You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/built-in-vulnerability-assessment.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,14 +10,16 @@ ms.devlang: na
10
10
ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: na
13
-
ms.date: 12/13/2019
13
+
ms.date: 03/22/2020
14
14
ms.author: memildin
15
15
16
16
---
17
17
18
18
# Integrated vulnerability scanner for virtual machines (Standard tier only)
19
19
20
-
The vulnerability scanner included with Azure Security Center is powered by Qualys and widely recognized as the leading tool for identifying vulnerabilities in real time across your Azure Virtual Machines. It's only available to users on the standard pricing tier. This feature is currently in preview.
20
+
The vulnerability scanner included with Azure Security Center is powered by Qualys. Qualys's scanner is the leading tool for real-time identification of vulnerabilities in your Azure Virtual Machines. It's only available to users on the standard pricing tier. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
21
+
22
+
This feature is currently in preview.
21
23
22
24
> [!NOTE]
23
25
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md).
@@ -38,7 +40,7 @@ To deploy the vulnerability scanner extension:
38
40
39
41
***Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
40
42
***Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
41
-
***Not applicable resources** – these VMs can’t have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
43
+
***Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
42
44
43
45
- All versions of Windows
44
46
- Red Hat Enterprise Linux 6.7, 7.6
@@ -54,11 +56,11 @@ To deploy the vulnerability scanner extension:
54
56
55
57
The scanner extension will be installed on all of the selected VMs.
56
58
57
-
Scanning begins automatically as soon as the extension is successfully deployed.
59
+
Scanning begins automatically as soon as the extension is successfully deployed. Scans will then run at four-hour intervals. This interval is hard-coded and not configurable.
58
60
59
61
## Viewing and remediating discovered vulnerabilities
60
62
61
-
When Security Center identifies vulnerabilities, it presents findings and related information (remediation steps, related CVEs, CVSS scores, and more) as recommendations. You can view the identified vulnerabilities for one or more subscriptions, or for a specific virtual machine.
63
+
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific virtual machine.
62
64
63
65
To see the findings and remediate the identified vulnerability:
64
66
@@ -108,9 +110,9 @@ You'll need the following details:
108
110
* On Windows, the extension is called "WindowsAgent.AzureSecurityCenter" and provider name is "Qualys"
109
111
110
112
### How does the extension get updated?
111
-
Like the Azure Security Center agent as well as all Azure extensions, minor versions of the Qualys scanner may be automatically updated in the background. All agents and extensions are tested extensively before being automatically deployed.
113
+
Like the Azure Security Center agent itself and all other Azure extensions, minor updates of the Qualys scanner may automatically happen in the background. All agents and extensions are tested extensively before being automatically deployed.
112
114
113
-
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you are running v1.0.0.4, you must take the following steps**:
115
+
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you're running v1.0.0.4, you must take the following steps**:
114
116
115
117
1. Verify the version of the Qualys vulnerability scanner extension running on your VM:
116
118
@@ -135,7 +137,7 @@ When you open the recommendation, you'll see your VMs in one or more of the foll
135
137
136
138
-**Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
137
139
-**Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
138
-
-**Not applicable resources** – These VMs can’t have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
140
+
-**Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
139
141
140
142
- All versions of Windows
141
143
- Red Hat Enterprise Linux 6.7, 7.6
@@ -146,15 +148,15 @@ When you open the recommendation, you'll see your VMs in one or more of the foll
146
148
- Debian 7, 8
147
149
148
150
### What is scanned by the built-in vulnerability scanner?
149
-
The scanner is running on your virtual machine and looking for vulnerabilities of the VM itself. From the virtual machine, it cannot scan your network.
151
+
The scanner is running on your virtual machine and looking for vulnerabilities of the VM itself. From the virtual machine, it can't scan your network.
150
152
151
153
### Does the scanner integrate with my existing Qualys console?
152
154
The Security Center extension is a separate tool from your existing Qualys scanner and, because of licensing restrictions, can only be used within Azure Security Center.
153
155
154
156
### Microsoft Defender Advanced Threat Protection also includes Threat & Vulnerability Management (TVM). How is the Security Center Vulnerability Assessment extension different?
155
-
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATP’s Threat & Vulnerability Management solution, built into Windows.
157
+
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATP's Threat & Vulnerability Management solution, built into Windows.
156
158
157
-
Today, Azure Security Center’s Vulnerability Assessment extension is powered by Qualys. This ensures support for both Windows and Linux virtual machines. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
159
+
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. This ensures support for both Windows and Linux virtual machines. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
158
160
159
161
## Next steps
160
162
This article described the Azure Security Center Vulnerability Assessment extension (powered by Qualys) for scanning your VMs. For related material, see the following articles:
0 commit comments