You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/common-questions-microsoft-defender-vulnerability-management.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,6 @@ ms.date: 11/30/2023
7
7
8
8
# Common questions about the Microsoft Defender Vulnerability Management solution
9
9
10
-
> [!CAUTION]
11
-
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly. For more information, see the [CentOS End Of Life guidance](~/articles/virtual-machines/workloads/centos/centos-end-of-life.md).
12
-
13
10
Get answers to common questions on the new Container VA offering powered by Microsoft Defender Vulnerability Management solution.
14
11
15
12
## How do I transition to the container vulnerability assessment powered by Microsoft Defender Vulnerability Management?
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-container-prerequisites-arc-eks-gke.md
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,6 @@ author: dcurwin
8
8
9
9
## Network requirements
10
10
11
-
> [!CAUTION]
12
-
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly. For more information, see the [CentOS End Of Life guidance](~/articles/virtual-machines/workloads/centos/centos-end-of-life.md).
13
-
14
11
Validate the following endpoints are configured for outbound access so that the Defender sensor can connect to Microsoft Defender for Cloud to send security data and events:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/remediate-vulnerability-findings-vm.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,9 +9,6 @@ ms.date: 03/13/2024
9
9
10
10
# View and remediate findings from vulnerability assessment solutions on your VMs
11
11
12
-
> [!CAUTION]
13
-
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly. For more information, see the [CentOS End Of Life guidance](~/articles/virtual-machines/workloads/centos/centos-end-of-life.md).
14
-
15
12
When your vulnerability assessment tool reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant common vulnerabilities and exposures (CVEs), CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
16
13
17
14
## View findings from the scans of your virtual machines
@@ -51,7 +48,7 @@ When a finding matches the criteria you defined in your disable rules, it doesn'
51
48
- Disable findings with severity less than medium
52
49
- Disable findings that are non-patchable
53
50
- Disable findings with CVSS score less than 6.5
54
-
- Disable findings with specific text in the security check or category (for example, “RedHat”, “CentOS Security Update for sudo”)
51
+
- Disable findings with specific text in the security check or category (for example, “RedHat”)
55
52
56
53
> [!IMPORTANT]
57
54
> To create a rule, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy).
@@ -80,7 +77,7 @@ To create a rule:
80
77
1. To view, override, or delete a rule:
81
78
1. Select **Disable rule**.
82
79
1. From the scope list, subscriptions with active rules show as **Rule applied**.
83
-
80
+
84
81
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule." lightbox="media/remediate-vulnerability-findings-vm/modify-rule.png":::
85
82
86
83
1. To view or delete the rule, select the ellipsis menu ("...").
0 commit comments