You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -70,7 +70,7 @@ A full list of supported alerts is available in the [reference table of all Defe
70
70
1. In the Azure portal, open Microsoft Defender for Cloud's security alerts page and look for the alert on the relevant resource:
71
71
72
72
:::image type="content" source="media/defender-for-kubernetes-azure-arc/sample-kubernetes-security-alert.png" alt-text="Sample alert from Microsoft Defender for Kubernetes." lightbox="media/defender-for-kubernetes-azure-arc/sample-kubernetes-security-alert.png":::
73
-
73
+
74
74
::: zone pivot="defender-for-container-arc,defender-for-container-eks,defender-for-container-gke"
75
75
[!INCLUDE [Remove the extension](./includes/defender-for-containers-remove-extension.md)]
76
76
::: zone-end
@@ -89,4 +89,4 @@ A full list of supported alerts is available in the [reference table of all Defe
89
89
90
90
## Next steps
91
91
92
-
[Use Defender for Containers to scan your ACR images for vulnerabilities](defender-for-container-registries-usage.md).
92
+
[Use Defender for Containers to scan your ACR images for vulnerabilities](defender-for-container-registries-usage.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-containers-enable-plan-aks.md
+56-12Lines changed: 56 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
author: ElazarK
3
-
ms.author: elkrieger
2
+
author: bmansheim
3
+
ms.author: benmansheim
4
4
ms.service: defender-for-cloud
5
5
ms.topic: include
6
6
ms.date: 05/12/2022
@@ -19,7 +19,7 @@ ms.date: 05/12/2022
19
19
>
20
20
> :::image type="content" source="../media/release-notes/defender-plans-deprecated-indicator.png" alt-text="Defender for container registries and Defender for Kubernetes plans showing 'Deprecated' and upgrade information.":::
21
21
22
-
1. By default, when enabling the plan through the Azure portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan, including the assignment of a default workspace.
22
+
1. By default, when enabling the plan through the Azure portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan, including the assignment of a default workspace.
23
23
24
24
Optionally, you can modify this configuration from the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier) or from the [Auto provisioning page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/dataCollection) on the **Microsoft Defender for Containers components (preview)** row:
25
25
@@ -39,7 +39,7 @@ ms.date: 05/12/2022
39
39
> [!Note]
40
40
>Microsoft Defender for Containers is configured to defend all of your clouds automatically. When you install all of the required prerequisites and enable all of the auto provisioning capabilities.
41
41
>
42
-
> If you choose to disable all of the auto provision configuration options, no agents, or components will be deployed to your clusters. Protection will be limited to the Agentless features only. Learn which features are Agentless in the [availability section](../supported-machines-endpoint-solutions-clouds-containers.md) for Defender for Containers.
42
+
> If you choose to disable all of the auto provision configuration options, no agents, or components will be deployed to your clusters. Protection will be limited to the Agentless features only. Learn which features are Agentless in the [availability section](../supported-machines-endpoint-solutions-clouds-containers.md) for Defender for Containers.
43
43
44
44
## Deploy the Defender profile
45
45
@@ -53,7 +53,7 @@ The Defender security profile is a preview feature. [!INCLUDE [Legalese](../../.
53
53
54
54
### Use the fix button from the Defender for Cloud recommendation
55
55
56
-
A streamlined, frictionless, process lets you use the Azure portal pages to enable the Defender for Cloud plan and setup auto provisioning of all the necessary components for defending your Kubernetes clusters at scale.
56
+
A streamlined, frictionless, process lets you use the Azure portal pages to enable the Defender for Cloud plan and setup auto provisioning of all the necessary components for defending your Kubernetes clusters at scale.
57
57
58
58
A dedicated Defender for Cloud recommendation provides:
59
59
@@ -73,7 +73,6 @@ A dedicated Defender for Cloud recommendation provides:
73
73
74
74
1. Select **Fix *[x]* resources**.
75
75
76
-
77
76
### [**REST API**](#tab/aks-deploy-rest)
78
77
79
78
### Use the REST API to deploy the Defender profile
@@ -85,19 +84,18 @@ PUT https://management.azure.com/subscriptions/{{Subscription Id}}/resourcegroup
### Use Azure CLI to deploy the Defender extension
124
+
125
+
1. Log in to Azure:
126
+
127
+
```azurecli
128
+
az login
129
+
az account set --subscription <your-subscription-id>
130
+
```
131
+
132
+
> [!IMPORTANT]
133
+
> Ensure that you use the same subscription ID for ``<your-subscription-id>`` as the one associated with your AKS cluster.
