You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md
+3-9Lines changed: 3 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Configure Microsoft Defender for Cloud to automatically assess machines for vulnerabilities
3
-
description: Use Microsoft Defender for Cloud to ensure your machines have a vulnerability assessment solution
2
+
title: Automatically assess machines for vulnerabilities
3
+
description: Use Microsoft Defender for Cloud to automatically ensure your machines have a vulnerability assessment solution
4
4
ms.topic: how-to
5
5
ms.date: 04/24/2023
6
6
---
@@ -36,13 +36,7 @@ To assess your machines for vulnerabilities, you can use one of the following so
36
36
37
37
Learn more in [View and remediate findings from vulnerability assessment solutions on your machines](remediate-vulnerability-findings-vm.md).
38
38
39
-
## Next steps
39
+
## Next step
40
40
41
41
> [!div class="nextstepaction"]
42
42
> [Remediate the discovered vulnerabilities](remediate-vulnerability-findings-vm.md)
43
-
44
-
Defender for Cloud also offers vulnerability assessment for your:
45
-
46
-
- SQL databases - [Explore vulnerability assessment reports in the vulnerability assessment dashboard](defender-for-sql-on-machines-vulnerability-assessment.md#explore-vulnerability-assessment-reports)
47
-
- Azure Container Registry images - [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
48
-
-[Vulnerability assessments for AWS with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-aws.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/common-questions-microsoft-defender-vulnerability-management.md
+1-23Lines changed: 1 addition & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Common questions about the Microsoft Defender Vulnerability Management solution
2
+
title: Microsoft Defender Vulnerability Management FAQ
3
3
description: Answers to common questions on the new Container VA offering powered by Microsoft Defender Vulnerability Management
4
4
ms.topic: faq
5
5
ms.date: 11/30/2023
@@ -29,10 +29,6 @@ No. Each unique image is billed once according to the pricing of the Defender pl
29
29
Vulnerability assessment for container images in the registry is agentless.
30
30
Vulnerability assessment for runtime supports both agentless and agent-based deployment. This approach allows us to provide maximum visibility when vulnerability assessment is enabled, while providing improved refresh rate for image inventory on clusters running our agent.
31
31
32
-
## Is there any difference in supported environments between the Qualys and Microsoft Defender Vulnerability Management powered offerings?
33
-
34
-
Both offerings support registry scan for ACR and ECR as well as runtime vulnerability assessment for AKS and EKS.
35
-
36
32
## How complicated is it to enable container vulnerability assessment powered by Microsoft Defender Vulnerability Management?
37
33
38
34
The Microsoft Defender Vulnerability Management powered offering is already enabled by default in all supported plans. For instructions on how to re-enable Microsoft Defender Vulnerability Management with a single click if you previously disabled this offering, see [Enabling vulnerability assessments powered by Microsoft Defender Vulnerability Management](enable-vulnerability-assessment.md).
@@ -41,24 +37,6 @@ The Microsoft Defender Vulnerability Management powered offering is already enab
41
37
42
38
In Azure, new images are typically scanned in a few minutes, and it might take up to an hour in rare cases. In AWS, new images are typically scanned within a few hours, and might take up to a day in rare cases.
43
39
44
-
## Is there any difference between scanning criteria for the Qualys and Microsoft Defender Vulnerability Management offerings?
45
-
46
-
Container vulnerability assessment powered by Microsoft Defender Vulnerability Management for Azure supports all scan triggers supported by Qualys, and in addition also supports scanning of all images pushed in the last 90 days to a registry. For more information, see [scanning triggers for Microsoft Defender Vulnerability Management for Azure](agentless-vulnerability-assessment-azure.md#scan-triggers). Container vulnerability assessment powered by Microsoft Defender Vulnerability Management for AWS supports a subset of the scanning criteria. For more information, see [scanning triggers for Microsoft Defender Vulnerability Management for AWS](agentless-vulnerability-assessment-aws.md#scan-triggers).
