Skip to content

Commit 80472bd

Browse files
Merge pull request #239586 from AlizaBernstein/WI-patch-capabilities-list
WI-patch-capabilities-list
2 parents 36151ea + f1a14cf commit 80472bd

File tree

1 file changed

+4
-15
lines changed

1 file changed

+4
-15
lines changed

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -17,23 +17,12 @@ Learn more about [CSPM](concept-cloud-security-posture-management.md).
1717

1818
Agentless Container Posture provides the following capabilities:
1919

20+
- [Agentless discovery and visibility](#agentless-discovery-and-visibility-within-kubernetes-components) within Kubernetes components.
21+
- [Agentless container registry vulnerability assessment](#agentless-container-registry-vulnerability-assessment), using the image scanning results of your Azure Container Registry (ACR) with cloud security explorer.
2022
- Using Kubernetes [attack path analysis](concept-attack-path.md) to visualize risks and threats to Kubernetes environments.
21-
22-
- Using cloud security explorer for risk hunting by querying various risk scenarios.
23-
24-
- Viewing security insights, such as internet exposure, and other pre-defined security scenarios. For more information, search for `Kubernetes` in the [list of Insights](attack-path-reference.md#insights).
25-
26-
- Agentless discovery and visibility within Kubernetes components.
27-
28-
- Agentless container registry vulnerability assessment, using the image scanning results of your Azure Container Registry (ACR) with cloud security explorer.
29-
3023
- Using [cloud security explorer](how-to-manage-cloud-security-explorer.md) for risk hunting by querying various risk scenarios.
24+
- Viewing security insights, such as internet exposure, and other predefined security scenarios. For more information, search for `Kubernetes` in the [list of Insights](attack-path-reference.md#insights).
3125

32-
- Viewing security insights, such as internet exposure, and other predefined security scenarios. For more information, search for Kubernetes in the [list of Insights](attack-path-reference.md#cloud-security-graph-components-list).
33-
34-
- [Agentless discovery and visibility within Kubernetes components](#agentless-discovery-and-visibility-within-kubernetes-components)
35-
36-
- [Container registry vulnerability assessment](#container-registry-vulnerability-assessment)
3726

3827
## Agentless discovery and visibility within Kubernetes components
3928

@@ -65,7 +54,7 @@ By enabling the Agentless discovery for Kubernetes extension, the following proc
6554
- **Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
6655

6756

68-
## Container registry vulnerability assessment
57+
## Agentless Container registry vulnerability assessment
6958

7059
- Container registry vulnerability assessment scans images in your Azure Container Registry (ACR) to provide recommendations for improving your posture by remediating vulnerabilities.
7160

0 commit comments

Comments
 (0)