Skip to content

Commit 3e7659e

Browse files
committed
Remove refs to EKS, update intro, update FAQs
1 parent 80ca6c4 commit 3e7659e

File tree

2 files changed

+18
-107
lines changed

2 files changed

+18
-107
lines changed

articles/defender-for-cloud/defender-for-kubernetes-introduction.md

Lines changed: 18 additions & 105 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,23 @@
11
---
22
title: Microsoft Defender for Kubernetes - the benefits and features
33
description: Learn about the benefits and features of Microsoft Defender for Kubernetes.
4-
ms.date: 11/23/2021
4+
ms.date: 03/10/2022
55
ms.topic: overview
66
---
77

88
# Introduction to Microsoft Defender for Kubernetes (deprecated)
99

1010
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
1111

12-
Microsoft Defender for Cloud provides environment hardening, workload protection, and run-time protections as outlined in [Container security in Defender for Cloud](defender-for-containers-introduction.md).
13-
14-
Defender for Kubernetes protects your Kubernetes clusters whether they're running in:
15-
16-
- **Azure Kubernetes Service (AKS)** - Microsoft's managed service for developing, deploying, and managing containerized applications.
17-
18-
- **Amazon Elastic Kubernetes Service (EKS) in a connected Amazon Web Services (AWS) account** (preview) - Amazon's managed service for running Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane or nodes.
19-
20-
- **An unmanaged Kubernetes distribution** - Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters on premises or on IaaS. Learn more in [Defend Azure Arc-enabled Kubernetes clusters running in on-premises and multi-cloud environments](defender-for-kubernetes-azure-arc.md).
12+
Defender for Cloud provides real-time threat protection for your Azure Kubernetes Service (AKS) containerized environments and generates alerts for suspicious activities. You can use this information to quickly remediate security issues and improve the security of your containers.
2113

14+
Threat protection at the cluster level is provided by the analysis of the Kubernetes audit logs.
2215
Host-level threat detection for your Linux AKS nodes is available if you enable [Microsoft Defender for servers](defender-for-servers-introduction.md) and its Log Analytics agent. However, if your cluster is deployed on an Azure Kubernetes Service virtual machine scale set, the Log Analytics agent is not currently supported.
2316

24-
2517
## Availability
2618

2719
> [!IMPORTANT]
28-
> Microsoft Defender for Kubernetes has been replaced with **Microsoft Defender for Containers**. If you've already enabled Defender for Kubernetes on a subscription, you can continue to use it. However, you won't get Defender for Containers' improvements and new features.
20+
> Microsoft Defender for Kubernetes has been replaced with [**Microsoft Defender for Containers**](defender-for-servers-introduction.md). If you've already enabled Defender for Kubernetes on a subscription, you can continue to use it. However, you won't get Defender for Containers' improvements and new features.
2921
>
3022
> This plan is no longer available for subscriptions where it isn't already enabled.
3123
>
@@ -38,10 +30,10 @@ Host-level threat detection for your Linux AKS nodes is available if you enable
3830

3931
|Aspect|Details|
4032
|----|:----|
41-
|Release state:|General availability (GA)<br>Protections for EKS clusters are preview. [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]|
42-
|Pricing:|**Microsoft Defender for Kubernetes** is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/).<br>**Containers plan** for EKS clusters in connected AWS accounts is free while it's in preview.|
33+
|Release state:|General availability (GA)|
34+
|Pricing:|**Microsoft Defender for Kubernetes** is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/).|
4335
|Required roles and permissions:|**Security admin** can dismiss alerts.<br>**Security reader** can view findings.|
44-
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts (Preview)|
36+
|Clouds:|:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)|
4537
|||
4638

4739
## What are the benefits of Microsoft Defender for Kubernetes?
@@ -50,111 +42,32 @@ Our global team of security researchers constantly monitor the threat landscape.
5042

5143
In addition, Microsoft Defender for Kubernetes provides **cluster-level threat protection** by monitoring your clusters' logs. This means that security alerts are only triggered for actions and deployments that occur *after* you've enabled Defender for Kubernetes on your subscription.
5244

53-
> [!TIP]
54-
> For EKS-based clusters, we monitor the control plane audit logs. These are enabled in the containers plan configuration:
55-
> :::image type="content" source="media/defender-for-kubernetes-intro/eks-audit-logs-enabled.png" alt-text="Screenshot of AWS connector's containers plan with audit logs enabled.":::
56-
5745
Examples of security events that Microsoft Defender for Kubernetes monitors include:
5846