47
-
48
-
## Is there a difference in rescan period between the Qualys and Microsoft Defender Vulnerability Management offerings?
49
-
50
-
Vulnerability assessments performed using the Qualys scanner are refreshed weekly.
51
-
Vulnerability assessments performed using the Microsoft Defender Vulnerability Management scanner are refreshed daily. For Defender for Container Registries (deprecated), rescan period is once every 7 days for vulnerability assessments performed by both the Qualys and Microsoft Defender Vulnerability Management scanner.
52
-
53
-
## Is there any difference between the OS and language packages covered by the Qualys and Microsoft Defender Vulnerability Management offerings?
54
-
55
-
Container vulnerability assessment powered by Microsoft Defender Vulnerability Management supports all OS packages and language packages supported by Qualys except FreeBSD. In addition, the offering powered by Microsoft Defender Vulnerability Management also provides support for Red Hat Enterprise version 8 and 9, CentOS versions 8 and 9, Oracle Linux 9, openSUSE Tumbleweed, Debian 12, Fedora 36 and 37, and CBL-Mariner 1 and 2.
56
-
There's no difference for coverage of language specific packages between the Qualys and Microsoft Defender Vulnerability Management powered offerings.
57
-
58
-
-[Full list of supported packages and their versions for Microsoft Defender Vulnerability Management](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management)
59
-
60
-
-[Full list of supported packages and their versions for Qualys](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-qualys-deprecated)
61
-
62
40
## Are there any other capabilities that are unique to the Microsoft Defender Vulnerability Management powered offering?
63
41
64
42
- Each reported vulnerability is enriched with real-world exploit exploitability insights, helping customers prioritize remediation of vulnerabilities with known exploit methods and exploitability tools. Exploit sources include CISA key, exploit DB, Microsoft Security Response Center, and more.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/custom-dashboards-azure-workbooks.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Use Azure Monitor gallery workbooks with Defender for Cloud data
2
+
title: Azure Monitor workbooks with Defender for Cloud data
3
3
description: Learn how to create rich, interactive reports for your Microsoft Defender for Cloud data by using workbooks from the integrated Azure Monitor workbooks gallery.
4
4
ms.topic: conceptual
5
5
ms.author: dacurwin
@@ -114,8 +114,6 @@ Defender for Cloud includes vulnerability scanners for your machines, containers
114
114
Learn more about using these scanners:
115
115
116
116
-[Find vulnerabilities with Microsoft Defender Vulnerability Management](deploy-vulnerability-assessment-defender-vulnerability-management.md)
117
-
-[Find vulnerabilities with the integrated Qualys scanner](deploy-vulnerability-assessment-vm.md)
118
-
-[Scan your ACR images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
119
117
-[Scan your SQL resources for vulnerabilities](defender-for-sql-on-machines-vulnerability-assessment.md)
120
118
121
119
Findings for each resource type are reported in separate recommendations:
@@ -202,7 +200,7 @@ The DevOps Security workbook provides a customizable visual report of your DevOp
202
200
:::image type="content" source="media/custom-dashboards-azure-workbooks/devops-workbook.png" alt-text="Screenshot that shows a sample results page after you select the DevOps workbook." lightbox="media/custom-dashboards-azure-workbooks/devops-workbook.png":::
203
201
204
202
> [!NOTE]
205
-
> To use this workbork, your environment must have a [GitHub connector](quickstart-onboard-github.md), [GitLab connector](quickstart-onboard-gitlab.md), or [Azure DevOps connector](quickstart-onboard-devops.md).
203
+
> To use this workbook, your environment must have a [GitHub connector](quickstart-onboard-github.md), [GitLab connector](quickstart-onboard-gitlab.md), or [Azure DevOps connector](quickstart-onboard-devops.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-container-registries-introduction.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,9 +40,9 @@ To protect the Azure Resource Manager based registries in your subscription, ena
40
40
41
41
Defender for Cloud identifies Azure Resource Manager based ACR registries in your subscription and seamlessly provides Azure-native vulnerability assessment and management for your registry's images.
