tencent cloud

Tencent Container Security Service

Release Notes
Product Introduction
Overview
Strengths
Use Cases
Features and Versions
Purchase Guide
Applying for Trial
Purchasing Pro Edition
Purchasing Image Scan
Purchasing Log Analysis
Getting Started
Operation Guide
Security Overview
Asset Management
Vulnerability Detection
Image Risk Management
Cluster Risk Management
Baseline Management
Runtime Security
Advanced Defense
Policy Management
Protection Switch
Alarm Settings
Log Analysis
Hybrid Cloud Installation Guide
Compromised Container Isolation
Log Field Data Parsing
Practical Tutorial
Mirror Vulnerability Scanning and Vulnerability Management
Troubleshooting
Offline Linux Client
Troubleshooting for Cluster Access
API Documentation
History
Introduction
API Category
Making API Requests
Network Security APIs
Cluster Security APIs
Security Compliance APIs
Runtime security - High-risk syscalls
Runtime Security - Reverse Shell APIs
Runtime Security APIs
Alert Settings APIs
Advanced prevention - K8s API abnormal requests
Asset Management APIs
Security Operations - Log Analysis APIs
Runtime Security - Trojan Call APIs
Runtime Security - Container Escape APIs
Image Security APIs
Billing APIs
Data Types
Error Codes
FAQs
TCSS Policy
Privacy Policy
Data Processing And Security Agreement
Contact Us
Glossary

Overview

PDF
Focus Mode
Font Size
Last updated: 2025-04-30 16:14:52
Advanced prevention identifies hacker attacks adaptively, monitors and protects container runtime security in real time, and utilizes diversified security features, including abnormal process, file tampering, and high-risk syscall.
Abnormal process: It applies preset rules and custom check rules to monitor abnormal process startups in real time and then trigger alerts or block the exceptions. The system monitoring policy covers proxy software, lateral movements, malicious commands, reverse shells, fileless execution, high-risk commands, and unusual start found in the child process of the sensitive service.
File tampering: It applies preset rules and custom check rules to monitor abnormal file access behaviors that modify core files in real time and then trigger alerts or block the exceptions. The system monitoring policy covers rules for tampering with scheduled tasks, system programs, and user configurations.
High-risk syscall: It leverages Tencent Cloud's adaptive learning technologies in security protection to audit Linux syscalls initiated in the container that may cause security risks in real time.
Note:
Container alert events retain data only from the past six months. Daily automated checks detect and purge alert events older than 180 days, and expired data will no longer be displayed or queried. For extended retention, Log shipping is recommended for archival purposes.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback