You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes-archive.md
+43-1Lines changed: 43 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: A description of what's new and changed in Microsoft Defender for C
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
6
ms.topic: reference
7
-
ms.date: 01/04/2023
7
+
ms.date: 02/05/2023
8
8
---
9
9
10
10
# Archive for what's new in Defender for Cloud?
@@ -17,6 +17,48 @@ This page provides you with information about:
17
17
- Bug fixes
18
18
- Deprecated functionality
19
19
20
+
## August 2022
21
+
22
+
Updates in August include:
23
+
24
+
-[Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers](#vulnerabilities-for-running-images-are-now-visible-with-defender-for-containers-on-your-windows-containers)
25
+
-[Azure Monitor Agent integration now in preview](#azure-monitor-agent-integration-now-in-preview)
26
+
-[Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster](#deprecated-vm-alerts-regarding-suspicious-activity-related-to-a-kubernetes-cluster)
27
+
28
+
### Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
29
+
30
+
Defender for Containers now shows vulnerabilities for running Windows containers.
31
+
32
+
When vulnerabilities are detected, Defender for Cloud generates the following security recommendation listing the detected issues: [Running container images should have vulnerability findings resolved](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false).
33
+
34
+
Learn more about [viewing vulnerabilities for running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters).
35
+
36
+
### Azure Monitor Agent integration now in preview
37
+
38
+
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
39
+
40
+
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
41
+
42
+
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
43
+
44
+
The following table lists the alerts that were deprecated:
45
+
46
+
| Alert name | Description | Tactics | Severity |
47
+
|--|--|--|--|
48
+
|**Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
49
+
|**Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
50
+
|**SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
51
+
52
+
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
53
+
54
+
### Container vulnerabilities now include detailed package information
55
+
56
+
Defender for Container's vulnerability assessment (VA) now includes detailed package information for each finding, including: package name, package type, path, installed version, and fixed version. The package information lets you find vulnerable packages so you can remediate the vulnerability or remove the package.
57
+
58
+
This detailed package information is available for new scans of images.
59
+
60
+
:::image type="content" source="media/release-notes/mdc-container-va-package-information.png" alt-text="Screenshot of the package information for container vulnerabilities." lightbox="media/release-notes/mdc-container-va-package-information.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+15-43Lines changed: 15 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Release notes for Microsoft Defender for Cloud
3
3
description: A description of what's new and changed in Microsoft Defender for Cloud
4
4
ms.topic: overview
5
-
ms.date: 02/01/2023
5
+
ms.date: 02/05/2023
6
6
---
7
7
8
8
# What's new in Microsoft Defender for Cloud?
@@ -16,6 +16,20 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
16
16
> [!TIP]
17
17
> If you're looking for items older than six months, you can find them in the [Archive for What's new in Microsoft Defender for Cloud](release-notes-archive.md).
18
18
19
+
## February 2023
20
+
21
+
Updates in February include:
22
+
23
+
-[The CIS 1.5.0 compliance standard for AWS is now supported](#the-cis-150-compliance-standard-for-aws-is-now-supported)
24
+
25
+
## The CIS 1.5.0 compliance standard for AWS is now supported
26
+
27
+
We are announcing that Defender for Cloud now supports the CIS 1.5.0 compliance standard for AWS as part of rhe multicloud recommendations.
28
+
29
+
This new standard includes both the existing and new recommendations that extend Defender for Cloud's coverage to new aWS services and resources.
30
+
31
+
Learn how to [Manage AWS assessments and standards](how-to-manage-aws-assessments-standards.md).
32
+
19
33
## January 2023
20
34
21
35
Updates in January include:
@@ -392,48 +406,6 @@ If you want to continue receiving the alerts in Defender for Cloud, connect the
392
406
393
407
Learn more about [security alerts](alerts-overview.md).
394
408
395
-
## August 2022
396
-
397
-
Updates in August include:
398
-
399
-
-[Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers](#vulnerabilities-for-running-images-are-now-visible-with-defender-for-containers-on-your-windows-containers)
400
-
-[Azure Monitor Agent integration now in preview](#azure-monitor-agent-integration-now-in-preview)
401
-
-[Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster](#deprecated-vm-alerts-regarding-suspicious-activity-related-to-a-kubernetes-cluster)
402
-
403
-
### Vulnerabilities for running images are now visible with Defender for Containers on your Windows containers
404
-
405
-
Defender for Containers now shows vulnerabilities for running Windows containers.
406
-
407
-
When vulnerabilities are detected, Defender for Cloud generates the following security recommendation listing the detected issues: [Running container images should have vulnerability findings resolved](https://portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/KubernetesRuntimeVisibilityRecommendationDetailsBlade/assessmentKey/41503391-efa5-47ee-9282-4eff6131462c/showSecurityCenterCommandBar~/false).
408
-
409
-
Learn more about [viewing vulnerabilities for running images](defender-for-containers-vulnerability-assessment-azure.md#view-vulnerabilities-for-images-running-on-your-aks-clusters).
410
-
411
-
### Azure Monitor Agent integration now in preview
412
-
413
-
Defender for Cloud now includes preview support for the [Azure Monitor Agent](../azure-monitor/agents/agents-overview.md) (AMA). AMA is intended to replace the legacy Log Analytics agent (also referred to as the Microsoft Monitoring Agent (MMA)), which is on a path to deprecation. AMA [provides many benefits](../azure-monitor/agents/azure-monitor-agent-migration.md#benefits) over legacy agents.
414
-
415
-
In Defender for Cloud, when you [enable auto provisioning for AMA](auto-deploy-azure-monitoring-agent.md), the agent is deployed on **existing and new** VMs and Azure Arc-enabled machines that are detected in your subscriptions. If Defenders for Cloud plans are enabled, AMA collects configuration information and event logs from Azure VMs and Azure Arc machines. The AMA integration is in preview, so we recommend using it in test environments, rather than in production environments.
416
-
417
-
### Deprecated VM alerts regarding suspicious activity related to a Kubernetes cluster
418
-
419
-
The following table lists the alerts that were deprecated:
420
-
421
-
| Alert name | Description | Tactics | Severity |
422
-
|--|--|--|--|
423
-
|**Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
424
-
|**Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
425
-
|**SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
426
-
427
-
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
428
-
429
-
### Container vulnerabilities now include detailed package information
430
-
431
-
Defender for Container's vulnerability assessment (VA) now includes detailed package information for each finding, including: package name, package type, path, installed version, and fixed version. The package information lets you find vulnerable packages so you can remediate the vulnerability or remove the package.
432
-
433
-
This detailed package information is available for new scans of images.
434
-
435
-
:::image type="content" source="media/release-notes/mdc-container-va-package-information.png" alt-text="Screenshot of the package information for container vulnerabilities." lightbox="media/release-notes/mdc-container-va-package-information.png":::
436
-
437
409
## Next steps
438
410
439
411
For past changes to Defender for Cloud, see [Archive for what's new in Defender for Cloud?](release-notes-archive.md).
0 commit comments