You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-introduction.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,8 @@ Review the findings from these vulnerability scanners and respond to them all fr
102
102
Learn more on the following pages:
103
103
104
104
-[Defender for Cloud's integrated Qualys scanner for Azure and hybrid machines](deploy-vulnerability-assessment-vm.md)
105
-
-[Identify vulnerabilities in images in Azure container registries](defender-for-containers-va-acr.md#identify-vulnerabilities-in-images-in-other-container-registries)
105
+
-[Identify vulnerabilities in images in Azure container registries](defender-for-containers-va-acr.md)
106
+
-[Identify vulnerabilities in images in AWS Elastic Container Registry](defender-for-containers-va-ecr.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-va-acr.md
+11-30Lines changed: 11 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@ title: Identify vulnerabilities in Azure Container Registry with Microsoft Defen
3
3
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
-
ms.date: 09/11/2022
6
+
ms.date: 10/24/2022
7
7
ms.topic: how-to
8
8
ms.custom: ignite-2022
9
9
---
10
10
11
11
# Use Defender for Containers to scan your Azure Container Registry images for vulnerabilities
12
12
13
-
This page explains how to use Defender for Containers to scan the container images stored in your Azure Resource Manager-based Azure Container Registry, as part of the protections provided within Microsoft Defender for Cloud.
13
+
This article explains how to use Defender for Containers to scan the container images stored in your Azure Resource Manager-based Azure Container Registry, as part of the protections provided within Microsoft Defender for Cloud.
14
14
15
15
To enable scanning of vulnerabilities in containers, you have to [enable Defender for Containers](defender-for-containers-enable.md). When the scanner, powered by Qualys, reports vulnerabilities, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific registry.
16
16
@@ -30,43 +30,28 @@ The triggers for an image scan are:
30
30
31
31
- (Preview) Continuous scan for running images. This scan is performed every seven days for as long as the image runs. This mode runs instead of the above mode when the Defender profile, or extension is running on the cluster.
32
32
33
-
> [!NOTE]
34
-
> **Windows containers**: There is no Defender agent for Windows containers, the Defender agent is deployed to a Linux node running in the cluster, to retrieve the running container inventory for your Windows nodes.
35
-
>
36
-
> Images that aren't pulled from ACR for deployment in AKS won't be checked and will appear under the **Not applicable** tab.
37
-
>
38
-
> Images that have been deleted from their ACR registry, but are still running, won't be reported on only 30 days after their last scan occurred in ACR.
33
+
When a scan is triggered, findings are available as Defender for Cloud recommendations from 2 minutes up to 15 minutes after the scan is complete.
39
34
40
-
This scan typically completes within 2 minutes, but it might take up to 40 minutes.
35
+
Also, check out the ability scan container images for vulnerabilities as the images are built in your CI/CD GitHub workflows. Learn more in [Defender for DevOps](defender-for-devops-introduction.md).
41
36
42
-
Also, check out the ability scan container images for vulnerabilities as the images are built in your CI/CD GitHub workflows. Learn more in [Identify vulnerable container images in your CI/CD workflows](defender-for-containers-cicd.md).
37
+
## Prerequisites
43
38
44
-
## Identify vulnerabilities in images in Azure container registries
39
+
Before you can scan your ACR images:
45
40
46
-
To enable vulnerability scans of images stored in your Azure Resource Manager-based Azure Container Registry:
47
-
48
-
1.[Enable Defender for Containers](defender-for-containers-enable.md) for your subscription. Defender for Containers is now ready to scan images in your registries.
41
+
-[Enable Defender for Containers](defender-for-containers-enable.md) for your subscription. Defender for Containers is now ready to scan images in your registries.
49
42
50
43
>[!NOTE]
51
44
> This feature is charged per image.
52
45
53
-
When a scan is triggered, findings are available as Defender for Cloud recommendations from 2 minutes up to 15 minutes after the scan is complete.
54
-
55
-
1.[View and remediate findings as explained below](#view-and-remediate-findings).
56
-
57
-
## Identify vulnerabilities in images in other container registries
58
-
59
-
If you want to find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
46
+
- If you want to find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
60
47
61
-
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-va-ecr.md) directly from the Azure portal.
62
-
63
-
1. Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
48
+
Use the ACR tools to bring images to your registry from Docker Hub or Microsoft Container Registry. When the import completes, the imported images are scanned by the built-in vulnerability assessment solution.
64
49
65
50
Learn more in [Import container images to a container registry](../container-registry/container-registry-import-images.md)
66
51
67
-
When the scan completes (typically after approximately 2 minutes, but can be up to 15 minutes), findings are available as Defender for Cloud recommendations.
52
+
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-va-ecr.md) directly from the Azure portal.
