You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](disable-vulnerability-findings-containers.md).
35
35
-**Support for disabling vulnerabilities** - Learn how to [disable vulnerabilities on images](disable-vulnerability-findings-containers.md).
36
36
37
-
## Scan Triggers
37
+
## Scan triggers
38
38
39
39
The triggers for an image scan are:
40
40
@@ -52,15 +52,15 @@ The triggers for an image scan are:
52
52
53
53
A detailed description of the scan process is described as follows:
54
54
55
-
1. When you enable the [container vulnerability assessment for Azure powered by MDVM](enable-vulnerability-assessment.md), you authorize Defender for Cloud to scan container images in your Azure Container registries.
56
-
1. Defender for Cloud automatically discovers all containers registries, repositories and images (created before or after enabling this capability).
57
-
1. Defender for Cloud receives notifications whenever a new image is pushed to an Azure Container Registry. The new image is then immediately added to the catalog of images Defender for Cloud maintains, and queues an action to scan the image immediately.
58
-
1. Once a day, or when an image is pushed to a registry:
55
+
- When you enable the [container vulnerability assessment for Azure powered by MDVM](enable-vulnerability-assessment.md), you authorize Defender for Cloud to scan container images in your Azure Container registries.
56
+
- Defender for Cloud automatically discovers all containers registries, repositories and images (created before or after enabling this capability).
57
+
- Defender for Cloud receives notifications whenever a new image is pushed to an Azure Container Registry. The new image is then immediately added to the catalog of images Defender for Cloud maintains, and queues an action to scan the image immediately.
58
+
- Once a day, or when an image is pushed to a registry:
59
59
60
-
1. All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.
61
-
1. Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile)
62
-
1. Vulnerability reports for container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
63
-
1. For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
60
+
- All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.
61
+
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile)
62
+
- Vulnerability reports for container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
63
+
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
64
64
65
65
> [!NOTE]
66
66
> For Defender for Container Registries (deprecated), images are scanned once on push, and rescanned only once a week.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/enable-vulnerability-assessment.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,17 @@
1
1
---
2
2
title: Enable vulnerability assessment in Azure powered by MDVM
3
-
description: Learn how to enable vulnerability assessment in Azure powered by MDVM
3
+
description: Learn how to enable vulnerability assessment in Azure powered by Microsoft Defender Vulnerability Management (MDVM)
4
4
ms.service: defender-for-cloud
5
5
ms.topic: how-to
6
6
ms.date: 07/20/2023
7
7
---
8
8
9
9
# Enable vulnerability assessment in Azure powered by MDVM
10
10
11
+
Vulnerability assessment for Azure, powered by Microsoft Defender Vulnerability Management (MDVM), is an out-of-box solution that empowers security teams to easily discover and remediate vulnerabilities in Linux container images, with zero configuration for onboarding, and without deployment of any agents.
12
+
13
+
## How to enable vulnerability assessment in Azure powered by MDVM
14
+
11
15
1. Before starting, verify that the subscription is [onboarded to Defender CSPM](tutorial-enable-cspm-plan.md), [Defender for Containers](tutorial-enable-containers-azure.md) or [Defender for Container Registries](defender-for-container-registries-introduction.md).
12
16
1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page.
13
17
@@ -17,7 +21,7 @@ ms.date: 07/20/2023
17
21
18
22
1. Select **Continue**.
19
23
20
-
:::image type="content" source="media/concept-agentless-containers/select-container-registries-vunlerability-assessments.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/select-container-registries-vunlerability-assessments.png":::
24
+
:::image type="content" source="media/concept-agentless-containers/select-container-registries-vulnerability-assessments.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/select-container-registries-vulnerability-assessments.png":::
21
25
22
26
1. Select **Save**.
23
27
@@ -29,7 +33,7 @@ A notification message pops up in the top right corner that will verify that the
29
33
- For Defender for Containers, use the Defender for Containers agent. For more information, see [Deploy the Defender profile in Azure](tutorial-enable-containers-azure.md#deploy-the-defender-profile-in-azure).
30
34
- For Defender for Container Registries, there is no runtime coverage.
31
35
32
-
## Next Steps
36
+
## Next steps
33
37
34
38
- Learn more about [Trusted Access](/azure/aks/trusted-access-feature).
35
39
- Learn how to [view and remediate vulnerability assessment findings for registry images and running images](view-and-remediate-vulnerability-assessment-findings.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,9 +40,9 @@ July 31, 2023
40
40
41
41
We're announcing the release of Vulnerability Assessment (VA) for Linux container images in Azure container registries powered by Microsoft Defender Vulnerability Management (MDVM) in Defender for Containers and Defender for Container Registries. The new container VA offering will be provided alongside our existing Container VA offering powered by Qualys in both Defender for Containers and Defender for Container Registries, and include daily rescans of container images, exploitability information, support for OS and programming languages (SCA) and more.
42
42
43
-
This new offering will start rolling out today, and will be available to all customers By August 7.
43
+
This new offering will start rolling out today, and is expected to be available to all customers By August 7.
44
44
45
-
For more information, see [Container Vulnerability Assesment powered by MDVM](agentless-container-registry-vulnerability-assessment.md) and [Microsoft Defender Vulnerability Management (MDVM)](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management).
45
+
For more information, see [Container Vulnerability Assessment powered by MDVM](agentless-container-registry-vulnerability-assessment.md) and [Microsoft Defender Vulnerability Management (MDVM)](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management).
46
46
47
47
### Agentless container posture in Defender CSPM is now Generally Available
0 commit comments