needs with operational efficiency.
107
+
Based on the alerts you receive and review, you might need to adjust the rules in theantimalwarepolicy. This adjustment might include refining conditions, adding rules, or removing rules that generate many false positives. The goal is to balance security needs with operational efficiency by using effective antimalware policies and rules.
106
108
107
-
The effectiveness of antimalware detection relies on your active engagement in configuring, monitoring, and adjusting policies to suit your environment's unique requirements.
109
+
Effective antimalware detection relies on your active role in configuring, monitoring, and adjusting policies for your environment.
108
110
109
-
You can arrange the rules based on priority by selecting the up or down arrow. The rule with the highest priority (lowest number) is evaluated first. Ifa rule match occurs, the action designated by the rule happens and the evaluation ends. If no match is found, the next rule is evaluated. If no match occurs with any of the existing rules, the default rules are applied.
111
+
You can arrange rules by priority by selecting the up or down arrow. The rule with the highest priority (the lowest number) runs first. Ifa rule matches, the rule action runs and the evaluation ends. If no rule matches, the system evaluates the next rule. If no rule matches, the system applies the default rules.
110
112
111
-
You can manage each rule by using the toolbar.
113
+
You can manage each rule by using the toolbar controls.
112
114
113
115
:::image type="content" source="media/anti-malware/rule-toolbar.png" alt-text="Screenshot that shows the toolbar that can be used to manage the rules." lightbox="media/anti-malware/rule-toolbar.png":::
114
116
115
-
The toolbar allows you to edit, duplicate, delete, enable, and disable rules. Simply select a rule and the desired action.
117
+
The toolbar lets you edit, duplicate, delete, enable, and disable rules. Select a rule and an action.
116
118
117
-
Disabling a rule allows you to keep the rule and its configuration without applying it. This option is useful if you want to temporarily stop a rule from being applied without losing its configuration.
119
+
Disabling a rule lets you keep the rule and its configuration without applying the rule. This option is useful if you want to stop a rule temporarily without losing its configuration.
118
120
119
-
After you configure your rules, select**Save**to apply the changes and create the policy. Within 30 minutes, the sensors on the protected clusters are updated with the new policy.
121
+
After you configure your rules, select**Save**to apply the changes and create the policy. Within 30 minutes, the sensors on the protected clusters update with the new policy.
120
122
121
-
## Related content
123
+
## Next step
122
124
123
-
-[Overview of Container security in Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction)
125
+
> [!div class="nextstep"]
126
+
> [Overview of Container security in Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/binary-drift-detection.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how binary drift detecting and blocking can help you detect u
4
4
ms.topic: how-to
5
5
author: Elazark
6
6
ms.author: elkrieger
7
-
ms.date: 01/13/2026
7
+
ms.date: 02/22/2026
8
8
#customer intent: As a user, I want to understand how binary drift detection and blocking can help me detect unauthorized external processes within containers.
0 commit comments