42
42
43
-
**Microsoft Defender for container registries** includes a vulnerability scanner to scan the images in your Azure Resource Manager-based Azure Container Registry registries and provide deeper visibility into your images' vulnerabilities. The integrated scanner is powered by Qualys, the industry-leading vulnerability scanning vendor.
43
+
**Microsoft Defender for container registries** includes a vulnerability scanner to scan the images in your Azure Resource Manager-based Azure Container Registry registries and provide deeper visibility into your images' vulnerabilities.
44
44
45
-
When issues are found – by Qualys or Defender for Cloud – you'll get notified in the workload protection dashboard. For every vulnerability, Defender for Cloud provides actionable recommendations, along with a severity classification, and guidance for how to remediate the issue. For details of Defender for Cloud's recommendations for containers, see the [reference list of recommendations](recommendations-reference.md#container-recommendations).
45
+
When issues are found, you'll get notified in the workload protection dashboard. For every vulnerability, Defender for Cloud provides actionable recommendations, along with a severity classification, and guidance for how to remediate the issue. For details of Defender for Cloud's recommendations for containers, see the [reference list of recommendations](recommendations-reference.md#container-recommendations).
46
46
47
47
Defender for Cloud filters and classifies findings from the scanner. When an image is healthy, Defender for Cloud marks it as such. Defender for Cloud generates security recommendations only for images that have issues to be resolved. Defender for Cloud provides details of each reported vulnerability and a severity classification. Additionally, it gives guidance for how to remediate the specific vulnerabilities found on each image.
48
48
@@ -72,7 +72,7 @@ Below is a high-level diagram of the components and benefits of protecting your
72
72
73
73
### How does Defender for Cloud scan an image?
74
74
75
-
Defender for Cloud pulls the image from the registry and runs it in an isolated sandbox with the Qualys scanner. The scanner extracts a list of known vulnerabilities.
75
+
Defender for Cloud pulls the image from the registry and runs it in an isolated sandbox with the scanner. The scanner extracts a list of known vulnerabilities.
76
76
77
77
Defender for Cloud filters and classifies findings from the scanner. When an image is healthy, Defender for Cloud marks it as such. Defender for Cloud generates security recommendations only for images that have issues to be resolved. By only notifying you when there are problems, Defender for Cloud reduces the potential for unwanted informational alerts.
78
78
@@ -90,7 +90,7 @@ If you connect unsupported registries to your Azure subscription, Defender for C
90
90
91
91
Yes. If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
92
92
93
-
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](defender-for-containers-vulnerability-assessment-azure.md#disable-specific-findings).
93
+
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](disable-vulnerability-findings-containers.md).
94
94
95
95
### Why is Defender for Cloud alerting me to vulnerabilities about an image that isn’t in my registry?
96
96
@@ -99,4 +99,4 @@ Defender for Cloud provides vulnerability assessments for every image pushed or
99
99
## Next steps
100
100
101
101
> [!div class="nextstepaction"]
102
-
> [Scan your images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
102
+
> [Scan your images for vulnerabilities](agentless-vulnerability-assessment-azure.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-introduction.md
-5Lines changed: 0 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,11 +68,6 @@ Defender for Containers scans the container images in Azure Container Registry (
68
68
69
69
Vulnerability information powered by Microsoft Defender Vulnerability Management is added to the [cloud security graph](concept-attack-path.md#what-is-cloud-security-graph) for contextual risk, calculation of attack paths, and hunting capabilities.
70
70
71
-
> [!NOTE]
72
-
> The Qualys offering is only available to customers who onboarded to Defender for Containers before November 15, 2023.
73
-
74
-
There are two solutions for vulnerability assessment in Azure, one powered by Microsoft Defender Vulnerability Management and one powered by Qualys.
75
-
76
71
Learn more about:
77
72
78
73
-[Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md)
0 commit comments