Skip to content

Commit 35762d1

Browse files
Merge pull request #239192 from dcurwin/image-scan-may24-2023
Identifying pull events
2 parents 3e831a4 + c07adc2 commit 35762d1

File tree

1 file changed

+16
-10
lines changed

1 file changed

+16
-10
lines changed

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Identify vulnerabilities in Azure Container Registry with Microsoft Defen
33
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 05/14/2023
6+
ms.date: 05/28/2023
77
ms.topic: how-to
88
ms.custom: ignite-2022, build-2023
99
---
@@ -29,17 +29,18 @@ The triggers for an image scan are:
2929
- Continuous scan for running images. This scan is performed every seven days for as long as the image runs. This mode runs instead of the above mode when the Defender profile, or extension is running on the cluster.
3030

3131
Once a scan is triggered, scan results will typically appear in the Defender for Cloud recommendations after a few minutes, but in some cases it may take up to an hour.
32+
3233
## Prerequisites
3334

3435
Before you can scan your ACR images:
3536

3637
- You must enable one of the following plans on your subscription:
3738

38-
- [Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
39-
- [Defender for Containers](defender-for-containers-enable.md).
39+
- [Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
40+
- [Defender for Containers](defender-for-containers-enable.md).
4041

41-
>[!NOTE]
42-
> This feature is charged per image. Learn more about the [pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/)
42+
>[!NOTE]
43+
> This feature is charged per image. Learn more about the [pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/).
4344
4445
To find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
4546

@@ -71,8 +72,6 @@ For a list of the types of images and container registries supported by Microsof
7172

7273
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/container-registry-details.png" alt-text="Screenshot showing select specific image to see vulnerabilities." lightbox="media/defender-for-containers-vulnerability-assessment-azure/container-registry-details.png":::
7374

74-
75-
7675
The repository details page opens. It lists the vulnerable images together with an assessment of the severity of the findings.
7776

7877
1. Select a specific image to see the vulnerabilities.
@@ -146,15 +145,14 @@ To create a rule:
146145
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Screenshot showing the scope list.":::
147146
1. To view or delete the rule, select the ellipsis menu ("...").
148147

149-
## View vulnerabilities for images running on your AKS clusters
148+
## View vulnerabilities for images running on your AKS clusters
150149

151150
Defender for Cloud gives its customers the ability to prioritize the remediation of vulnerabilities in images that are currently being used within their environment using the [Running container images should have vulnerability findings resolved-(powered by Qualys)](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false) recommendation.
152151

153152
To provide findings for the recommendation, Defender for Cloud collects the inventory of your running containers that are collected by the Defender agent installed on your AKS clusters. Defender for Cloud correlates that inventory with the vulnerability assessment scan of images that are stored in ACR. The recommendation shows your running containers with the vulnerabilities associated with the images that are used by each container and provides vulnerability reports and remediation steps.
154153

155154
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png" alt-text="Screenshot of recommendations showing your running containers with the vulnerabilities associated with the images used by each container." lightbox="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png":::
156155

157-
158156
## FAQ
159157

160158
### How does Defender for Containers scan an image?
@@ -163,9 +161,17 @@ Defender for Containers pulls the image from the registry and runs it in an isol
163161

164162
Defender for Cloud filters and classifies findings from the scanner. When an image is healthy, Defender for Cloud marks it as such. Defender for Cloud generates security recommendations only for images that have issues to be resolved. By only notifying you when there are problems, Defender for Cloud reduces the potential for unwanted informational alerts.
165163

164+
### How can I identify pull events performed by the scanner?
165+
166+
To identify pull events performed by the scanner, do the following steps:
167+
168+
1. Search for pull events with the UserAgent of *AzureContainerImageScanner*.
169+
1. Extract the identity associated with this event.
170+
1. Use the extracted identity to identify pull events from the scanner.
171+
166172
### What is the difference between Not Applicable Resources and Unverified Resources?
167173

168-
- **Not applicable resources** are resources for which the recommendation can't give a definitive answer. The not applicable tab includes reasons for each resource that could not be assessed.
174+
- **Not applicable resources** are resources for which the recommendation can't give a definitive answer. The not applicable tab includes reasons for each resource that could not be assessed.
169175
- **Unverified resources** are resources that have been scheduled to be assessed, but have not been assessed yet.
170176

171177
### Does Microsoft share any information with Qualys in order to perform image scans?

0 commit comments

Comments
 (0)