Skip to content

Commit 1d20d7c

Browse files
Merge pull request #248123 from memildin/docs-editor/concept-agentless-containers-1691944509
Update concept-agentless-containers.md
2 parents 5aa614c + 81ccc89 commit 1d20d7c

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Agentless container posture for Microsoft Defender for Cloud
3-
description: Learn how agentless container posture offers discovery, visibility, and vulnerability assessment for Containers without installing an agent on your machines.
3+
description: Learn how agentless container posture offers discovery, visibility, and vulnerability assessment for containers without installing an agent on your machines.
44
ms.service: defender-for-cloud
55
ms.topic: conceptual
66
ms.date: 07/03/2023
@@ -17,14 +17,14 @@ Learn more about [CSPM](concept-cloud-security-posture-management.md).
1717

1818
For support and prerequisites for agentless containers posture, see [Support and prerequisites for agentless containers posture](support-agentless-containers-posture.md).
1919

20-
Agentless container Posture provides the following capabilities:
20+
Agentless container posture provides the following capabilities:
2121

2222
- [Agentless discovery and visibility](#agentless-discovery-and-visibility-within-kubernetes-components) within Kubernetes components.
2323
- [Container registry vulnerability assessment](agentless-container-registry-vulnerability-assessment.md) provides vulnerability assessment for all container images, with near real-time scan of new images and daily refresh of results for maximum visibility to current and emerging vulnerabilities, enriched with exploitability insights, and added to Defender CSPM security graph for contextual risk assessment and calculation of attack paths.
2424
- Using Kubernetes [attack path analysis](concept-attack-path.md) to visualize risks and threats to Kubernetes environments.
2525
- Using [cloud security explorer](how-to-manage-cloud-security-explorer.md) for risk hunting by querying various risk scenarios, including viewing security insights, such as internet exposure, and other predefined security scenarios. For more information, search for `Kubernetes` in the [list of Insights](attack-path-reference.md#insights).
2626

27-
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan.
27+
All of these capabilities are available as part of the [Defender CSPM](concept-cloud-security-posture-management.md) plan.
2828

2929
## Agentless discovery and visibility within Kubernetes components
3030

@@ -38,9 +38,9 @@ The discovery process is based on snapshots taken at intervals:
3838

3939
When you enable the agentless discovery for Kubernetes extension, the following process occurs:
4040

41-
- **Create**: MDC (Microsoft Defender for Cloud) creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
41+
- **Create**: Defender for Cloud creates an identity in customer environments called CloudPosture/securityOperator/DefenderCSPMSecurityOperator.
4242

43-
- **Assign**: MDC assigns 1 built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope.
43+
- **Assign**: Defender for Cloud assigns 1 built-in role called **Kubernetes Agentless Operator** to that identity on subscription scope.
4444

4545
The role contains the following permissions:
4646
- AKS read (Microsoft.ContainerService/managedClusters/read)
@@ -53,11 +53,11 @@ When you enable the agentless discovery for Kubernetes extension, the following
5353

5454
- **Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
5555

56-
- **Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
56+
- **Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
5757

5858
### What's the refresh interval?
5959

60-
Agentless information in Defender CSPM is updated through a snapshot mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
60+
Agentless information in Defender CSPM is updated through a snapshot mechanism. It can take up to **24 hours** to see results in attack paths and the cloud security explorer.
6161

6262
## Next steps
6363

0 commit comments

Comments
 (0)