You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/anti-malware.md
+26-26Lines changed: 26 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,26 @@
1
1
---
2
-
title: Antimalware detection and blocking
3
-
description: Learn how to configure Container runtime Antimalware detection and blocking to block or alert on malware in Azure, AWS, and GCP environments.
2
+
title: Anti-malware detection and blocking
3
+
description: Learn how to configure Container runtime anti-malware detection and blocking to block or alert on malware in Azure, Amazon Web Service (AWS), and Google Cloud Project (GCP) environments.
4
4
#customer intent: As a security admin, I want to configure container runtime antimalware policies so that I can detect and prevent malware in my containerized workloads.
5
5
author: ElazarK
6
6
ms.author: elkrieger
7
7
ms.date: 02/22/2026
8
8
ms.topic: how-to
9
9
---
10
10
11
-
# Antimalware detection and blocking
11
+
# Anti-malware detection and blocking
12
12
13
-
Container runtime antimalware detects and blocks malware when a container runs an executable that the system identifies as malicious software.
13
+
Container runtime anti-malware detects and blocks malware when a container runs an executable that the system identifies as malicious software.
14
14
15
15
This feature sends alerts when it identifies malware and lets you block malware.
16
16
17
-
You can define antimalware policies that set conditions for alerts and blocking. These policies help you distinguish legitimate activity from potential threats.
17
+
You can define anti-malware policies that set conditions for alerts and blocking. These policies help you distinguish legitimate activity from potential threats.
18
18
19
-
Container runtime antimalware detection and blocking is part of the Defender for Containers plan. This feature is available for Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE).
19
+
Container runtime anti-malware detection and blocking is part of the Defender for Containers plan. This feature is available for Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE).
20
20
21
21
## Prerequisites
22
22
23
-
- To use container runtime antimalware detection and blocking, you need to run the Defender for Container sensor, which is available for the AWS, GCP, and AKS clouds. Currently, this feature is in preview and is only supported for:
23
+
- To use container runtime anti-malware detection and blocking, you need to run the Defender for Container sensor, which is available for the AWS, GCP, and AKS clouds. Currently, this feature is in preview and is only supported for:
24
24
-**AKS**: Helm provisioning with sensor version **0.10.2**.
25
25
-**Multicloud**: Helm provisioning with sensor version **0.10.2** or the ARC extension using `release-train=preview`, with the command `--configuration-settings collectors.antimalwareCollector.enable='true`.
26
26
@@ -32,54 +32,54 @@ Container runtime antimalware detection and blocking is part of the Defender for
32
32
33
33
- You must enable the Defender for Container sensor on the subscriptions and connectors.
34
34
35
-
- To create and modify antimalware policies, you need Security Admin or higher permissions on the tenant. To view antimalware policies, you need Security Reader or higher permissions on the tenant.
35
+
- To create and modify anti-malware policies, you need Security Admin or higher permissions on the tenant. To view anti-malware policies, you need Security Reader or higher permissions on the tenant.
36
36
37
37
- In addition to the [core sensor memory and CPU requirements](/azure/defender-for-cloud/defender-for-containers-architecture?tabs=defender-for-container-arch-aks#defender-sensor-component-details), you need:
38
38
39
39
| Component | Request | Limit |
40
40
|--|--|--|
41
-
| CPU | 50m | 300m |
41
+
| CPU | 50 m | 300 m |
42
42
| Memory | 128Mi | 500Mi |
43
43
44
-
Learn more about [antimalware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
44
+
Learn more about [anti-malware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
45
45
46
46
### Components
47
47
48
-
The following components are part of antimalware detection and blocking:
48
+
The following components are part of anti-malware detection and blocking:
49
49
50
50
- An enhanced sensor that detects and prevents malware.
51
51
52
-
- Antimalware policy configuration options.
52
+
- Anti-malware policy configuration options.
53
53
54
-
- Antimalware alerts.
54
+
- Anti-malware alerts.
55
55
56
-
## Enable antimalware detection and blocking
56
+
## Enable anti-malware detection and blocking
57
57
58
-
Antimalware isn't enabled by default because it consumes extra cluster resources.
58
+
Anti-malware isn't enabled by default because it consumes extra cluster resources.
59
59
60
-
To install the sensor with antimalware enabled, follow the instructions to [install Defender for Containers sensor by using Helm](deploy-helm.md) and include the `--antimalware` flag.
