File tree Expand file tree Collapse file tree 1 file changed +5
-3
lines changed
articles/defender-for-cloud Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Original file line number Diff line number Diff line change @@ -45,7 +45,7 @@ All of these capabilities are available as part of the [Defender Cloud Security
45
45
46
46
You need to have a Defender for CSPM plan enabled. There's no dependency on Defender for Containers.
47
47
48
- Learn more about [ trusted versions that AKS supports ] ( /azure/aks/supported-kubernetes-versions?tabs=azure-cli ) .
48
+ This feature uses trusted access. Learn more about [ AKS trusted access prerequisites ] ( /azure/aks/trusted-access-feature.md#prerequisites ) .
49
49
50
50
## Onboard Agentless Containers for CSPM
51
51
@@ -67,13 +67,15 @@ Onboarding Agentless Containers for CSPM will allow you to gain wide visibility
67
67
68
68
A notification message pops up in the top right corner that will verify that the settings were saved successfully.
69
69
70
- ### Container registries vulnerability assessments recommendations
70
+ ## Agentless Container Posture extensions
71
+
72
+ ### Container registries vulnerability assessments
71
73
72
74
For container registries vulnerability assessments, recommendations are available based on the vulnerability assessment timeline.
73
75
74
76
Learn more about [ image scanning] ( defender-for-containers-vulnerability-assessment-azure.md ) .
75
77
76
- ### How Agentless discovery for Kubernetes works
78
+ ### Agentless discovery for Kubernetes
77
79
78
80
The system’s architecture is based on a snapshot mechanism at intervals.
79
81
You can’t perform that action at this time.
0 commit comments