5947
- Exposed Kubernetes dashboards
6048
- Creation of high privileged roles
6149
- Creation of sensitive mounts.
6250

63-
For a full list of the cluster level alerts, see the [reference table of alerts](alerts-reference.md#alerts-k8scluster).
64-
65-
66-
## Protect Azure Kubernetes Service (AKS) clusters
67-
68-
To protect your AKS clusters, enable the Defender plan on the relevant subscription:
69-
70-
1. From Defender for Cloud's menu, open **Environment settings**.
71-
1. Select the relevant subscription.
72-
1. In the **Defender plans** page, set the status of Microsoft Defender for Kubernetes to **On**.
73-
74-
:::image type="content" source="media/defender-for-kubernetes-intro/enable-defender-for-kubernetes.png" alt-text="Screenshot of Microsoft Defender for Kubernetes plan being enabled.":::
75-
76-
1. Select **Save**.
77-
78-
## Protect Amazon Elastic Kubernetes Service clusters
79-
80-
> [!IMPORTANT]
81-
> If you haven't already connected an AWS account, do so now using the instructions in [Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md) and skip to step 3 below.
82-
83-
To protect your EKS clusters, enable the Containers plan on the relevant account connector:
84-
85-
1. From Defender for Cloud's menu, open **Environment settings**.
86-
1. Select the AWS connector.
87-
88-
:::image type="content" source="media/defender-for-kubernetes-intro/select-aws-connector.png" alt-text="Screenshot of Defender for Cloud's environment settings page showing an AWS connector.":::
89-
90-
1. Set the toggle for the **Containers** plan to **On**.
91-
92-
:::image type="content" source="media/defender-for-kubernetes-intro/enable-containers-plan-on-aws-connector.png" alt-text="Screenshot of enabling Defender for Containers for an AWS connector.":::
93-
94-
1. Optionally, to change the retention period for your audit logs, select **Configure**, enter the desired timeframe, and select **Save**.
95-
96-
:::image type="content" source="media/defender-for-kubernetes-intro/adjust-eks-logs-retention.png" alt-text="Screenshot of adjusting the retention period for EKS control pane logs." lightbox="./media/defender-for-kubernetes-intro/adjust-eks-logs-retention.png":::
97-
98-
1. Continue through the remaining pages of the connector wizard.
99-
100-
1. Azure Arc-enabled Kubernetes and the Defender extension should be installed and running on your EKS clusters. A dedicated Defender for Cloud recommendation deploys the extension (and Arc if necessary):
101-
102-
1. From Defender for Cloud's **Recommendations** page, search for **EKS clusters should have Azure Defender's extension for Azure Arc installed**.
103-
1. Select an unhealthy cluster.
104-
105-
> [!IMPORTANT]
106-
> You must select the clusters one at a time.
107-
>
108-
> Don't select the clusters by their hyperlinked names: select anywhere else in the relevant row.
109-
110-
1. Select **Fix**.
111-
1. Defender for Cloud generates a script in the language of your choice: select Bash (for Linux) or PowerShell (for Windows).
112-
1. Select **Download remediation logic**.
113-
1. Run the generated script on your cluster.
114-
115-
:::image type="content" source="media/defender-for-kubernetes-intro/generate-script-defender-extension-kubernetes.gif" alt-text="Video of how to use the Defender for Cloud recommendation to generate a script for your EKS clusters that enables the Azure Arc extension. ":::
116-
117-
### View recommendations and alerts for your EKS clusters
118-
119-
> [!TIP]
120-
> You can simulate container alerts by following the instructions in [this blog post](https://techcommunity.microsoft.com/t5/azure-security-center/how-to-demonstrate-the-new-containers-features-in-azure-security/ba-p/1011270).
121-
122-
To view the alerts and recommendations for your EKS clusters, use the filters on the alerts, recommendations, and inventory pages to filter by resource type **AWS EKS cluster**.
123-
124-
:::image type="content" source="media/defender-for-kubernetes-intro/view-alerts-for-aws-eks-clusters.png" alt-text="Screenshot of how to use filters on Microsoft Defender for Cloud's alerts page to view alerts related to AWS EKS clusters." lightbox="./media/defender-for-kubernetes-intro/view-alerts-for-aws-eks-clusters.png":::
51+
For a full list of the cluster level alerts, see alerts with "K8S.NODE_" prefix in the alert type in the [reference table of alerts](alerts-reference.md#alerts-k8scluster).
12552

