Skip to content

Commit dc5d5db

Browse files
committed
fix antimalware to antimalware except for where it matches UI
1 parent ee6842c commit dc5d5db

1 file changed

Lines changed: 26 additions & 26 deletions

File tree

articles/defender-for-cloud/anti-malware.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
11
---
2-
title: Antimalware detection and blocking
3-
description: Learn how to configure Container runtime Antimalware detection and blocking to block or alert on malware in Azure, AWS, and GCP environments.
2+
title: Anti-malware detection and blocking
3+
description: Learn how to configure Container runtime anti-malware detection and blocking to block or alert on malware in Azure, Amazon Web Service (AWS), and Google Cloud Project (GCP) environments.
44
#customer intent: As a security admin, I want to configure container runtime antimalware policies so that I can detect and prevent malware in my containerized workloads.
55
author: ElazarK
66
ms.author: elkrieger
77
ms.date: 02/22/2026
88
ms.topic: how-to
99
---
1010

11-
# Antimalware detection and blocking
11+
# Anti-malware detection and blocking
1212

13-
Container runtime antimalware detects and blocks malware when a container runs an executable that the system identifies as malicious software.
13+
Container runtime anti-malware detects and blocks malware when a container runs an executable that the system identifies as malicious software.
1414

1515
This feature sends alerts when it identifies malware and lets you block malware.
1616

17-
You can define antimalware policies that set conditions for alerts and blocking. These policies help you distinguish legitimate activity from potential threats.
17+
You can define anti-malware policies that set conditions for alerts and blocking. These policies help you distinguish legitimate activity from potential threats.
1818

19-
Container runtime antimalware detection and blocking is part of the Defender for Containers plan. This feature is available for Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE).
19+
Container runtime anti-malware detection and blocking is part of the Defender for Containers plan. This feature is available for Azure Kubernetes Service (AKS), Amazon Elastic Kubernetes Service (EKS), and Google Kubernetes Engine (GKE).
2020

2121
## Prerequisites
2222

23-
- To use container runtime antimalware detection and blocking, you need to run the Defender for Container sensor, which is available for the AWS, GCP, and AKS clouds. Currently, this feature is in preview and is only supported for:
23+
- To use container runtime anti-malware detection and blocking, you need to run the Defender for Container sensor, which is available for the AWS, GCP, and AKS clouds. Currently, this feature is in preview and is only supported for:
2424
- **AKS**: Helm provisioning with sensor version **0.10.2**.
2525
- **Multicloud**: Helm provisioning with sensor version **0.10.2** or the ARC extension using `release-train=preview`, with the command `--configuration-settings collectors.antimalwareCollector.enable='true`.
2626

@@ -32,54 +32,54 @@ Container runtime antimalware detection and blocking is part of the Defender for
3232
3333
- You must enable the Defender for Container sensor on the subscriptions and connectors. 
3434
35-
- To create and modify antimalware policies, you need Security Admin or higher permissions on the tenant. To view antimalware policies, you need Security Reader or higher permissions on the tenant. 
35+
- To create and modify anti-malware policies, you need Security Admin or higher permissions on the tenant. To view anti-malware policies, you need Security Reader or higher permissions on the tenant. 
3636
3737
- In addition to the [core sensor memory and CPU requirements](/azure/defender-for-cloud/defender-for-containers-architecture?tabs=defender-for-container-arch-aks#defender-sensor-component-details), you need:
3838
3939
| Component | Request | Limit |
4040
|--|--|--|
41-
| CPU | 50m | 300m |
41+
| CPU | 50 m | 300 m |
4242
| Memory | 128Mi | 500Mi |
4343
44-
Learn more about [antimalware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
44+
Learn more about [anti-malware detection and blocking availability](support-matrix-defender-for-containers.md#runtime-protection-features).
4545
4646
### Components
4747
48-
The following components are part of antimalware detection and blocking: 
48+
The following components are part of anti-malware detection and blocking: 
4949
5050
- An enhanced sensor that detects and prevents malware.
5151
52-
- Antimalware policy configuration options.
52+
- Anti-malware policy configuration options.
5353
54-
- Antimalware alerts.
54+
- Anti-malware alerts.
5555
56-
## Enable antimalware detection and blocking
56+
## Enable anti-malware detection and blocking
5757
58-
Antimalware isn't enabled by default because it consumes extra cluster resources.
58+
Anti-malware isn't enabled by default because it consumes extra cluster resources.
5959
60-
To install the sensor with antimalware enabled, follow the instructions to [install Defender for Containers sensor by using Helm](deploy-helm.md) and include the `--antimalware` flag.
60+
To install the sensor with anti-malware enabled, follow the instructions to [install Defender for Containers sensor by using Helm](deploy-helm.md) and include the `--antimalware` flag.
6161
62-
## Add antimalware rules
62+
## Add anti-malware rules
6363
64-
When you install the sensor with antimalware enabled, it configures three antimalware rules by default. These rules include:
64+
When you install the sensor with anti-malware enabled, it configures three anti-malware rules by default. These rules include:
6565
6666
- `Malware alert on binaries not originated from original image`: a suggested rule for situations where the system detects a drifted binary.
6767
- `Default antimalware workload rule`.
6868
- `Default anitmalware host rule`.
6969
70-
The two default antimalware rules (workload and host) apply to every potential situation if no other rule matches first. You can only modify the default rule's actions and set it to alert, block, or ignore.
70+
The two default anti-malware rules (workload and host) apply to every potential situation if no other rule matches first. You can only modify the default rule's actions and set it to alert, block, or ignore.
7171
72-
You can create new antimalware rules to define when alerts should be generated, blocked, or ignored. Each rule can define the conditions for generating alerts. This structure allows you to tailor the system to your specific needs and reduce false positives. You can create exclusions by setting higher priority rules for specific scopes or clusters, images, pods, Kubernetes labels, or namespaces. 
72+
You can create new anti-malware rules to define when alerts should be generated, blocked, or ignored. Each rule can define the conditions for generating alerts. This structure allows you to tailor the system to your specific needs and reduce false positives. You can create exclusions by setting higher priority rules for specific scopes or clusters, images, pods, Kubernetes labels, or namespaces. 
7373
7474
1. Sign in to the [Azure portal](https://portal.azure.com/).
7575
76-
1. Go to **Defender for Cloud** > **Environment ettings**.
76+
1. Go to **Defender for Cloud** > **Environment settings**.
7777
7878
1. Select **Security rules**. 
7979
80-
:::image type="content" source="media/anti-malware/alert-on-malware-rule-screen.png" alt-text="Screenshot of Microsoft Defender for Cloud showing the antimalware policy page with three rules: Alert on Malware, Default for workload, and Default for host." lightbox="media/anti-malware/alert-on-malware-rule-screen.png":::
80+
:::image type="content" source="media/anti-malware/alert-on-malware-rule-screen.png" alt-text="Screenshot of Microsoft Defender for Cloud showing the anti-malware policy page with three rules: Alert on Malware, Default for workload, and Default for host." lightbox="media/anti-malware/alert-on-malware-rule-screen.png":::
8181
82-
1. Select **Antiwalware** > **+ Add rule**. 
82+
1. Select **Antimalware** > **+ Add rule**. 
8383
8484
:::image type="content" source="media/anti-malware/configure-new-rule-screen.png" alt-text="Screenshot of the Add Rule side panel showing fields for rule name, conditions, and actions with options to alert, block, or ignore." lightbox="media/anti-malware/configure-new-rule-screen.png":::
8585
@@ -108,11 +108,11 @@ You can create new antimalware rules to define when alerts should be generated
108108
109109
After 30 minutes, the sensors on the protected clusters are updated with the new rule.
110110
111-
## Manage antimalware rules
111+
## Manage anti-malware rules
112112
113-
Based on the alerts you receive and review, you might need to adjust the rules in the antimalware policy. This adjustment might include refining conditions, adding rules, or removing rules that generate many false positives. The goal is to balance security needs with operational efficiency by using effective antimalware policies and rules.
113+
Based on the alerts, you receive and review, you might need to adjust the rules in the anti-malware policy. This adjustment might include refining conditions, adding rules, or removing rules that generate many false positives. The goal is to balance security needs with operational efficiency by using effective anti-malware policies and rules.
114114
115-
Effective antimalware detection relies on your active role in configuring, monitoring, and adjusting policies for your environment.
115+
Effective anti-malware detection relies on your active role in configuring, monitoring, and adjusting policies for your environment.
116116
117117
You can arrange rules by priority by selecting the up or down arrow. The rule with the highest priority (the lowest number) runs first. If a rule matches, the rule action runs and the evaluation ends. If no rule matches, the system evaluates the next rule. If no rule matches, the system applies the default rules.
118118

0 commit comments

Comments
 (0)