Skip to content

Commit 2d1caab

Browse files
move exemption par
move to how to
1 parent 5fab4b8 commit 2d1caab

File tree

2 files changed

+7
-5
lines changed

2 files changed

+7
-5
lines changed

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ Agentless Container Posture provides the following capabilities:
2222
- Using Kubernetes [attack path analysis](concept-attack-path.md) to visualize risks and threats to Kubernetes environments.
2323
- Using [cloud security explorer](how-to-manage-cloud-security-explorer.md) for risk hunting by querying various risk scenarios.
2424
- Viewing security insights, such as internet exposure, and other predefined security scenarios. For more information, search for `Kubernetes` in the [list of Insights](attack-path-reference.md#insights).
25-
- [Support for exemptions](#support-for-exemptions): create exemptions for specific vulnerability assessment findings.
2625

2726

2827
## Agentless discovery and visibility within Kubernetes components
@@ -78,7 +77,8 @@ Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerabi
7877
| Container registry images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management) | Container image vulnerability assessment scans your registry for security vulnerabilities and exposes detailed findings for each image. Resolving the vulnerabilities can greatly improve your containers' security posture and protect them from attacks. |
7978

8079
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via the ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
81-
- **Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [sub-assessment list](/rest/api/defenderforcloud/sub-assessments/get?tabs=HTTP).
80+
- **Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [sub-assessment list](/rest/api/defenderforcloud/sub-assessments/get?tabs=HTTP).
81+
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](how-to-enable-agentless-containers.md#support-for-exemptions)
8282

8383
### Scan Triggers
8484

@@ -100,9 +100,6 @@ Container registry vulnerability assessment scans container images stored in you
100100
1. Vulnerability reports for known vulnerabilities (CVEs) are generated for each software that is present on an image inventory.
101101
1. Vulnerability reports are refreshed daily for any image pushed during the last 90 days to a registry or currently running on a Kubernetes cluster monitored by Defender CSPM Agentless discovery and visibility for Kubernetes, or monitored by the Defender for Containers agent (profile or extension).
102102

103-
## Support for exemptions
104-
105-
You can customize your vulnerability assessment experience by exempting management groups, subscriptions, or specific resources from your secure score. Learn how to [create an exemption](exempt-resource.md) for a resource or subscription.
106103

107104
## Next steps
108105
- Learn about [support and prerequisites for agentless containers posture](support-agentless-containers-posture.md)

articles/defender-for-cloud/how-to-enable-agentless-containers.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,5 +39,10 @@ If you don't see results from your clusters, check the following:
3939
## What do I do if I have stopped clusters?
4040
We suggest that you rerun the cluster to solve this issue.
4141

42+
## Support for exemptions
43+
44+
You can customize your vulnerability assessment experience by exempting management groups, subscriptions, or specific resources from your secure score. Learn how to [create an exemption](exempt-resource.md) for a resource or subscription.
45+
4246
## Next Steps
4347
Learn how to [view and remediate vulnerability assessment findings for registry images and running images](view-and-remediate-vulnerability-assessment-findings.md).
48+

0 commit comments

Comments
 (0)