Skip to content

Commit 174d7b3

Browse files
Merge pull request #242259 from AlizaBernstein/WI-117218-runtime-recommendation-ga
WI-117218-runtime-recommendation-ga
2 parents bd87649 + 4e6797e commit 174d7b3

File tree

3 files changed

+24
-4
lines changed

3 files changed

+24
-4
lines changed

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Identify vulnerabilities in Azure Container Registry with Microsoft Defen
33
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 06/14/2023
6+
ms.date: 06/21/2023
77
ms.topic: how-to
88
ms.custom: ignite-2022, build-2023
99
---
@@ -134,10 +134,10 @@ To create a rule:
134134

135135
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved-(powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648), select **Disable rule**.
136136
1. Select the relevant scope.
137-
1. Define your criteria.
138-
1. Select **Apply rule**.
139137

140138
:::image type="content" source="./media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png" alt-text="Screenshot showing how to create a disable rule for VA findings on registry." lightbox="media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png":::
139+
1. Define your criteria.
140+
1. Select **Apply rule**.
141141

142142
1. To view, override, or delete a rule:
143143
1. Select **Disable rule**.
-11.4 KB
Loading

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ If you're looking for the latest release notes, you can find them in the [What's
2424
| [DevOps Resource Deduplication for Defender for DevOps](#devops-resource-deduplication-for-defender-for-devops) | July 2023 |
2525
| [General availability release of agentless container posture in Defender CSPM](#general-availability-ga-release-of-agentless-container-posture-in-defender-cspm) | July 2023 |
2626
| [Business model and pricing updates for Defender for Cloud plans](#business-model-and-pricing-updates-for-defender-for-cloud-plans) | July 2023 |
27+
| [Recommendation set to be released for GA: Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](#recommendation-set-to-be-released-for-ga-running-container-images-should-have-vulnerability-findings-resolved-powered-by-microsoft-defender-vulnerability-management) | July 2023 |
2728
| [Change to the Log Analytics daily cap](#change-to-the-log-analytics-daily-cap) | September 2023 |
2829

2930
### Replacing the "Key Vaults should have purge protection enabled" recommendation with combined recommendation "Key Vaults should have deletion protection enabled".
@@ -107,6 +108,8 @@ With this release, the recommendation `Container registry images should have vul
107108

108109
Customers with both Defender for Containers plan and Defender CSPM plan should [disable the Qualys recommendation](tutorial-security-policy.md#disable-a-security-recommendation), to avoid multiple reports for the same images with potential impact on secure score. If you're currently using the sub-assesment API or Azure Resource Graph or continuous export, you should also update your requests to the new schema used by the MDVM recommendation prior to disabling the Qualys recommendation and using MDVM results instead.
109110

111+
If you are also using our public preview offering for Windows containers vulnerability assessment powered by Qualys, and you would like to continue using it, you need to [disable Linux findings](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure#disable-specific-findings) using disable rules rather than disable the registry recommendation.
112+
110113
Learn more about [Agentless Containers Posture in Defender CSPM](concept-agentless-containers.md).
111114

112115
### Business model and pricing updates for Defender for Cloud plans
@@ -135,6 +138,23 @@ Existing customers of Defender for Key-Vault, Defender for Azure Resource Manage
135138

136139
For more information on all of these plans, check out the [Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/?v=17.23h)
137140

141+
### Recommendation set to be released for GA: Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) 
142+
143+
**Estimated date for change: July 2023**
144+
145+
The recommendation `Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)` is set to be released as GA (General Availability):
146+
147+
|Recommendation | Description | Assessment Key|
148+
|--|--|--|
149+
| Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5
150+
151+
Customers with both Defender for the Containers plan and Defender CSPM plan should [disable the Qualys running containers recommendation](https://learn.microsoft.com/azure/defender-for-cloud/tutorial-security-policy#disable-a-security-recommendation), to avoid multiple reports for the same images with potential impact on the secure score.
152+
153+
If you're currently using the sub-assesment API or Azure Resource Graph or continuous export, you should also update your requests to the new schema used by the MDVM recommendation prior to disabling the Qualys recommendation and use MDVM results instead.
154+
155+
If you are also using our public preview offering for Windows containers vulnerability assessment powered by Qualys, and you would like to continue using it, you need to [disable Linux findings](https://learn.microsoft.com/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure#disable-specific-findings) using disable rules rather than disable the runtime recommendation.
156+
157+
Learn more about [Agentless Containers Posture in Defender CSPM](concept-agentless-containers.md).
138158

139159
### Change to the Log Analytics daily cap
140160

@@ -160,7 +180,7 @@ Starting on September 18, 2023 the Log Analytics Daily Cap will no longer exclud
160180

161181
At that time, all billable data types will be capped if the daily cap is met. This change improves your ability to fully contain costs from higher-than-expected data ingestion.
162182

163-
Learn more about [workspaces with Microsoft Defender for Cloud](../azure-monitor/logs/daily-cap.md#workspaces-with-microsoft-defender-for-cloud)
183+
Learn more about [workspaces with Microsoft Defender for Cloud](../azure-monitor/logs/daily-cap.md#workspaces-with-microsoft-defender-for-cloud).
164184

165185
## Next steps
166186

0 commit comments

Comments
 (0)