134
+
135
+
1. Enable the feature flag in the CLI:
136
+
137
+
```azurecli
138
+
az feature register --namespace Microsoft.ContainerService --name AKS-AzureDefender
139
+
```
123
140
141
+
1. Enable the Defender profile on your containers:
142
+
143
+
- Run the following command to create a new cluster with the Defender profile enabled:
144
+
145
+
```azurecli
146
+
az aks create --enable-defender --resource-group <your-resource-group> --name <your-cluster-name>
147
+
```
148
+
149
+
- Run the following command to enable the Defender profile on an existing cluster:
150
+
151
+
```azurecli
152
+
az aks update --enable-defender --resource-group <your-resource-group> --name <your-cluster-name>
153
+
```
154
+
155
+
A description of all the supported configuration settings on the Defender extension type is given below:
156
+
157
+
| Property | Description |
158
+
|----------|-------------|
159
+
| logAnalyticsWorkspaceResourceID | **Optional**. Full resource ID of your own Log Analytics workspace.<br>When not provided, the default workspace of the region will be used.<br><br>To get the full resource ID, run the following command to display the list of workspaces in your subscriptions in the default JSON format:<br>```az resource list --resource-type Microsoft.OperationalInsights/workspaces -o json```<br><br>The Log Analytics workspace resource ID has the following syntax:<br>/subscriptions/{your-subscription-id}/resourceGroups/{your-resource-group}/providers/Microsoft.OperationalInsights/workspaces/{your-workspace-name}. <br>Learn more in [Log Analytics workspaces](../../azure-monitor/logs/log-analytics-workspace-overview.md) |
160
+
161
+
You can include these settings in a JSON file and specify the JSON file in the `az aks create` and `az aks update` commands with this parameter: `--defender-config<path-to-JSON-file>`. The format of the JSON file must be:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-containers-enable-plan-arc.md
+10-14Lines changed: 10 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.date: 05/12/2022
12
12
13
13
1. From Defender for Cloud's menu, open the [Environment settings page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/EnvironmentSettings) and select the relevant subscription.
14
14
15
-
1. In the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier), enable **Defender for Containers**
15
+
1. In the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier), enable **Defender for Containers**.
16
16
17
17
> [!TIP]
18
18
> If the subscription already has Defender for Kubernetes and/or Defender for container registries enabled, an update notice is shown. Otherwise, the only option will be **Defender for Containers**.
@@ -28,7 +28,7 @@ ms.date: 05/12/2022
28
28
> [!NOTE]
29
29
> If you choose to **disable the plan** at any time after enabling it through the portal as shown above, you'll need to manually remove Defender for Containers components deployed on your clusters.
30
30
31
-
You can [assign a custom workspace](https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-enable?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-arc#assign-a-custom-workspace) through Azure Policy.
31
+
You can [assign a custom workspace](../defender-for-containers-enable.md?tabs=aks-deploy-portal%2Ck8s-deploy-asc%2Ck8s-verify-asc%2Ck8s-remove-arc%2Caks-removeprofile-api&pivots=defender-for-container-arc#assign-a-custom-workspace) through Azure Policy.
32
32
33
33
1. If you disable the auto provisioning of any component, you can easily deploy the component to one or more clusters using the appropriate recommendation:
34
34
@@ -39,6 +39,7 @@ ms.date: 05/12/2022
39
39
## Prerequisites
40
40
41
41
Before deploying the extension, ensure you:
42
+
42
43
-[Connect the Kubernetes cluster to Azure Arc](../../azure-arc/kubernetes/quickstart-connect-cluster.md)
43
44
- Complete the [pre-requisites listed under the generic cluster extensions documentation](../../azure-arc/kubernetes/extensions.md#prerequisites).
44
45
@@ -72,7 +73,6 @@ A dedicated Defender for Cloud recommendation provides:
72
73
73
74
:::image type="content" source="../media/defender-for-kubernetes-azure-arc/security-center-deploy-extension.gif" alt-text="Deploy Defender extension for Azure Arc with Defender for Cloud's 'fix' option.":::
74
75
75
-
76
76
### [**Azure CLI**](#tab/k8s-deploy-cli)
77
77
78
78
### Use Azure CLI to deploy the Defender extension
@@ -119,12 +119,13 @@ You can use the **azure-defender-extension-arm-template.json** Resource Manager
119
119
120
120
### [**REST API**](#tab/k8s-deploy-api)
121
121
122
-
### Use REST API to deploy the Defender extension
122
+
### Use REST API to deploy the Defender extension
123
123
124
124
To use the REST API to deploy the Defender extension, you'll need a Log Analytics workspace on your subscription. Learn more in [Log Analytics workspaces](../../azure-monitor/logs/log-analytics-workspace-overview.md).
