You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-container-registries-usage.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,17 @@
1
1
---
2
-
title: How to use Microsoft Defender for container registries
3
-
description: Learn about using Microsoft Defender for container registries to scan Linux images in your Linux-hosted registries
4
-
ms.date: 12/09/2021
2
+
title: How to use Defender for Containers
3
+
description: Learn how to use Defender for Containers to scan Linux images in your Linux-hosted registries
4
+
ms.date: 03/07/2022
5
5
ms.topic: how-to
6
6
---
7
7
8
-
# Use Microsoft Defender for container registries to scan your images for vulnerabilities
8
+
# Use Defender for Containers to scan your ACR images for vulnerabilities
9
9
10
10
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
11
11
12
12
This page explains how to use the built-in vulnerability scanner to scan the container images stored in your Azure Resource Manager-based Azure Container Registry.
13
13
14
-
When **Microsoft Defender for container registries** is enabled, any image you push to your registry will be scanned immediately. In addition, any image pulled within the last 30 days is also scanned.
14
+
When **Defender for Containers** is enabled, any image you push to your registry will be scanned immediately. In addition, any image pulled within the last 30 days is also scanned.
15
15
16
16
When the scanner reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific registry.
17
17
@@ -22,7 +22,7 @@ When the scanner reports vulnerabilities to Defender for Cloud, Defender for Clo
22
22
23
23
To enable vulnerability scans of images stored in your Azure Resource Manager-based Azure Container Registry:
24
24
25
-
1. Enable **Microsoft Defender for container registries** for your subscription. Defender for Cloud is now ready to scan images in your registries.
25
+
1. Enable **Defender for Containers** for your subscription. Defender for Cloud is now ready to scan images in your registries.
26
26
27
27
>[!NOTE]
28
28
> This feature is charged per image.
@@ -83,22 +83,22 @@ To enable vulnerability scans of images stored in your Azure Resource Manager-ba
83
83
84
84
1. Follow the steps in the remediation section of this pane.
85
85
86
-
1. When you have taken the steps required to remediate the security issue, replace the image in your registry:
86
+
1. When you've taken the steps required to remediate the security issue, replace the image in your registry:
87
87
88
-
1. Push the updated image. This will trigger a scan.
88
+
1. Push the updated image to trigger a scan.
89
89
90
90
1. Check the recommendations page for the recommendation [Container registry images should have vulnerability findings resolved (powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
91
91
92
92
If the recommendation still appears and the image you've handled still appears in the list of vulnerable images, check the remediation steps again.
93
93
94
-
1. When you are sure the updated image has been pushed, scanned, and is no longer appearing in the recommendation, delete the “old” vulnerable image from your registry.
94
+
1. When you're sure the updated image has been pushed, scanned, and is no longer appearing in the recommendation, delete the “old” vulnerable image from your registry.
If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
101
+
If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't affect your secure score or generate unwanted noise.
102
102
103
103
When a finding matches the criteria you've defined in your disable rules, it won't appear in the list of findings. Typical scenarios include:
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-introduction.md
+17-15Lines changed: 17 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Container security with Microsoft Defender for Cloud
3
3
description: Learn about Microsoft Defender for Containers
4
4
ms.topic: overview
5
-
ms.date: 02/28/2022
5
+
ms.date: 03/09/2022
6
6
---
7
7
8
8
# Overview of Microsoft Defender for Containers
@@ -13,16 +13,15 @@ Microsoft Defender for Containers is the cloud-native solution for securing your
13
13
14
14
On this page, you'll learn how you can use Defender for Containers to improve, monitor, and maintain the security of your clusters, containers, and their applications.
