Operational best practices¶
Best practices for securing MCR on Windows fall into three general areas:
Continuous monitoring
Centralized logging
Regular vulnerability assessment
Continuous monitoring¶
Deploy monitoring tools, such as Prometheus to collect metrics and Grafana for visualization. You can use these tools to monitor resource utilization and detect anomalies in real-time.
Centralized logging¶
Implement logging drivers for centralized log management:
{
"log-driver": "syslog",
"log-opts": {
"syslog-address": "tcp://<log-server>:514"
}
}
Regular vulnerability assessment¶
Scan the host system and container workloads for vulnerabilities regularly, using such tools as Nessus and Microsoft Defender ATP.