Overview
Strengths
Use Cases
Features and Versions



Parameter Category | Parameter Name | Parameter Details |
Basic Information | Policy Template | Required, select Intercept Images with Critical and High-Risk Vulnerabilities. |
| Policy Name | Required, up to 128 characters. |
| Policy Description | Optional, up to 256 characters. |
| Enable/Disable | Enable: Start intercepting images or the countdown for the observation period. Disable: Policy is not effective. |
| Implementation | Implement now: After the policy is issued, the intercepting action is executed immediately when the target image is hit. Observe n day(s) before implementation: During the observation period, only alarms are triggered without interception. The intercepting action is executed immediately after the observation period ends. |
Intercepting Policy Details | Policy Type | Select Intercept Images with Critical and High-Risk Vulnerabilities for the policy template and intercept risky images for the policy type. If you need to change the policy type, adjust the policy template. |
| Intercepting details | For the three categories, vulnerabilities found, Trojan virus, and sensitive data found, at least one of them must be configured. Vulnerabilities Found can be configured based on the CVE number, component name and version number, or vulnerability classification. Trojan Virus can be configured based on the file MD5 or Trojan virus type. Sensitive Data Found can be configured based on the threat level and type of sensitive data. |
Effective Range | Images Selection | When you configure risk image interception, the effective range of the policy must be for scanned images. The system cannot determine the presence of vulnerabilities, Trojan viruses, or sensitive data risks in unscanned images. |

Parameter Category | Parameter Name | Parameter Details |
Basic Information | Policy Template | Required, select Intercept container images started in privileged mode. |
| Policy Name | Required, up to 128 characters. |
| Policy Description | Optional, up to 256 characters. |
| Enable/Disable | Enable: Start intercepting images or begin the countdown for the observation period. Disable: The policy is not effective. |
| Implementation | Implement now: After the policy is issued, the intercepting action is executed immediately when the target image is hit. Observe n day(s) before implementation: During the observation period, only alarms are triggered without interception. The intercepting action is executed immediately after the observation period ends. |
Intercepting Policy Details | Policy Type | Select Intercept container images started in privileged mode for the policy template and Privileged Image Interception for the policy type. If you need to change the policy type, adjust the policy template. |
| Intercepting Details | Users can check privileged startup parameters, defaulting to all. The system categorizes privileged parameters into five categories: base permissions, file operation permission, system operation, network operation, and high-risk permissions. Users can adjust categories or specific classifications within a category. |
Effective Range | Effective Method | When users configure the privileged image interception policy, the option for effective method includes "selected images are not allowed to run in privileged mode" or "only selected images are allowed to run in privileged mode (privileged startup of other images will be blocked)". |
| Images Selection | Users can select all images or custom images. |
Was this page helpful?
You can also Contact sales or Submit a Ticket for help.
Help us improve! Rate your documentation experience in 5 mins.
Feedback