You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/concept-agentless-containers.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.custom: template-concept
11
11
12
12
You can identify security risks that exist in containers and Kubernetes realms with the agentless discovery and visibility capability across SDLC and runtime.
13
13
14
-
You can maximize the coverage of your container posture issues and extend your protection beyond the reach of agent-based assessments, with container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis, to provide a holistic approach to your posture improvement.
14
+
You can maximize the coverage of your container posture issues and extend your protection beyond the reach of agent-based assessments to provide a holistic approach to your posture improvement. This includes, for example, container vulnerability assessment insights as part of [Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) and Kubernetes [Attack Path](attack-path-reference.md#azure-containers) analysis.
15
15
16
16
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).
17
17
@@ -37,23 +37,21 @@ All of these capabilities are available as part of the [Defender Cloud Security
|Pricing:|Requires [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md)and is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
| Permissions | You need to have access as a Subscription Owner, or, User Access Admin as well as Security Admin permissions for the Azure subscription used for onboarding |
42
43
43
44
## Prerequisites
44
45
45
-
### Permissions
46
-
47
-
You need to have access as a Subscription Owner, or, User Access Admin as well as Security Admin permissions for the Azure subscription used for onboarding.
48
-
49
-
50
46
You need to have a Defender for CSPM plan enabled. There's no dependency on Defender for Containers.
51
47
52
48
Learn more about [trusted versions that AKS supports](/azure/aks/supported-kubernetes-versions?tabs=azure-cli).
53
49
54
50
## Onboard Agentless Containers for CSPM
55
51
56
-
Before starting the onboarding process, make sure you have [a subscription onboarded to the Defender CSPM plan](enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription).
52
+
Onboarding Agentless Containers for CSPM will allow you to gain wide visibility into Kubernetes and containers registries across SDLC and runtime.
53
+
54
+
**To onboard Agentless Containers for CSPM:**
57
55
58
56
1. In the Azure portal, navigate to the Defender for Cloud's **Environment Settings** page.
59
57
@@ -75,7 +73,7 @@ For container registries vulnerability assessments, recommendations are availabl
75
73
76
74
Learn more about [image scanning](defender-for-containers-vulnerability-assessment-azure.md).
77
75
78
-
## How Agentless discovery for Kubernetes works
76
+
###How Agentless discovery for Kubernetes works
79
77
80
78
The system’s architecture is based on a snapshot mechanism at intervals.
81
79
@@ -100,7 +98,7 @@ By enabling the Agentless discovery for Kubernetes extension, the following proc
100
98
101
99
-**Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
102
100
103
-
## Refresh intervals
101
+
###Refresh intervals
104
102
105
103
Agentless information in Defender CSPM is updated once an hour through a snapshot mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,21 +36,21 @@ When a scan is triggered, findings are available as Defender for Cloud recommend
36
36
37
37
Before you can scan your ACR images:
38
38
39
-
-YOu must enable one of the following plans on your subscription:
39
+
-You must enable one of the following plans on your subscription:
40
40
41
41
-[Defender CSPM](concept-cloud-security-posture-management.md). When you enable this plan, ensure you enable the **Container registries vulnerability assessments (preview)** extension.
42
42
-[Defender for Containers](defender-for-containers-enable.md).
43
43
44
44
>[!NOTE]
45
-
> This feature is charged per image.
45
+
> This feature is charged per image. Learn more about the [pricing](https://azure.microsoft.com/pricing/details/defender-for-cloud/)
46
46
47
47
To find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
48
48
49
-
Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
49
+
Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
50
50
51
-
Learn more in [Import container images to a container registry](../container-registry/container-registry-import-images.md)
51
+
Learn more in [Import container images to a container registry](../container-registry/container-registry-import-images.md)
52
52
53
-
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-vulnerability-assessment-elastic.md) directly from the Azure portal.
53
+
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-vulnerability-assessment-elastic.md) directly from the Azure portal.
54
54
55
55
For a list of the types of images and container registries supported by Microsoft Defender for Containers, see [Availability](supported-machines-endpoint-solutions-clouds-containers.md?tabs=azure-aks#registries-and-images).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/support-matrix-defender-for-cloud.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,6 +69,8 @@ Microsoft Defender for Cloud is available in the following Azure cloud environme
69
69
| - [Microsoft Defender for Servers](./defender-for-servers-introduction.md)| GA | GA | GA |
70
70
| - [Microsoft Defender for App Service](./defender-for-app-service-introduction.md)| GA | Not Available | Not Available |
71
71
| - [Microsoft Defender CSPM](./concept-cloud-security-posture-management.md)| GA | Not Available | Not Available |
72
+
| - [Agentless discovery for Kubernetes](concept-agentless-containers.md)| Public Preview | Not Available | Not Available |
73
+
|[Agentless vulnerability assessments for container images](defender-for-containers-vulnerability-assessment-azure.md), including registry scanning (\* Up to 20 unique images per billable resource) | Public Preview | Not Available | Not Available |
72
74
| - [Microsoft Defender for DNS](./defender-for-dns-introduction.md)| GA | GA | GA |
73
75
| - [Microsoft Defender for Kubernetes](./defender-for-kubernetes-introduction.md) <sup>[1](#footnote1)</sup> | GA | GA | GA |
74
76
| - [Microsoft Defender for Containers](./defender-for-containers-introduction.md) <sup>[7](#footnote7)</sup> | GA | GA | GA |
0 commit comments