The following table describes limitations on Linux endpoints.
Security Product
Description
Implications and Required Actions
Chrooted and containerized processes
Chrooted and containerized processes collide
with the Traps injection mechanism.
Chrooted and containerized processes are not
protected by injection-based security modules (ROP Mitigation and Brute
Force Protection). All other exploit and malware protection functionality
works as expected. No user action is required.