15
15
16
-
## Availability
16
+
## Microsoft Defender for Containers plan availability
17
17
18
18
| Aspect | Details |
19
19
|--|--|
20
-
| Release state: | General availability (GA)<br>Where indicated, specific features are in preview. [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]|
20
+
| Release state: | General availability (GA)<br> Certain features are in preview, for a full list see the [availability](supported-machines-endpoint-solutions-clouds-containers.md) section. |
21
+
| Feature availability | Refer to the [availability](supported-machines-endpoint-solutions-clouds-containers.md) section for additional information on feature release state and availability.|
21
22
| Pricing: |**Microsoft Defender for Containers** is billed as shown on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/)|
22
-
| Registries and images: |**Supported**<br> • Linux images in Azure Container Registry (ACR) registries accessible from the public internet with shell access<br> • Private registries with access granted to [Trusted Services](../container-registry/allow-access-trusted-services.md#trusted-services)<br> • [ACR registries protected with Azure Private Link](../container-registry/container-registry-private-link.md)<br><br>**Unsupported**<br> • Windows images<br> • Super-minimalist images such as [Docker scratch](https://hub.docker.com/_/scratch/) images<br> • "Distroless" images that only contain an application and its runtime dependencies without a package manager, shell, or OS<br> • Images with [Open Container Initiative (OCI) Image Format Specification](https://github.com/opencontainers/image-spec/blob/master/spec.md)|
23
-
| Kubernetes distributions and configurations: | **Supported**<br> • Any Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters<br><br>**Unsupported**<br> • Any [taints](https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) applied to your nodes *might* disrupt the configuration of Defender for Containers<br>•The AKS Defender profile doesn't support AKS clusters that don't have RBAC role enabled.<br><br>**Tested on**<br> • [Azure Kubernetes Service](../aks/intro-kubernetes.md)<br> • [Amazon Elastic Kubernetes Service (EKS)](https://aws.amazon.com/eks/)<br> • [Google GKE Standard clusters](https://cloud.google.com/kubernetes-engine/) <br> • [Azure Kubernetes Service on Azure Stack HCI](/azure-stack/aks-hci/overview)<br> • [Kubernetes](https://kubernetes.io/docs/home/)<br> • [AKS Engine](https://github.com/Azure/aks-engine)<br> • [Azure Red Hat OpenShift](https://azure.microsoft.com/services/openshift/)<br> • [Red Hat OpenShift](https://www.openshift.com/learn/topics/kubernetes/) (version 4.6 or newer)<br> • [VMware Tanzu Kubernetes Grid](https://tanzu.vmware.com/kubernetes-grid)<br> • [Rancher Kubernetes Engine](https://rancher.com/docs/rke/latest/en/) |
24
23
| Required roles and permissions: | • To auto provision the required components, [Contributor](../role-based-access-control/built-in-roles.md#contributor), [Log Analytics Contributor](../role-based-access-control/built-in-roles.md#log-analytics-contributor), or [Azure Kubernetes Service Contributor Role](../role-based-access-control/built-in-roles.md#azure-kubernetes-service-contributor-role)<br> • **Security admin** can dismiss alerts<br> • **Security reader** can view vulnerability assessment findings<br> See also [Azure Container Registry roles and permissions](../container-registry/container-registry-roles.md)|
| Clouds: |**Azure**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National clouds (Azure Government, Azure China 21Vianet) (Except for preview features))<br><br>**Non Azure**:<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts (Preview) <br> :::image type="icon" source="./media/icons/yes-icon.png"::: Connected GCP projects (Preview) <br> :::image type="icon" source="./media/icons/yes-icon.png"::: On-prem/IaaS supported via Arc enabled Kubernetes (Preview). <br> <br>For more details, see the [availability section](supported-machines-endpoint-solutions-clouds-containers.md#defender-for-containers-feature-availability). |
