Skip to content

Commit 240efc7

Browse files
Merge pull request #194349 from ElazarK/vulnerability-assesment
added upcoming note
2 parents 8323be8 + 8522add commit 240efc7

File tree

2 files changed

+12
-0
lines changed

2 files changed

+12
-0
lines changed
145 KB
Loading

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ If you're looking for the latest release notes, you'll find them in the [What's
2323
|--|--|
2424
| [Changes to recommendations for managing endpoint protection solutions](#changes-to-recommendations-for-managing-endpoint-protection-solutions) | May 2022 |
2525
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | May 2022 |
26+
| [Changes to vulnerability assessment](#changes-to-vulnerability-assessment) | May 2022 |
2627

2728
### Changes to recommendations for managing endpoint protection solutions
2829

@@ -89,6 +90,17 @@ Defender for Cloud includes multiple recommendations for improving the managemen
8990
|Description |User accounts that have been blocked from signing in, should be removed from your subscriptions.<br>These accounts can be targets for attackers looking to find ways to access your data without being noticed.|User accounts that have been blocked from signing into Active Directory, should be removed from your subscriptions. These accounts can be targets for attackers looking to find ways to access your data without being noticed.<br>Learn more about securing the identity perimeter in [Azure Identity Management and access control security best practices](../security/fundamentals/identity-management-best-practices.md).|
9091
|Related policy |[Deprecated accounts should be removed from your subscription](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2fproviders%2fMicrosoft.Authorization%2fpolicyDefinitions%2f6b1cbf55-e8b6-442f-ba4c-7246b6381474)|Subscriptions should be purged of accounts that are blocked in Active Directory and have read and write permissions|
9192

93+
### Changes to vulnerability assessment
94+
95+
**Estimated date for change:** May 2022
96+
97+
Currently, Defender for Containers doesn't show vulnerabilities that have medium and low level severities that are not patchable.
98+
99+
As part of this update, vulnerabilities that have medium and low severities, that don't have patches will be shown. This update will provide maximum visibility, while still allowing you to filter undesired vulnerabilities by using the provided Disable rule.
100+
101+
:::image type="content" source="media/upcoming-changes/disable-rule.png" alt-text="Screenshot of the disable rule screen.":::
102+
103+
Learn more about [vulnerability management](deploy-vulnerability-assessment-tvm.md)
92104

93105
## Next steps
94106

0 commit comments

Comments
 (0)