Use the information and procedures in this section to enforce compliance, policies, and security. Managing WatchlistsWatchlists provide custom detection and continuous monitoring of your environment for potential threats and suspicious activity. Managing PoliciesA policy determines preventative behavior and establishes sensor settings. Each endpoint sensor or sensor group is assigned a policy. Managing Kubernetes PoliciesKubernetes policies group security rules to help hardening the Kubernetes environments. The Kubernetes policies in Carbon Black Cloud are defined by the type of environment they protect - runtime or configuration environment. Manage ReputationsA reputation is the level of trust or distrust that is given to an application. Reputations are based on multiple sources of known good and known bad reputations. Malware RemovalYou can use the reputation of an application to identify malware. Cloud AnalysisImprove prevention against new forms of malware by enabling analysis of unknown binaries by Avira, a third-party partner. RecommendationsA recommendation is a suggested configuration, a reputation override, which you select to apply to improve the healthy state of your environment. Currently, you can use the Hash and IT Tools recommendations.