Skip to content

Commit 065a4fa

Browse files
authored
Merge pull request #203701 from ElazarK/upcoming-changes-k8
Update upcoming-changes.md
2 parents 219be88 + 24cf0c8 commit 065a4fa

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Important changes coming to Microsoft Defender for Cloud
33
description: Upcoming changes to Microsoft Defender for Cloud that you might need to be aware of and for which you might need to plan
44
ms.topic: overview
5-
ms.date: 06/28/2022
5+
ms.date: 07/05/2022
66
---
77

88
# Important upcoming changes to Microsoft Defender for Cloud
@@ -18,18 +18,12 @@ If you're looking for the latest release notes, you'll find them in the [What's
1818

1919
| Planned change | Estimated date for change |
2020
|--|--|
21-
| [GA support for Arc-enabled Kubernetes clusters](#ga-support-for-arc-enabled-kubernetes-clusters) | July 2022 |
2221
| [Changes to recommendations for managing endpoint protection solutions](#changes-to-recommendations-for-managing-endpoint-protection-solutions) | June 2022 |
2322
| [Key Vault recommendations changed to "audit"](#key-vault-recommendations-changed-to-audit) | June 2022 |
24-
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | July 2022 |
2523
| [Deprecating three VM alerts](#deprecating-three-vm-alerts) | June 2022|
24+
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | July 2022 |
2625
| [Deprecate API App policies for App Service](#deprecate-api-app-policies-for-app-service) | July 2022 |
27-
28-
### GA support for Arc-enabled Kubernetes clusters
29-
30-
**Estimated date for change:** July 2022
31-
32-
Defender for Containers is currently a preview feature for Arc-enabled Kubernetes clusters. In July, Arc-enabled Kubernetes clusters will be charged according to the listing on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). Customers that already have clusters onboarded to Arc (on the subscription level) will incur charges.
26+
| [Change in pricing of Runtime protection for Arc-enabled Kubernetes clusters](#change-in-pricing-of-runtime-protection-for-arc-enabled-kubernetes-clusters) | August 2022 |
3327

3428
### Changes to recommendations for managing endpoint protection solutions
3529

@@ -64,6 +58,20 @@ The Key Vault recommendations listed here are currently disabled so that they do
6458
| Key Vault secrets should have an expiration date | 14257785-9437-97fa-11ae-898cfb24302b |
6559
| Key Vault keys should have an expiration date | 1aabfa0d-7585-f9f5-1d92-ecb40291d9f2 |
6660

61+
### Deprecating three VM alerts
62+
63+
**Estimated date for change:** June 2022
64+
65+
The following table lists the alerts that will be deprecated during June 2022.
66+
67+
| Alert name | Description | Tactics | Severity |
68+
|--|--|--|--|
69+
| **Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
70+
| **Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
71+
| **SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
72+
73+
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
74+
6775
### Multiple changes to identity recommendations
6876

6977
**Estimated date for change:** July 2022
@@ -113,20 +121,6 @@ This update, will rename two recommendations, and revise their descriptions. The
113121
|Description|User accounts that have been blocked from signing in, should be removed from your subscriptions. <br> These accounts can be targets for attackers looking to find ways to access your data without being noticed.|User accounts that have been blocked from signing into Active Directory, should be removed from your subscriptions.<br> Learn more about securing the identity perimeter in [Azure Identity Management and access control security best practices](../security/fundamentals/identity-management-best-practices.md).|
114122
| Related policy | [Deprecated accounts should be removed from your subscription](https://ms.portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f6b1cbf55-e8b6-442f-ba4c-7246b6381474) | Subscriptions should be purged of accounts that are blocked in Active Directory and have read and write permissions. |
115123

116-
### Deprecating three VM alerts
117-
118-
**Estimated date for change:** June 2022
119-
120-
The following table lists the alerts that will be deprecated during June 2022.
121-
122-
| Alert name | Description | Tactocs | Severity |
123-
|--|--|--|--|
124-
| **Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
125-
| **Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
126-
| **SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
127-
128-
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
129-
130124
### Deprecate API App policies for App Service
131125

132126
**Estimated date for change:** July 2022
@@ -145,6 +139,12 @@ We will be deprecating the following policies to corresponding policies that alr
145139
| `Ensure that 'Java version' is the latest, if used as a part of the API app` | `App Service apps that use Java should use the latest 'Java version` |
146140
| `Latest TLS version should be used in your API App` | `App Service apps should use the latest TLS version` |
147141

142+
### Change in pricing of runtime protection for Arc-enabled Kubernetes clusters
143+
144+
**Estimated date for change:** August 2022
145+
146+
Runtime protection is currently a preview feature for Arc-enabled Kubernetes clusters. In August, Arc-enabled Kubernetes clusters will be charged for runtime protection. You can view pricing details on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). Subscriptions with Kubernetes clusters already onboarded to Arc, will begin to incur charges in August.
147+
148148
## Next steps
149149

150150
For all recent changes to Defender for Cloud, see [What's new in Microsoft Defender for Cloud?](release-notes.md)

0 commit comments

Comments
 (0)