Inventory
This provides inventory information.
Data Transmitted to Trend Micro |
|
---|---|
Feature Configuration Location | This feature cannot be disabled. |
Admission Control
This provides security event information.
Data Transmitted to Trend Micro |
|
---|---|
Feature Configuration Location | This feature cannot be disabled. |
Continuous View
This provides security event information.
Data Transmitted to Trend Micro |
|
---|---|
Feature Configuration Location | This feature cannot be disabled. |
Vulnerability View
This information is used to understand customer behavior and which public container images they use most often.
Data Transmitted to Trend Micro | Container Image Name |
---|---|
Feature Configuration Location | This feature cannot be disabled. |
Artifact Scanning
This is used to collect artifact information to be processed by different scan tools.
Data Transmitted to Trend Micro |
|
---|---|
Feature Configuration Location | This feature cannot be disabled. |
Runtime Security
This information is used to determine if container activity violates a customizable set of rules, allowing the behavior to be logged or prevented.
Data Transmitted to Trend Micro |
|
---|---|
Feature Configuration Location | This feature is configured per cluster. Clusters can be viewed on the Inventory View and Runtime Security can be enabled or disabled on individual cluster pages. |