68
53
69
-
1.[View and remediate findings as explained below](#view-and-remediate-findings).
54
+
For a list of the types of images and container registries supported by Microsoft Defender for Containers, see [Availability](supported-machines-endpoint-solutions-clouds-containers.md?tabs=azure-aks#registries-and-images).
70
55
71
56
## View and remediate findings
72
57
@@ -173,10 +158,6 @@ Defender for Cloud filters and classifies findings from the scanner. When an ima
173
158
174
159
Yes. The results are under [Sub-Assessments REST API](/rest/api/defenderforcloud/sub-assessments/list). Also, you can use Azure Resource Graph (ARG), the Kusto-like API for all of your resources: a query can fetch a specific scan.
175
160
176
-
### What registry types are scanned? What types are billed?
177
-
178
-
For a list of the types of container registries supported by Microsoft Defender for container registries, see [Availability](supported-machines-endpoint-solutions-clouds-containers.md#additional-information). Defender for Containers doesn't scan unsupported registries that you connect to your Azure subscription.
179
-
180
161
### Why is Defender for Cloud alerting me to vulnerabilities about an image that isn’t in my registry?
181
162
182
163
Some images may reuse tags from an image that was already scanned. For example, you may reassign the tag “Latest” every time you add an image to a digest. In such cases, the ‘old’ image does still exist in the registry and may still be pulled by its digest. If the image has security findings and is pulled, it will expose security vulnerabilities.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-va-ecr.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,11 @@ ms.custom: ignite-2022
12
12
13
13
Defender for Containers lets you scan the container images stored in your Amazon AWS Elastic Container Registry (ECR) as part of the protections provided within Microsoft Defender for Cloud.
14
14
15
-
To enable scanning of vulnerabilities in containers, you have to [connect your AWS account to Defender for Cloud](quickstart-onboard-aws.md) and [enable Defender for Containers](defender-for-containers-enable.md). The agentless scanner, powered by the open-source scanner Trivy, scans your ECR repositories and reports vulnerabilities. Defender for Containers creates resources in your AWS account, such as an ECS cluster in a dedicated VPC, internet gateway and an S3 bucket, so that images stay within your account for privacy and intellectual property protection. Resources are created in two AWS regions: us-east-1 and eu-central-1.
15
+
To enable scanning of vulnerabilities in containers, you have to [connect your AWS account to Defender for Cloud](quickstart-onboard-aws.md) and [enable Defender for Containers](defender-for-containers-enable.md). The agentless scanner, powered by the open-source scanner Trivy, scans your ECR repositories and reports vulnerabilities.
16
16
17
-
Defender for Cloud filters and classifies findings from the scanner. Images without vulnerabilities are marked as healthy and Defender for Cloud doesn't send notifications about healthy images to keep you from getting unwanted informational alerts.
17
+
Defender for Containers creates resources in your AWS account to build an inventory of the software in your images. The scan then sends only the software inventory to Defender for Cloud. This architecture protects your information privacy and intellectual property, and also keeps the outbound network traffic to a minimum. Defender for Containers creates an ECS cluster in a dedicated VPC, an internet gateway, and an S3 bucket in the us-east-1 and eu-central-1 regions to build the software inventory.
18
+
19
+
Defender for Cloud filters and classifies findings from the software inventory that the scanner creates. Images without vulnerabilities are marked as healthy and Defender for Cloud doesn't send notifications about healthy images to keep you from getting unwanted informational alerts.
18
20
19
21
The triggers for an image scan are:
20
22
@@ -27,11 +29,9 @@ The triggers for an image scan are:
27
29
Before you can scan your ECR images:
28
30
29
31
-[Connect your AWS account to Defender for Cloud and enable Defender for Containers](quickstart-onboard-aws.md)
30
-
- You must have at least one free VPC in us-east-1 and eu-central-1.
32
+
- You must have at least one free VPC in the `us-east-1` and `eu-central-1` regions to host the AWS resources that build the software inventory.
31
33
32
-
> [!NOTE]
33
-
> - Images that have at least one layer over 2GB are not scanned.
34
-
> - Public repositories and manifest lists are not supported.
34
+
For a list of the types of images not supported by Microsoft Defender for Containers, see [Availability](supported-machines-endpoint-solutions-clouds-containers.md?tabs=aws-eks#images).
35
35
36
36
## Enable vulnerability assessment
37
37
@@ -50,7 +50,7 @@ To enable vulnerability assessment:
50
50
51
51
:::image type="content" source="media/defender-for-containers-va-ecr/aws-containers-enable-va.png" alt-text="Screenshot of the toggle to turn on vulnerability assessment for ECR images.":::
0 commit comments