26
25
|||
27
26
28
27
## What are the benefits of Microsoft Defender for Containers?
@@ -84,7 +83,7 @@ The **Azure Policy add-on for Kubernetes** collects cluster and workload configu
84
83
| azuredefender-collector-misc-*| kube-system |[Deployment](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/)| A set of containers that focus on collecting inventory and security events from the Kubernetes environment that aren't bounded to a specific node. | N/A | memory: 64Mi <br> <br>cpu: 60m | No |
85
84
| azuredefender-publisher-ds-*| kube-system |[DeamonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/)| Publish the collected data to Microsoft Defender for Containers' backend service where the data will be processed for and analyzed. | N/A | memory: 64Mi <br> <br> cpu: 60m | Https 443 <br> <br> Learn more about the [outbound access prerequisites](../aks/limit-egress-traffic.md#microsoft-defender-for-containers)|
@@ -176,17 +175,17 @@ Defender for Containers includes an integrated vulnerability scanner for scannin
176
175
177
176
There are four triggers for an image scan:
178
177
179
-
-**On push** - Whenever an image is pushed to your registry, Defender for container registries automatically scans that image. To trigger the scan of an image, push it to your repository.
178
+
-**On push** - Whenever an image is pushed to your registry, Defender for Containers automatically scans that image. To trigger the scan of an image, push it to your repository.
180
179
181
180
-**Recently pulled** - Since new vulnerabilities are discovered every day, **Microsoft Defender for Containers** also scans, on a weekly basis, any image that has been pulled within the last 30 days. There's no extra charge for these rescans; as mentioned above, you're billed once per image.
182
181
183
182
-**On import** - Azure Container Registry has import tools to bring images to your registry from Docker Hub, Microsoft Container Registry, or another Azure container registry. **Microsoft Defender for container Containers** scans any supported images you import. Learn more in [Import container images to a container registry](../container-registry/container-registry-import-images.md).
184
183
185
184
-**Continuous scan**- This trigger has two modes:
186
185
187
-
- A Continuous scan based on an image pull. This scan is performed every 7 days after an image was pulled, and only for 30 days after the image was pulled. This mode doesn't require the security profile, or extension.
186
+
- A Continuous scan based on an image pull. This scan is performed every seven days after an image was pulled, and only for 30 days after the image was pulled. This mode doesn't require the security profile, or extension.
188
187
189
-
- (Preview) Continuous scan for running images. This scan is performed every 7 days for as long as the image runs. This mode runs instead of the above mode when the Defender profile, or extension is running on the cluster.
188
+
- (Preview) Continuous scan for running images. This scan is performed every seven days for as long as the image runs. This mode runs instead of the above mode when the Defender profile, or extension is running on the cluster.
190
189
191
190
This scan typically completes within 2 minutes, but it might take up to 40 minutes. For every vulnerability identified, Defender for Cloud provides actionable recommendations, along with a severity classification, and guidance for how to remediate the issue.
192
191
@@ -197,11 +196,14 @@ Defender for Cloud filters, and classifies findings from the scanner. When an im
197
196
198
197
### View vulnerabilities for running images
199
198
200
-
Defender for Containers expands on the registry scanning features of the Defender for container registries plan by introducing the **preview feature** of run-time visibility of vulnerabilities powered by the Defender profile, or extension.
199
+
Defender for Containers expands on the registry scanning features by introducing the **preview feature** of run-time visibility of vulnerabilities powered by the Defender profile, or extension.
200
+
201
+
> [!NOTE]
202
+
> There's no Defender profile for Windows, it's only available on Linux OS.
201
203
202
204
The new recommendation, **Running container images should have vulnerability findings resolved**, only shows vulnerabilities for running images, and relies on the Defender security profile, or extension to discover which images are currently running. This recommendation groups running images that have vulnerabilities, and provides details about the issues discovered, and how to remediate them. The Defender profile, or extension is used to gain visibility into vulnerable containers that are active.
203
205
204
-
This recommendation shows running images, and their vulnerabilities based on ACR image image. Images that are deployed from a non ACR registry, will not be scanned, and will appear under the Not applicable tab.
206
+
This recommendation shows running images, and their vulnerabilities based on ACR image. Images that are deployed from a non ACR registry, won't be scanned, and will appear under the Not applicable tab.
