<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Host System Changes on Tetragon - eBPF-based Security Observability and Runtime Enforcement</title>
    <link>/docs/use-cases/host-system-changes/</link>
    <description>Recent content in Host System Changes on Tetragon - eBPF-based Security Observability and Runtime Enforcement</description>
    <generator>Hugo</generator>
    <language>en</language>
    <atom:link href="/docs/use-cases/host-system-changes/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Monitor Linux Kernel Modules</title>
      <link>/docs/use-cases/host-system-changes/linux-kernel-modules/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/docs/use-cases/host-system-changes/linux-kernel-modules/</guid>
      <description>Monitoring kernel modules helps to identify processes that load kernel modules to add features, to the operating system, to alter host system functionality or even hide their behaviour. This can be used to answer the following questions:&#xA;Which process or container is changing the kernel?&#xA;Which process or container is loading or unloading kernel modules in the cuslter?&#xA;Which process or container requested a feature that triggered the kernel to automatically load a module?</description>
    </item>
  </channel>
</rss>
