Skip to content

Commit 440c2ec

Browse files
author
David Curwin
committed
updates after review
1 parent 4295d02 commit 440c2ec

File tree

4 files changed

+18
-14
lines changed

4 files changed

+18
-14
lines changed

articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerabi
3434
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](disable-vulnerability-findings-containers.md).
3535
- **Support for disabling vulnerabilities** - Learn how to [disable vulnerabilities on images](disable-vulnerability-findings-containers.md).
3636

37-
## Scan Triggers
37+
## Scan triggers
3838

3939
The triggers for an image scan are:
4040

@@ -52,15 +52,15 @@ The triggers for an image scan are:
5252

5353
A detailed description of the scan process is described as follows:
5454

55-
1. When you enable the [container vulnerability assessment for Azure powered by MDVM](enable-vulnerability-assessment.md), you authorize Defender for Cloud to scan container images in your Azure Container registries.
56-
1. Defender for Cloud automatically discovers all containers registries, repositories and images (created before or after enabling this capability).
57-
1. Defender for Cloud receives notifications whenever a new image is pushed to an Azure Container Registry. The new image is then immediately added to the catalog of images Defender for Cloud maintains, and queues an action to scan the image immediately.
58-
1. Once a day, or when an image is pushed to a registry:
55+
- When you enable the [container vulnerability assessment for Azure powered by MDVM](enable-vulnerability-assessment.md), you authorize Defender for Cloud to scan container images in your Azure Container registries.
56+
- Defender for Cloud automatically discovers all containers registries, repositories and images (created before or after enabling this capability).
57+
- Defender for Cloud receives notifications whenever a new image is pushed to an Azure Container Registry. The new image is then immediately added to the catalog of images Defender for Cloud maintains, and queues an action to scan the image immediately.
58+
- Once a day, or when an image is pushed to a registry:
5959

60-
1. All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.​
61-
1. Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile)
62-
1. Vulnerability reports for container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
63-
1. For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
60+
- All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.​
61+
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile)
62+
- Vulnerability reports for container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
63+
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
6464

6565
> [!NOTE]
6666
> For Defender for Container Registries (deprecated), images are scanned once on push, and rescanned only once a week.

articles/defender-for-cloud/enable-vulnerability-assessment.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,17 @@
11
---
22
title: Enable vulnerability assessment in Azure powered by MDVM
3-
description: Learn how to enable vulnerability assessment in Azure powered by MDVM
3+
description: Learn how to enable vulnerability assessment in Azure powered by Microsoft Defender Vulnerability Management (MDVM)
44
ms.service: defender-for-cloud
55
ms.topic: how-to
66
ms.date: 07/20/2023
77
---
88

99
# Enable vulnerability assessment in Azure powered by MDVM
1010

11+
Vulnerability assessment for Azure, powered by Microsoft Defender Vulnerability Management (MDVM), is an out-of-box solution that empowers security teams to easily discover and remediate vulnerabilities in Linux container images, with zero configuration for onboarding, and without deployment of any agents.
12+
13+
## How to enable vulnerability assessment in Azure powered by MDVM
14+
1115
1. Before starting, verify that the subscription is [onboarded to Defender CSPM](tutorial-enable-cspm-plan.md), [Defender for Containers](tutorial-enable-containers-azure.md) or [Defender for Container Registries](defender-for-container-registries-introduction.md).
1216
1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page.
1317

@@ -17,7 +21,7 @@ ms.date: 07/20/2023
1721

1822
1. Select **Continue**.
1923

20-
:::image type="content" source="media/concept-agentless-containers/select-container-registries-vunlerability-assessments.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/select-container-registries-vunlerability-assessments.png":::
24+
:::image type="content" source="media/concept-agentless-containers/select-container-registries-vulnerability-assessments.png" alt-text="Screenshot of selecting agentless discovery for Kubernetes and Container registries vulnerability assessments." lightbox="media/concept-agentless-containers/select-container-registries-vulnerability-assessments.png":::
2125

2226
1. Select **Save**.
2327

@@ -29,7 +33,7 @@ A notification message pops up in the top right corner that will verify that the
2933
- For Defender for Containers, use the Defender for Containers agent. For more information, see [Deploy the Defender profile in Azure](tutorial-enable-containers-azure.md#deploy-the-defender-profile-in-azure).
3034
- For Defender for Container Registries, there is no runtime coverage.
3135

32-
## Next Steps
36+
## Next steps
3337

3438
- Learn more about [Trusted Access](/azure/aks/trusted-access-feature).
3539
- Learn how to [view and remediate vulnerability assessment findings for registry images and running images](view-and-remediate-vulnerability-assessment-findings.md).

articles/defender-for-cloud/release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@ July 31, 2023
4040

4141
We're announcing the release of Vulnerability Assessment (VA) for Linux container images in Azure container registries powered by Microsoft Defender Vulnerability Management (MDVM) in Defender for Containers and Defender for Container Registries. The new container VA offering will be provided alongside our existing Container VA offering powered by Qualys in both Defender for Containers and Defender for Container Registries, and include daily rescans of container images, exploitability information, support for OS and programming languages (SCA) and more.
4242

43-
This new offering will start rolling out today, and will be available to all customers By August 7.
43+
This new offering will start rolling out today, and is expected to be available to all customers By August 7.
4444

45-
For more information, see [Container Vulnerability Assesment powered by MDVM](agentless-container-registry-vulnerability-assessment.md) and [Microsoft Defender Vulnerability Management (MDVM)](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management).
45+
For more information, see [Container Vulnerability Assessment powered by MDVM](agentless-container-registry-vulnerability-assessment.md) and [Microsoft Defender Vulnerability Management (MDVM)](/microsoft-365/security/defender-vulnerability-management/defender-vulnerability-management).
4646

4747
### Agentless container posture in Defender CSPM is now Generally Available
4848

0 commit comments

Comments
 (0)