|
| 1 | +--- |
| 2 | +title: Disable vulnerability assessment findings on Container registry images and running images in Microsoft Defender for Cloud |
| 3 | +description: Microsoft Defender for Cloud includes a fully integrated agentless vulnerability assessment solution powered by MDVM (Microsoft Defender Vulnerability Management). |
| 4 | +ms.topic: how-to |
| 5 | +ms.date: 07/09/2023 |
| 6 | +--- |
| 7 | + |
| 8 | +# Disable vulnerability assessment findings on container registry images |
| 9 | + |
| 10 | +If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't affect your secure score or generate unwanted noise. |
| 11 | + |
| 12 | +When a finding matches the criteria you've defined in your disable rules, it doesn't appear in the list of findings. Typical scenario examples include: |
| 13 | + |
| 14 | +- Disable findings with severity below medium |
| 15 | +- Disable findings for images that the vendor will not fix |
| 16 | + |
| 17 | +> [!IMPORTANT] |
| 18 | +> To create a rule, you need permissions to edit a policy in Azure Policy. |
| 19 | +> Learn more in [Azure RBAC permissions in Azure Policy](../governance/policy/overview.md#azure-rbac-permissions-in-azure-policy). |
| 20 | +
|
| 21 | + |
| 22 | +You can use a combination of any of the following criteria: |
| 23 | + |
| 24 | +- **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346. |
| 25 | +- **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c |
| 26 | +- **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17 |
| 27 | +- **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than and equal to the specified severity level. |
| 28 | +- **Fix status** - Select the option to exclude vulnerabilities based on their fix status. |
| 29 | + |
| 30 | + |
| 31 | +Disable rules apply per recommendation, for example, to disable [CVE-2017-17512](https://github.com/advisories/GHSA-fc69-2v7r-7r95) both on the registry images and runtime images, the disable rule has to be configured in both places. |
| 32 | + |
| 33 | +> [!NOTE] |
| 34 | +> The [Azure Preview Supplemental Terms](//azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability. |
| 35 | +
|
| 36 | + To create a rule: |
| 37 | + |
| 38 | +1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) or [Running container images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management |
| 39 | +](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5), select **Disable rule**. |
| 40 | + |
| 41 | +1. Select the relevant scope. |
| 42 | + |
| 43 | +1. Define your criteria. You can use any of the following criteria: |
| 44 | + |
| 45 | + - **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346. |
| 46 | + - **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c |
| 47 | + - **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17 |
| 48 | + - **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than and equal to the specified severity level. |
| 49 | + - **Fix status** - Select the option to exclude vulnerabilities based on their fix status. |
| 50 | + |
| 51 | +1. In the justification text box, add your justification for why a specific vulnerability was disabled. This provides clarity and understanding for anyone reviewing the rule. |
| 52 | + |
| 53 | +1. Select **Apply rule**. |
| 54 | + |
| 55 | + :::image type="content" source="./media/disable-vulnerability-findings-containers/disable-rules.png" alt-text="Screenshot showing where to create a disable rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/disable-rules.png"::: |
| 56 | + |
| 57 | + > [!IMPORTANT] |
| 58 | + > Changes might take up to 24hrs to take effect. |
| 59 | +
|
| 60 | +**To view, override, or delete a rule:** |
| 61 | + |
| 62 | +1. From the recommendations detail page, select **Disable rule**. |
| 63 | +1. From the scope list, subscriptions with active rules show as **Rule applied**. |
| 64 | +1. To view or delete the rule, select the ellipsis menu ("..."). |
| 65 | +1. Do one of the following: |
| 66 | + - To view or override a disable rule - select **View rule**, make any changes you want, and select **Override rule**. |
| 67 | + - To delete a disable rule - select **Delete rule**. |
| 68 | + |
| 69 | + :::image type="content" source="./media/disable-vulnerability-findings-containers/override-rules.png" alt-text="Screenshot showing where to view, delete or override a rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/override-rules.png"::: |
| 70 | + |
| 71 | + |
| 72 | +## Next steps |
| 73 | + |
| 74 | +- Learn how to [view and remediate vulnerability assessment findings for registry images](view-and-remediate-vulnerability-assessment-findings.md). |
| 75 | +- Learn about [agentless container posture](concept-agentless-containers.md). |
| 76 | + |
0 commit comments