Skip to content

Commit 59b0313

Browse files
committed
Updated the GA status of two preview features
1 parent 59f4a58 commit 59b0313

File tree

2 files changed

+15
-15
lines changed

2 files changed

+15
-15
lines changed

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ ms.author: memildin
1919

2020
The vulnerability scanner included with Azure Security Center is powered by Qualys. Qualys's scanner is the leading tool for real-time identification of vulnerabilities in your Azure Virtual Machines. It's only available to users on the standard pricing tier. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
2121

22-
This feature is currently in preview.
23-
2422
> [!NOTE]
2523
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md). You can also use those instructions to integrate your organization's own Qualys license, if you choose not to use the built-in vulnerability scanner included with Azure Security Center.
2624
@@ -161,25 +159,27 @@ You'll need the following details:
161159
### How does the extension get updated?
162160
Like the Azure Security Center agent itself and all other Azure extensions, minor updates of the Qualys scanner may automatically happen in the background. All agents and extensions are tested extensively before being automatically deployed.
163161

164-
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you're running v1.0.0.4, you must take the following steps**:
162+
If you're running v1.0.0.4, you must manually update the vulnerability scanner extension using the steps below. This procedure also shows you how to check the version of the scanner currently deployed to your VMs.
163+
164+
1. From the Azure portal, open **Virtual machines**.
165165

166-
1. Verify the version of the Qualys vulnerability scanner extension running on your VM:
166+
1. Select the VM on which the extension is installed.
167167

168-
1. From the Azure portal, open Virtual machines.
169-
1. Select the VM on which the agent is installed.
170-
1. From the sidebar navigation, open **Extensions** and select the following extension:
168+
1. From the sidebar navigation, open **Extensions** and select the following extension:
171169

172-
Name: **WindowsAgent.AzureSecurityCenter** Type: **Qualys.WindowsAgent.AzureSecurityCenter**
170+
Name: **WindowsAgent.AzureSecurityCenter** Type: **Qualys.WindowsAgent.AzureSecurityCenter**
173171

174-
1. Review the version information of the extension.
172+
1. Review the version information of the extension.
175173

176-
![Qualys agent extension version information](media/built-in-vulnerability-assessment/qualys-agent-extension-version.png)
174+
![Qualys agent extension version information](media/built-in-vulnerability-assessment/qualys-agent-extension-version.png)
177175

178-
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
176+
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
179177

180-
1. Restart the VM.
178+
1. Restart the VM.
181179

182-
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
180+
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
181+
182+
183183

184184
### Why does my VM show as "not applicable" in the recommendation?
185185
The recommendation details page for the **"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"** recommendation groups your VMs in one or more of the following lists: **Healthy resources**, **Unhealthy resources**, and **Not applicable resources**.

articles/security-center/security-center-vulnerability-assessment-recommendations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: memildin
1717
---
1818
# Vulnerability assessments for your Azure Virtual Machines
1919

20-
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you. This feature is currently in preview.
20+
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you.
2121

2222
Security Center presents one of two recommendations if it doesn't find a vulnerability assessment solution installed on a VM:
2323

@@ -28,4 +28,4 @@ Security Center presents one of two recommendations if it doesn't find a vulnera
2828
Security Center also offers vulnerability analysis for your:
2929

3030
* SQL databases - see [Explore vulnerability assessment reports in the vulnerability assessment dashboard](security-center-iaas-advanced-data.md#explore-vulnerability-assessment-reports)
31-
* Azure Container Registry images - see [Azure Container Registry integration with Security Center (Preview)](azure-container-registry-integration.md)
31+
* Azure Container Registry images - see [Azure Container Registry integration with Security Center](azure-container-registry-integration.md)

0 commit comments

Comments
 (0)