You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-agentless-containers.md
+9-12Lines changed: 9 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,7 @@ ms.custom: template-concept
11
11
12
12
Identify security risks in containers and Kubernetes realms with an agentless discovery and visibility capability across SDLC and runtime.
13
13
14
-
Agentless Container Posture offers container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#attack-paths) analysis.
15
-
16
-
Agentless Container Posture maximizes coverage on container posture issues and extends beyond the reach of agent-based assessments, providing a holistic approach to your posture improvement.
14
+
With container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#attack-paths) analysis, you can maximize coverage on container posture issues and extend beyond the reach of agent-based assessments, providing a holistic approach to your posture improvement.
17
15
18
16
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).
19
17
@@ -24,15 +22,14 @@ Learn more about [Cloud Security Posture Management](concept-cloud-security-post
24
22
25
23
Agentless Container Posture provides the following capabilities:
26
24
27
-
- Enabling agentless discovery and visibility within Kubernetes parameters.
28
-
- Enabling agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) to enable queries on the Cloud Security Explorer.
25
+
- Using Kubernetes Attack Path analysis to visualize risks and threats to Kubernetes environments.
26
+
- Using Cloud Security Explorer for risk hunting by querying various risk scenarios.
27
+
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for "Kubernetes" in the [list of Insights](attack-path-reference.md#insights).
28
+
- Agentless discovery and visibility within Kubernetes components.
29
+
- Agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) with Cloud Security Explorer.
29
30
30
31
A [vulnerability assessment](defender-for-containers-vulnerability-assessment-azure.md) for Containers in Defender Cloud Security Posture Management (CSPM) gives you frictionless, wide, and instant visibility on actionable posture issues without installed agents, network connectivity requirements, or container performance impact.
31
32
32
-
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, see the [list of Insights](attack-path-reference.md#insights).
33
-
- Using Cloud Security Explorer for risk hunting by querying various risk scenarios.
34
-
- Using Kubernetes Attack Path analysis to visualize risks and threats to Kubernetes environments.
35
-
36
33
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan.
37
34
38
35
## Availability
@@ -75,17 +72,17 @@ Learn more about [trusted versions that AKS supports](/azure/aks/supported-kuber
75
72
76
73
Verify that the settings were saved successfully - a notification message pops up in the top right corner.
77
74
78
-
### Image scanning intervals
75
+
### Image refresh intervals
79
76
80
77
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
81
78
82
-
Learn more about [agentless scanning](concept-agentless-data-collection.md).
79
+
Recommendations are available based on vulnerability assessment timeline. Learn more about [agentless scanning](concept-agentless-data-collection.md).
83
80
84
81
## How agentless containers works
85
82
86
83
The system’s architecture is based on a snapshot mechanism at intervals.
87
84
88
-
:::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png":::
85
+
<!--- :::image type="content" source="media/concept-agentless-containers/diagram-permissions-architecture.png" alt-text="Diagram of the permissions architecture." lightbox="media/concept-agentless-containers/diagram-permissions-architecture.png"::: --->
89
86
90
87
By enabling the Agentless discovery for Kubernetes extension, the following process occurs:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,6 @@ Learn more about [the cloud security graph, attack path analysis, and the cloud
23
23
24
24
- You must [enable Defender for CSPM](enable-enhanced-security.md).
25
25
26
-
- You must [enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers.
27
-
28
-
When you enable Defender for Containers, you also gain the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in the security explorer.
0 commit comments