125
125
126
126
> [!TIP]
127
127
> The simplest way to use the API to deploy the Defender extension is with the supplied **Postman Collection JSON** example from Defender for Cloud's [installation examples](https://aka.ms/kubernetes-extension-installation-examples).
128
+
128
129
- To modify the Postman Collection JSON, or to manually deploy the extension with the REST API, run the following PUT command:
129
130
130
131
```rest
@@ -139,12 +140,11 @@ To use the REST API to deploy the Defender extension, you'll need a Log Analytic
139
140
|Resource Group | Path | True | String | Name of the resource group containing your Azure Arc-enabled Kubernetes resource |
140
141
| Cluster Name | Path | True | String | Name of your Azure Arc-enabled Kubernetes resource |
141
142
142
-
143
-
144
143
For **Authentication**, your header must have a Bearer token (as with other Azure APIs). To get a bearer token, run the following command:
### Use the Azure Arc pages to verify the status of your extension
@@ -201,7 +200,6 @@ To verify that your cluster has the Defender extension installed on it, follow t
201
200
202
201
:::image type="content" source="../media/defender-for-kubernetes-azure-arc/extension-details-page.png" alt-text="Full details of an Azure Arc extension on a Kubernetes cluster.":::
203
202
204
-
205
203
### [**Azure CLI**](#tab/k8s-verify-cli)
206
204
207
205
### Use Azure CLI to verify that the extension is deployed
@@ -216,9 +214,9 @@ To verify that your cluster has the Defender extension installed on it, follow t
216
214
217
215
> [!NOTE]
218
216
> It might show "installState": "Pending" for the first few minutes.
219
-
217
+
220
218
1. If the state shows **Installed**, run the following command on your machine with the `kubeconfig` file pointed to your cluster to check that a pod called "azuredefender-XXXXX" is in 'Running' state:
221
-
219
+
222
220
```console
223
221
kubectl get pods -n azuredefender
224
222
```
@@ -247,5 +245,3 @@ To confirm a successful deployment, or to validate the status of your extension
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/includes/defender-for-containers-remove-profile.md
+27-8Lines changed: 27 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,16 +9,38 @@ ms.author: elkrieger
9
9
10
10
To remove this - or any - Defender for Cloud extension, it's not enough to turn off auto provisioning:
11
11
12
-
-**Enabling** auto provisioning, potentially impacts *existing* and *future* machines.
12
+
-**Enabling** auto provisioning, potentially impacts *existing* and *future* machines.
13
13
-**Disabling** auto provisioning for an extension, only affects the *future* machines - nothing is uninstalled by disabling auto provisioning.
14
14
15
15
Nevertheless, to ensure the Defender for Containers components aren't automatically provisioned to your resources from now on, disable auto provisioning of the extensions as explained in [Configure auto provisioning for agents and extensions from Microsoft Defender for Cloud](../enable-data-collection.md).
16
16
17
17
You can remove the profile using the REST API or a Resource Manager template as explained in the tabs below.
18
18
19
+
### [**Azure CLI**](#tab/k8s-remove-cli)
20
+
21
+
### Use Azure CLI to remove the Defender profile
22
+
23
+
1. Remove the Microsoft Defender for with the following commands:
24
+
25
+
```azurecli
26
+
az login
27
+
az account set --subscription <subscription-id>
28
+
az aks update --disable-defender
29
+
```
30
+
31
+
Removing the profile may take a few minutes.
32
+
33
+
1. To verify that the profile was successfully removed, run the following command:
34
+
35
+
```console
36
+
kubectl get pods -n azuredefender
37
+
```
38
+
39
+
When the profile is removed, you should see that no pods are returned in the `get pods` command. It might take a few minutes for the pods to be deleted.
40
+
19
41
### [**REST API**](#tab/aks-removeprofile-api)
20
42
21
-
### Use REST API to remove the Defender profile from AKS
43
+
### Use REST API to remove the Defender profile from AKS
22
44
23
45
To remove the profile using the REST API, run the following PUT command:
0 commit comments