60
+
To install the sensor with anti-malware enabled, follow the instructions to [install Defender for Containers sensor by using Helm](deploy-helm.md) and include the `--antimalware` flag.
61
61
62
-
## Add antimalware rules
62
+
## Add anti-malware rules
63
63
64
-
When you install the sensor with antimalware enabled, it configures three antimalware rules by default. These rules include:
64
+
When you install the sensor with anti-malware enabled, it configures three anti-malware rules by default. These rules include:
65
65
66
66
- `Malware alert on binaries not originated from original image`: a suggested rule for situations where the system detects a drifted binary.
67
67
- `Default antimalware workload rule`.
68
68
- `Default anitmalware host rule`.
69
69
70
-
The two default antimalware rules (workload and host) apply to every potential situation if no other rule matches first. You can only modify the default rule's actions and set it to alert, block, or ignore.
70
+
The two default anti-malware rules (workload and host) apply to every potential situation if no other rule matches first. You can only modify the default rule's actions and set it to alert, block, or ignore.
71
71
72
-
You can create new antimalware rules to define when alerts should be generated, blocked, or ignored. Each rule can define the conditions for generating alerts. This structure allows you to tailor the system to your specific needs and reduce false positives. You can create exclusions by setting higher priority rules for specific scopes or clusters, images, pods, Kubernetes labels, or namespaces.
72
+
You can create new anti-malware rules to define when alerts should be generated, blocked, or ignored. Each rule can define the conditions for generating alerts. This structure allows you to tailor the system to your specific needs and reduce false positives. You can create exclusions by setting higher priority rules for specific scopes or clusters, images, pods, Kubernetes labels, or namespaces.
73
73
74
74
1. Sign in to the [Azure portal](https://portal.azure.com/).
75
75
76
-
1. Go to **Defender for Cloud** > **Environment ettings**.
76
+
1. Go to **Defender for Cloud** > **Environment settings**.
77
77
78
78
1. Select **Security rules**.
79
79
80
-
:::image type="content" source="media/anti-malware/alert-on-malware-rule-screen.png" alt-text="Screenshot of Microsoft Defender for Cloud showing the antimalware policy page with three rules: Alert on Malware, Default for workload, and Default for host." lightbox="media/anti-malware/alert-on-malware-rule-screen.png":::
80
+
:::image type="content" source="media/anti-malware/alert-on-malware-rule-screen.png" alt-text="Screenshot of Microsoft Defender for Cloud showing the anti-malware policy page with three rules: Alert on Malware, Default for workload, and Default for host." lightbox="media/anti-malware/alert-on-malware-rule-screen.png":::
81
81
82
-
1. Select **Antiwalware** > **+ Add rule**.
82
+
1. Select **Antimalware** > **+ Add rule**.
83
83
84
84
:::image type="content" source="media/anti-malware/configure-new-rule-screen.png" alt-text="Screenshot of the Add Rule side panel showing fields for rule name, conditions, and actions with options to alert, block, or ignore." lightbox="media/anti-malware/configure-new-rule-screen.png":::
85
85
@@ -108,11 +108,11 @@ You can create new antimalware rules to define when alerts should be generated
108
108
109
109
After 30 minutes, the sensors on the protected clusters are updated with the new rule.
110
110
111
-
## Manage antimalware rules
111
+
## Manage anti-malware rules
112
112
113
-
Based on the alerts you receive and review, you might need to adjust the rules in the antimalware policy. This adjustment might include refining conditions, adding rules, or removing rules that generate many false positives. The goal is to balance security needs with operational efficiency by using effective antimalware policies and rules.
113
+
Based on the alerts, you receive and review, you might need to adjust the rules in the anti-malware policy. This adjustment might include refining conditions, adding rules, or removing rules that generate many false positives. The goal is to balance security needs with operational efficiency by using effective anti-malware policies and rules.
114
114
115
-
Effective antimalware detection relies on your active role in configuring, monitoring, and adjusting policies for your environment.
115
+
Effective anti-malware detection relies on your active role in configuring, monitoring, and adjusting policies for your environment.
116
116
117
117
You can arrange rules by priority by selecting the up or down arrow. The rule with the highest priority (the lowest number) runs first. If a rule matches, the rule action runs and the evaluation ends. If no rule matches, the system evaluates the next rule. If no rule matches, the system applies the default rules.
0 commit comments