205
207
206
208
:::image type="content" source="media/defender-for-containers/running-image-vulnerabilities-recommendation.png" alt-text="Screenshot showing where the recommendation is viewable" lightbox="media/defender-for-containers/running-image-vulnerabilities-recommendation-expanded.png":::
207
209
@@ -219,20 +221,20 @@ The full list of available alerts can be found in the [Reference table of alerts
219
221
220
222
## FAQ - Defender for Containers
221
223
222
-
-[What happens to subscriptions with Microsoft Defender for Kubernetes or Microsoft Defender for container registries enabled?](#what-happens-to-subscriptions-with-microsoft-defender-for-kubernetes-or-microsoft-defender-for-container-registries-enabled)
224
+
-[What happens to subscriptions with Microsoft Defender for Kubernetes or Microsoft Defender for Containers enabled?](#what-happens-to-subscriptions-with-microsoft-defender-for-kubernetes-or-microsoft-defender-for-containers-enabled)
223
225
-[Is Defender for Containers a mandatory upgrade?](#is-defender-for-containers-a-mandatory-upgrade)
224
226
-[Does the new plan reflect a price increase?](#does-the-new-plan-reflect-a-price-increase)
225
227
-[What are the options to enable the new plan at scale?](#what-are-the-options-to-enable-the-new-plan-at-scale)
226
228
227
-
### What happens to subscriptions with Microsoft Defender for Kubernetes or Microsoft Defender for container registries enabled?
229
+
### What happens to subscriptions with Microsoft Defender for Kubernetes or Microsoft Defender for Containers enabled?
228
230
229
231
Subscriptions that already have one of these plans enabled can continue to benefit from it.
230
232
231
233
If you haven't enabled them yet, or create a new subscription, these plans can no longer be enabled.
232
234
233
235
### Is Defender for Containers a mandatory upgrade?
234
236
235
-
No. Subscriptions that have either Microsoft Defender for Kubernetes or Microsoft Defender for container registries enabled don't need to be upgraded to the new Microsoft Defender for Containers plan. However, they won't benefit from the new and improved capabilities and they’ll have an upgrade icon shown alongside them in the Azure portal.
237
+
No. Subscriptions that have either Microsoft Defender for Kubernetes or Microsoft Defender for Containers Registries enabled doesn't need to be upgraded to the new Microsoft Defender for Containers plan. However, they won't benefit from the new and improved capabilities and they’ll have an upgrade icon shown alongside them in the Azure portal.
236
238
237
239
### Does the new plan reflect a price increase?
238
240
No. There’s no direct price increase. The new comprehensive Container security plan combines Kubernetes protection and container registry image scanning, and removes the previous dependency on the (paid) Defender for Servers plan.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-servers-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for servers - the benefits and features
3
3
description: Learn about the benefits and features of Microsoft Defender for servers.
4
-
ms.date: 11/09/2021
4
+
ms.date: 03/08/2022
5
5
ms.topic: overview
6
6
---
7
7
# Introduction to Microsoft Defender for servers
@@ -15,7 +15,7 @@ To protect machines in hybrid and multi-cloud environments, Defender for Cloud u
15
15
-[Connect your AWS accounts to Microsoft Defender for Cloud](quickstart-onboard-aws.md)
16
16
17
17
> [!TIP]
18
-
> For details of which Defender for servers features are relevant for machines running on other cloud environments, see [Supported features for virtual machines and servers](supported-machines-endpoint-solutions-clouds.md?tabs=features-windows#supported-features-for-virtual-machines-and-servers-).
18
+
> For details of which Defender for servers features are relevant for machines running on other cloud environments, see [Supported features for virtual machines and servers](supported-machines-endpoint-solutions-clouds-servers.md?tabs=features-windows#supported-features-for-virtual-machines-and-servers-).
19
19
20
20
## What are the benefits of Microsoft Defender for servers?
0 commit comments