You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md
+16-10Lines changed: 16 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Identify vulnerabilities in Azure Container Registry with Microsoft Defen
3
3
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
4
4
author: dcurwin
5
5
ms.author: dacurwin
6
-
ms.date: 05/14/2023
6
+
ms.date: 05/28/2023
7
7
ms.topic: how-to
8
8
ms.custom: ignite-2022, build-2023
9
9
---
@@ -29,17 +29,18 @@ The triggers for an image scan are:
29
29
- Continuous scan for running images. This scan is performed every seven days for as long as the image runs. This mode runs instead of the above mode when the Defender profile, or extension is running on the cluster.
30
30
31
31
Once a scan is triggered, scan results will typically appear in the Defender for Cloud recommendations after a few minutes, but in some cases it may take up to an hour.
32
+
32
33
## Prerequisites
33
34
34
35
Before you can scan your ACR images:
35
36
36
37
- You must enable one of the following plans on your subscription:
37
38
38
-
-[Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
39
-
-[Defender for Containers](defender-for-containers-enable.md).
39
+
-[Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
40
+
-[Defender for Containers](defender-for-containers-enable.md).
40
41
41
-
>[!NOTE]
42
-
> This feature is charged per image. Learn more about the [pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/)
42
+
>[!NOTE]
43
+
> This feature is charged per image. Learn more about the [pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
43
44
44
45
To find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
45
46
@@ -71,8 +72,6 @@ For a list of the types of images and container registries supported by Microsof
71
72
72
73
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/container-registry-details.png" alt-text="Screenshot showing select specific image to see vulnerabilities." lightbox="media/defender-for-containers-vulnerability-assessment-azure/container-registry-details.png":::
73
74
74
-
75
-
76
75
The repository details page opens. It lists the vulnerable images together with an assessment of the severity of the findings.
77
76
78
77
1. Select a specific image to see the vulnerabilities.
@@ -146,15 +145,14 @@ To create a rule:
146
145
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Screenshot showing the scope list.":::
147
146
1. To view or delete the rule, select the ellipsis menu ("...").
148
147
149
-
## View vulnerabilities for images running on your AKS clusters
148
+
## View vulnerabilities for images running on your AKS clusters
150
149
151
150
Defender for Cloud gives its customers the ability to prioritize the remediation of vulnerabilities in images that are currently being used within their environment using the [Running container images should have vulnerability findings resolved-(powered by Qualys)](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false) recommendation.
152
151
153
152
To provide findings for the recommendation, Defender for Cloud collects the inventory of your running containers that are collected by the Defender agent installed on your AKS clusters. Defender for Cloud correlates that inventory with the vulnerability assessment scan of images that are stored in ACR. The recommendation shows your running containers with the vulnerabilities associated with the images that are used by each container and provides vulnerability reports and remediation steps.
154
153
155
154
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png" alt-text="Screenshot of recommendations showing your running containers with the vulnerabilities associated with the images used by each container." lightbox="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png":::
156
155
157
-
158
156
## FAQ
159
157
160
158
### How does Defender for Containers scan an image?
@@ -163,9 +161,17 @@ Defender for Containers pulls the image from the registry and runs it in an isol
163
161
164
162
Defender for Cloud filters and classifies findings from the scanner. When an image is healthy, Defender for Cloud marks it as such. Defender for Cloud generates security recommendations only for images that have issues to be resolved. By only notifying you when there are problems, Defender for Cloud reduces the potential for unwanted informational alerts.
165
163
164
+
### How can I identify pull events performed by the scanner?
165
+
166
+
To identify pull events performed by the scanner, do the following steps:
167
+
168
+
1. Search for pull events with the UserAgent of *AzureContainerImageScanner*.
169
+
1. Extract the identity associated with this event.
170
+
1. Use the extracted identity to identify pull events from the scanner.
171
+
166
172
### What is the difference between Not Applicable Resources and Unverified Resources?
167
173
168
-
-**Not applicable resources** are resources for which the recommendation can't give a definitive answer. The not applicable tab includes reasons for each resource that could not be assessed.
174
+
-**Not applicable resources** are resources for which the recommendation can't give a definitive answer. The not applicable tab includes reasons for each resource that could not be assessed.
169
175
-**Unverified resources** are resources that have been scheduled to be assessed, but have not been assessed yet.
170
176
171
177
### Does Microsoft share any information with Qualys in order to perform image scans?
0 commit comments