Skip to content

Commit 55eeb10

Browse files
committed
implementing feedback - final
1 parent 9920577 commit 55eeb10

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: template-concept
1111

1212
You can identify security risks that exist in containers and Kubernetes realms with the agentless discovery and visibility capability across SDLC and runtime.
1313

14-
You can maximize the coverage of your container posture issues and extend your protection beyond the reach of agent-based assessments, with container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis, to provide a holistic approach to your posture improvement.
14+
You can maximize the coverage of your container posture issues and extend your protection beyond the reach of agent-based assessments to provide a holistic approach to your posture improvement. This includes, for example, container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis.
1515

1616
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).
1717

@@ -37,23 +37,21 @@ All of these capabilities are available as part of the [Defender Cloud Security
3737
| Aspect | Details |
3838
|---------|---------|
3939
|Release state:|Preview|
40-
|Pricing:|Requires [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) |
40+
|Pricing:|Requires [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) and is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/) |
4141
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Azure Commercial clouds<br> :::image type="icon" source="./media/icons/no-icon.png"::: Azure Government<br>:::image type="icon" source="./media/icons/no-icon.png"::: Azure China 21Vianet<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected AWS accounts<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected GCP accounts |
42+
| Permissions | You need to have access as a Subscription Owner, or, User Access Admin as well as Security Admin permissions for the Azure subscription used for onboarding |
4243

4344
## Prerequisites
4445

45-
### Permissions
46-
47-
You need to have access as a Subscription Owner, or, User Access Admin as well as Security Admin permissions for the Azure subscription used for onboarding.
48-
49-
5046
You need to have a Defender for CSPM plan enabled. There's no dependency on Defender for Containers​.
5147

5248
Learn more about [trusted versions that AKS supports](/azure/aks/supported-kubernetes-versions?tabs=azure-cli).
5349

5450
## Onboard Agentless Containers for CSPM
5551

56-
Before starting the onboarding process, make sure you have [a subscription onboarded to the Defender CSPM plan](enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription).
52+
Onboarding Agentless Containers for CSPM will allow you to gain wide visibility into Kubernetes and containers registries across SDLC and runtime.
53+
54+
**To onboard Agentless Containers for CSPM:**
5755

5856
1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page.
5957

@@ -75,7 +73,7 @@ For container registries vulnerability assessments, recommendations are availabl
7573

7674
Learn more about [image scanning](defender-for-containers-vulnerability-assessment-azure.md).
7775

78-
## How Agentless discovery for Kubernetes works
76+
### How Agentless discovery for Kubernetes works
7977

8078
The system’s architecture is based on a snapshot mechanism at intervals.
8179

@@ -100,7 +98,7 @@ By enabling the Agentless discovery for Kubernetes extension, the following proc
10098

10199
- **Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
102100

103-
## Refresh intervals
101+
### Refresh intervals
104102

105103
Agentless information in Defender CSPM is updated once an hour through a snapshot mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
106104

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,21 +36,21 @@ When a scan is triggered, findings are available as Defender for Cloud recommend
3636

3737
Before you can scan your ACR images:
3838

39-
- YOu must enable one of the following plans on your subscription:
39+
- You must enable one of the following plans on your subscription:
4040

4141
- [Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
4242
- [Defender for Containers](defender-for-containers-enable.md).
4343

4444
>[!NOTE]
45-
> This feature is charged per image.
45+
> This feature is charged per image. Learn more about the [pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/)
4646
4747
To find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
4848

49-
Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
49+
Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
5050

51-
Learn more in [Import container images to a container registry](../container-registry/container-registry-import-images.md)
51+
Learn more in [Import container images to a container registry](../container-registry/container-registry-import-images.md)
5252

53-
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-vulnerability-assessment-elastic.md) directly from the Azure portal.
53+
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-vulnerability-assessment-elastic.md) directly from the Azure portal.
5454

5555
For a list of the types of images and container registries supported by Microsoft Defender for Containers, see [Availability](supported-machines-endpoint-solutions-clouds-containers.md?tabs=azure-aks#registries-and-images).
5656

articles/defender-for-cloud/support-matrix-defender-for-cloud.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ Microsoft Defender for Cloud is available in the following Azure cloud environme
6969
| - [Microsoft Defender for Servers](./defender-for-servers-introduction.md) | GA | GA | GA |
7070
| - [Microsoft Defender for App Service](./defender-for-app-service-introduction.md) | GA | Not Available | Not Available |
7171
| - [Microsoft Defender CSPM](./concept-cloud-security-posture-management.md) | GA | Not Available | Not Available |
72+
| - [Agentless discovery for Kubernetes](concept-agentless-containers.md) | Public Preview | Not Available | Not Available |
73+
| [Agentless vulnerability assessments for container images](defender-for-containers-vulnerability-assessment-azure.md), including registry scanning (\* Up to 20 unique images per billable resource) | Public Preview | Not Available | Not Available |
7274
| - [Microsoft Defender for DNS](./defender-for-dns-introduction.md) | GA | GA | GA |
7375
| - [Microsoft Defender for Kubernetes](./defender-for-kubernetes-introduction.md) <sup>[1](#footnote1)</sup> | GA | GA | GA |
7476
| - [Microsoft Defender for Containers](./defender-for-containers-introduction.md) <sup>[7](#footnote7)</sup> | GA | GA | GA |

0 commit comments

Comments
 (0)