12653
## FAQ - Microsoft Defender for Kubernetes
12754

128-
- [Can I still get cluster protections without the Log Analytics agent?](#can-i-still-get-cluster-protections-without-the-log-analytics-agent)
129-
- [Does AKS allow me to install custom VM extensions on my AKS nodes?](#does-aks-allow-me-to-install-custom-vm-extensions-on-my-aks-nodes)
130-
- [If my cluster is already running an Azure Monitor for containers agent, do I need the Log Analytics agent too?](#if-my-cluster-is-already-running-an-azure-monitor-for-containers-agent-do-i-need-the-log-analytics-agent-too)
131-
- [Does Microsoft Defender for Kubernetes support AKS with virtual machine scale set nodes?](#does-microsoft-defender-for-kubernetes-support-aks-with-virtual-machine-scale-set-nodes)
132-
133-
### Can I still get cluster protections without the Log Analytics agent?
134-
135-
**Microsoft Defender for Kubernetes** provides protections at the cluster level. If you also deploy the Log Analytics agent of **Microsoft Defender for servers**, you'll get the threat protection for your nodes that's provided with that plan. Learn more in [Introduction to Microsoft Defender for servers](defender-for-servers-introduction.md).
136-
137-
We recommend deploying both, for the most complete protection possible.
138-
139-
If you choose not to install the agent on your hosts, you'll only receive a subset of the threat protection benefits and security alerts. You'll still receive alerts related to network analysis and communications with malicious servers.
140-
141-
### Does AKS allow me to install custom VM extensions on my AKS nodes?
142-
143-
For Defender for Cloud to monitor your AKS nodes, they must be running the Log Analytics agent.
144-
145-
AKS is a managed service and since the Log Analytics agent is a Microsoft-managed extension, it is also supported on AKS clusters. However, if your cluster is deployed on an Azure Kubernetes Service virtual machine scale set, the Log Analytics agent isn't currently supported.
55+
- [What happens to subscriptions with Microsoft Defender for Kubernetes or Microsoft Defender for Containers enabled?](#what-happens-to-subscriptions-with-microsoft-defender-for-kubernetes-or-microsoft-defender-for-containers-enabled)
56+
- [Is Defender for Containers a mandatory upgrade?](#is-defender-for-containers-a-mandatory-upgrade)
57+
- [Does the new plan reflect a price increase?](#does-the-new-plan-reflect-a-price-increase)
14658

147-
### If my cluster is already running an Azure Monitor for containers agent, do I need the Log Analytics agent too?
59+
### What happens to subscriptions with Microsoft Defender for Kubernetes or Microsoft Defender for Containers enabled?
14860

149-
For Defender for Cloud to monitor your nodes, they must be running the Log Analytics agent.
61+
Subscriptions that already have one of these plans enabled can continue to benefit from it.
15062

151-
If your clusters are already running the Azure Monitor for containers agent, you can install the Log Analytics agent too and the two agents can work alongside one another without any problems.
63+
If you haven't enabled them yet, or create a new subscription, these plans can no longer be enabled.
15264

153-
[Learn more about the Azure Monitor for containers agent](../azure-monitor/containers/container-insights-manage-agent.md).
65+
### Is Defender for Containers a mandatory upgrade?
15466

155-
### Does Microsoft Defender for Kubernetes support AKS with virtual machine scale set nodes?
67+
No. Subscriptions that have either Microsoft Defender for Kubernetes or Microsoft Defender for Containers Registries enabled doesn't need to be upgraded to the new Microsoft Defender for Containers plan. However, they won't benefit from the new and improved capabilities and they’ll have an upgrade icon shown alongside them in the Azure portal.
15668

157-
If your cluster is deployed on an Azure Kubernetes Service virtual machine scale set, the Log Analytics agent is not currently supported.
69+
### Does the new plan reflect a price increase?
70+
No. There’s no direct price increase. The new comprehensive Container security plan combines Kubernetes protection and container registry image scanning, and removes the previous dependency on the (paid) Defender for Servers plan.
15871

15972
## Next steps
16073

articles/defender-for-cloud/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@ landingContent:
4343
url: release-notes.md
4444
- text: Important upcoming changes
4545
url: upcoming-changes.md
46-
- text: Multi-cloud security - Defend AWS EKS clusters
47-
url: defender-for-kubernetes-introduction.md#protect-amazon-elastic-kubernetes-service-clusters
4846
- text: Connect AWS accounts with environment settings
4947
url: quickstart-onboard-aws.md
5048
- text: Threat and vulnerability management vulnerability assessment

0 commit comments

Comments
 (0)