Skip to content

Commit 8138e09

Browse files
authored
Merge pull request #196266 from bmansheim/update-container-availability-assessment
Update name of container image vulnerability recommendation; specify powered by Qualys
2 parents 8a409ab + 3d7abe0 commit 8138e09

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/defender-for-cloud/defender-for-container-registries-usage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This page explains how to use the built-in vulnerability scanner to scan the con
1515

1616
When **Defender for Containers** is enabled, any image you push to your registry will be scanned immediately. In addition, any image pulled within the last 30 days is also scanned.
1717

18-
When the scanner reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific registry.
18+
When the scanner, powered by Qualys, reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific registry.
1919

2020
> [!TIP]
2121
> You can also scan container images for vulnerabilities as the images are built in your CI/CD GitHub workflows. Learn more in [Identify vulnerable container images in your CI/CD workflows](defender-for-container-registries-cicd.md).
@@ -47,7 +47,7 @@ To enable vulnerability scans of images stored in your Azure Resource Manager-ba
4747

4848
## View and remediate findings
4949

50-
1. To view the findings, open the **Recommendations** page. If issues were found, you'll see the recommendation [Container registry images should have vulnerability findings resolved (powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
50+
1. To view the findings, open the **Recommendations** page. If issues were found, you'll see the recommendation [Container registry images should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
5151

5252
![Recommendation to remediate issues .](media/monitor-container-security/acr-finding.png)
5353

@@ -89,7 +89,7 @@ To enable vulnerability scans of images stored in your Azure Resource Manager-ba
8989

9090
1. Push the updated image to trigger a scan.
9191

92-
1. Check the recommendations page for the recommendation [Container registry images should have vulnerability findings resolved (powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
92+
1. Check the recommendations page for the recommendation [Container registry images should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
9393

9494
If the recommendation still appears and the image you've handled still appears in the list of vulnerable images, check the remediation steps again.
9595

@@ -125,7 +125,7 @@ You can use any of the following criteria:
125125

126126
To create a rule:
127127

128-
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved (powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648), select **Disable rule**.
128+
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648), select **Disable rule**.
129129
1. Select the relevant scope.
130130
1. Define your criteria.
131131
1. Select **Apply rule**.

0 commit comments

Comments
 (0)