You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/disable-vulnerability-findings-containers.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,8 +36,7 @@ Disable rules apply per recommendation, for example, to disable [CVE-2017-17512]
36
36
37
37
To create a rule:
38
38
39
-
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/33422d8f-ab1e-42be-bc9a-38685bb567b9) or [Running container images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/33422d8f-ab1e-42be-bc9a-38685bb567b9) or [Containers running in Azure should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e9acaf48-d2cf-45a3-a6e7-3caa2ef769e0), select **Disable rule**.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/view-and-remediate-vulnerabilities-for-images.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ If you are using Defender CSPM, first review and remediate vulnerabilities expos
27
27
28
28
**To view vulnerabilities for a specific cluster, do the following:**
29
29
30
-
1.Open the **Recommendations** page, using the **>**arrow to open the sub-levels. If issues were found, you'll see the recommendation [Containers running in Azure should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e9acaf48-d2cf-45a3-a6e7-3caa2ef769e0). Select the recommendation.
30
+
1.In Defender for Cloud, open the **Recommendations**page. If issues were found, you'll see the recommendation [Containers running in Azure should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e9acaf48-d2cf-45a3-a6e7-3caa2ef769e0). Select the recommendation.
31
31
32
32
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-image-recommendation-line.png" alt-text="Screenshot showing the recommendation line for running container images should have vulnerability findings resolved." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-image-recommendation-line.png":::
33
33
@@ -71,7 +71,6 @@ Use these steps to remediate each of the affected images found either in a speci
71
71
1. Check the recommendations page for the recommendation [Running container images should have vulnerability findings resolved](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c).
72
72
1. If the recommendation still appears and the image you've handled still appears in the list of vulnerable images, check the remediation steps again.
73
73
74
-
## Next steps
74
+
## Next step
75
75
76
76
- Learn how to [view and remediate vulnerabilities for registry images](view-and-remediate-vulnerability-assessment-findings.md).
77
-
- Learn more about the Defender for Cloud [Defender plans](defender-for-cloud-introduction.md#protect-cloud-workloads)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/view-and-remediate-vulnerability-assessment-findings.md
+8-16Lines changed: 8 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,11 +20,11 @@ If you are using Defender CSPM, first review and remediate vulnerabilities expos
20
20
21
21
## View vulnerabilities on a specific container registry
22
22
23
-
1.Open the **Recommendations** page, using the **>**arrow to open the sublevels. If issues were found, you'll see the recommendation [Container images in Azure registry should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/33422d8f-ab1e-42be-bc9a-38685bb567b9). Select the recommendation.
23
+
1.In Defender for Cloud, open the **Recommendations**page. If issues were found, you'll see the recommendation [Container images in Azure registry should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/33422d8f-ab1e-42be-bc9a-38685bb567b9). Select the recommendation.
24
24
25
25
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/open-recommendations-page.png" alt-text="Screenshot showing the line for recommendation container registry images should have vulnerability findings resolved." lightbox="media/view-and-remediate-vulnerability-assessment-findings/open-recommendations-page.png":::
26
26
27
-
1. The recommendation details page opens with additional information. This information includes the list of registries with vulnerable images ("affected resources") and the remediation steps. Select the affected registry.
27
+
1. The recommendation details page opens with additional information. This information includes the list of registries with vulnerable images ("Resource") and the remediation steps. Select the affected registry.
28
28
29
29
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/select-registry.png" alt-text="Screenshot showing the recommendation details and affected registries." lightbox="media/view-and-remediate-vulnerability-assessment-findings/select-registry.png":::
30
30
@@ -44,32 +44,24 @@ If you are using Defender CSPM, first review and remediate vulnerabilities expos
44
44
45
45
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/image-details.png" alt-text="Screenshot showing the details of the finding on the specific image." lightbox="media/view-and-remediate-vulnerability-assessment-findings/image-details.png":::
46
46
47
+
You can also group recommendations by title. This is useful when you want to remediate a recommendation that is affecting multiple resources caused by a specific security issue. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
48
+
47
49
## View images affected by a specific vulnerability
48
50
49
51
1. Open the **Recommendations** page. If issues were found, you'll see the recommendation [Container images in Azure registry should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/33422d8f-ab1e-42be-bc9a-38685bb567b9). Select the recommendation.
50
52
51
53
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/open-recommendations-page.png" alt-text="Screenshot showing the line for recommendation container registry images should have vulnerability findings resolved." lightbox="media/view-and-remediate-vulnerability-assessment-findings/open-recommendations-page.png":::
52
54
53
-
1. The recommendation details page opens with additional information. This information includes the list of vulnerabilities impacting the images. Select the specific vulnerability.
55
+
1. The recommendation details page opens with additional information. Select the **Findings** tab to see the list of vulnerabilities impacting the images. Select a specific vulnerability.
54
56
55
57
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/select-specific-vulnerability.png" alt-text="Screenshot showing the list of vulnerabilities impacting the images." lightbox="media/view-and-remediate-vulnerability-assessment-findings/select-specific-vulnerability.png":::
56
58
57
-
1. The vulnerability finding details pane opens. This pane includes a detailed description of the vulnerability, images affected by that vulnerability, and links to external resources to help mitigate the threats, affected resources, and information on the software version that contributes to [resolving the vulnerability](#remediate-vulnerabilities).
59
+
1. The vulnerability finding details pane opens. This pane includes a detailed description of the vulnerability, images affected by that vulnerability, and links to external resources to help mitigate the threats, affected resources, and information on the software version that contributes to resolving the vulnerability.
58
60
59
61
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/specific-vulnerability-details.png" alt-text="Screenshot showing the list of images impacted by the vulnerability." lightbox="media/view-and-remediate-vulnerability-assessment-findings/specific-vulnerability-details.png":::
60
62
61
-
## Remediate vulnerabilities
62
-
63
-
Use these steps to remediate each of the affected images found either in a specific cluster or for a specific vulnerability:
64
-
65
-
1. Follow the steps in the remediation section of the recommendation pane.
66
-
1. When you've completed the steps required to remediate the security issue, replace each affected image in your registry or replace each affected image for a specific vulnerability:
67
-
1. Build a new image (including updates for each of the packages) that resolves the vulnerability according to the remediation details.
68
-
1. Push the updated image to trigger a scan and delete the old image. It might take up to 24 hours for the previous image to be removed from the results, and for the new image to be included in the results.
69
-
70
-
1. Check the recommendations page for the recommendation [Container images in Azure registry should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/33422d8f-ab1e-42be-bc9a-38685bb567b9).
71
-
If the recommendation still appears and the image you've handled still appears in the list of vulnerable images, check the remediation steps again.
63
+
For information on how to remediate the vulnerabilities, see [Remediate recommendations](implement-security-recommendations.md).
72
64
73
-
## Next step
65
+
## Next steps
74
66
75
67
- Learn how to [view and remediate vulnerabilities for images running on Kubernetes clusters](view-and-remediate-vulnerabilities-for-images.md).
0 commit comments