You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/built-in-vulnerability-assessment.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,8 +19,6 @@ ms.author: memildin
19
19
20
20
The vulnerability scanner included with Azure Security Center is powered by Qualys. Qualys's scanner is the leading tool for real-time identification of vulnerabilities in your Azure Virtual Machines. It's only available to users on the standard pricing tier. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
21
21
22
-
This feature is currently in preview.
23
-
24
22
> [!NOTE]
25
23
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md). You can also use those instructions to integrate your organization's own Qualys license, if you choose not to use the built-in vulnerability scanner included with Azure Security Center.
26
24
@@ -161,25 +159,27 @@ You'll need the following details:
161
159
### How does the extension get updated?
162
160
Like the Azure Security Center agent itself and all other Azure extensions, minor updates of the Qualys scanner may automatically happen in the background. All agents and extensions are tested extensively before being automatically deployed.
163
161
164
-
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you're running v1.0.0.4, you must take the following steps**:
162
+
If you're running v1.0.0.4, you must manually update the vulnerability scanner extension using the steps below. This procedure also shows you how to check the version of the scanner currently deployed to your VMs.
163
+
164
+
1. From the Azure portal, open **Virtual machines**.
165
165
166
-
1.Verify the version of the Qualys vulnerability scanner extension running on your VM:
166
+
1.Select the VM on which the extension is installed.
167
167
168
-
1. From the Azure portal, open Virtual machines.
169
-
1. Select the VM on which the agent is installed.
170
-
1. From the sidebar navigation, open **Extensions** and select the following extension:
168
+
1. From the sidebar navigation, open **Extensions** and select the following extension:
1. Review the version information of the extension.
172
+
1. Review the version information of the extension.
175
173
176
-

174
+

177
175
178
-
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
176
+
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
179
177
180
-
1. Restart the VM.
178
+
1. Restart the VM.
181
179
182
-
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
180
+
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
181
+
182
+
183
183
184
184
### Why does my VM show as "not applicable" in the recommendation?
185
185
The recommendation details page for the **"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"** recommendation groups your VMs in one or more of the following lists: **Healthy resources**, **Unhealthy resources**, and **Not applicable resources**.
Copy file name to clipboardExpand all lines: articles/security-center/security-center-vulnerability-assessment-recommendations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.author: memildin
17
17
---
18
18
# Vulnerability assessments for your Azure Virtual Machines
19
19
20
-
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you. This feature is currently in preview.
20
+
A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Azure Security Center's Standard pricing tier includes vulnerability scanning for your virtual machines at no extra cost. Additionally, Security Center can automatically deploy this tool for you.
21
21
22
22
Security Center presents one of two recommendations if it doesn't find a vulnerability assessment solution installed on a VM:
23
23
@@ -28,4 +28,4 @@ Security Center presents one of two recommendations if it doesn't find a vulnera
28
28
Security Center also offers vulnerability analysis for your:
29
29
30
30
* SQL databases - see [Explore vulnerability assessment reports in the vulnerability assessment dashboard](security-center-iaas-advanced-data.md#explore-vulnerability-assessment-reports)
31
-
* Azure Container Registry images - see [Azure Container Registry integration with Security Center (Preview)](azure-container-registry-integration.md)
31
+
* Azure Container Registry images - see [Azure Container Registry integration with Security Center](azure-container-registry-integration.md)
0 commit comments