Skip to content

Commit 83d935b

Browse files
Merge pull request #216503 from bmansheim/container-va-ecr-leftovers
container va ecr leftovers
2 parents 2de81b8 + 16e9bbb commit 83d935b

26 files changed

+65
-51
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -744,6 +744,16 @@
744744
"source_path_from_root": "/articles/defender-for-cloud/detect-credential-leaks.md",
745745
"redirect_url": "/azure/defender-for-cloud/detect-exposed-secrets",
746746
"redirect_document_id": true
747+
},
748+
{
749+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-va-ecr.md",
750+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-elastic",
751+
"redirect_document_id": true
752+
},
753+
{
754+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-containers-va-acr.md",
755+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure",
756+
"redirect_document_id": true
747757
}
748758

749759
]

articles/aks/concepts-sustainable-software-engineering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ Azure Font Door and Application Gateway help manage traffic from web application
218218

219219
Many attacks on cloud infrastructure seek to misuse deployed resources for the attacker's direct gain leading to an unnecessary spike in usage and cost. Vulnerability scanning tools help minimize the window of opportunity for attackers and mitigate any potential malicious usage of resources.
220220

221-
* Follow recommendations from [Microsoft Defender for Cloud](/security/benchmark/azure/security-control-vulnerability-management) and run automated vulnerability scanning tools such as [Defender for Containers](/azure/defender-for-cloud/defender-for-containers-va-acr) to avoid unnecessary resource usage by identifying vulnerabilities in your images and minimizing the window of opportunity for attackers.
221+
* Follow recommendations from [Microsoft Defender for Cloud](/security/benchmark/azure/security-control-vulnerability-management) and run automated vulnerability scanning tools such as [Defender for Containers](/azure/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure) to avoid unnecessary resource usage by identifying vulnerabilities in your images and minimizing the window of opportunity for attackers.
222222

223223
## Next steps
224224

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -336,10 +336,10 @@
336336
href: defender-for-containers-enable.md
337337
- name: Vulnerability assessment for Azure Container Registry
338338
displayName: ACR, registry, images, qualys
339-
href: defender-for-containers-va-acr.md
339+
href: defender-for-containers-vulnerability-assessment-azure.md
340340
- name: Vulnerability assessment for Amazon Elastic Container Registry
341341
displayName: AWS, ECR, registry, images, qualys
342-
href: defender-for-containers-va-ecr.md
342+
href: defender-for-containers-vulnerability-assessment-elastic.md
343343
- name: Kubernetes data plane hardening
344344
displayName: k8s, containers, aks
345345
href: kubernetes-workload-protections.md

articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,5 +45,5 @@ To assess your machines for vulnerabilities, you can use one of the following so
4545
Defender for Cloud also offers vulnerability assessment for your:
4646

4747
- SQL databases - [Explore vulnerability assessment reports in the vulnerability assessment dashboard](defender-for-sql-on-machines-vulnerability-assessment.md#explore-vulnerability-assessment-reports)
48-
- Azure Container Registry images - [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-containers-va-acr.md)
49-
- Amazon AWS Elastic Container Registry images - [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-containers-va-ecr.md)
48+
- Azure Container Registry images - [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
49+
- Amazon AWS Elastic Container Registry images - [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-containers-vulnerability-assessment-elastic.md)

articles/defender-for-cloud/custom-dashboards-azure-workbooks.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,8 @@ Learn more about using these scanners:
9393

9494
- [Find vulnerabilities with Microsoft threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
9595
- [Find vulnerabilities with the integrated Qualys scanner](deploy-vulnerability-assessment-vm.md)
96-
- [Scan your ACR images for vulnerabilities](defender-for-containers-va-acr.md)
97-
- [Scan your ECR images for vulnerabilities](defender-for-containers-va-ecr.md)
96+
- [Scan your ACR images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
97+
- [Scan your ECR images for vulnerabilities](defender-for-containers-vulnerability-assessment-elastic.md)
9898
- [Scan your SQL resources for vulnerabilities](defender-for-sql-on-machines-vulnerability-assessment.md)
9999

100100
Findings for each resource type are reported in separate recommendations:

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,8 +102,8 @@ Review the findings from these vulnerability scanners and respond to them all fr
102102
Learn more on the following pages:
103103

104104
- [Defender for Cloud's integrated Qualys scanner for Azure and hybrid machines](deploy-vulnerability-assessment-vm.md)
105-
- [Identify vulnerabilities in images in Azure container registries](defender-for-containers-va-acr.md)
106-
- [Identify vulnerabilities in images in AWS Elastic Container Registry](defender-for-containers-va-ecr.md)
105+
- [Identify vulnerabilities in images in Azure container registries](defender-for-containers-vulnerability-assessment-azure.md)
106+
- [Identify vulnerabilities in images in AWS Elastic Container Registry](defender-for-containers-vulnerability-assessment-elastic.md)
107107

108108
## Enforce your security policy from the top down
109109

articles/defender-for-cloud/defender-for-container-registries-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,12 +91,12 @@ If you connect unsupported registries to your Azure subscription, Defender for C
9191
### Can I customize the findings from the vulnerability scanner?
9292
Yes. If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
9393

94-
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](defender-for-containers-va-acr.md#disable-specific-findings).
94+
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](defender-for-containers-vulnerability-assessment-azure.md#disable-specific-findings).
9595

9696
### Why is Defender for Cloud alerting me to vulnerabilities about an image that isn’t in my registry?
9797
Defender for Cloud provides vulnerability assessments for every image pushed or pulled in a registry. Some images may reuse tags from an image that was already scanned. For example, you may reassign the tag “Latest” every time you add an image to a digest. In such cases, the ‘old’ image does still exist in the registry and may still be pulled by its digest. If the image has security findings and is pulled, it'll expose security vulnerabilities.
9898

9999
## Next steps
100100

101101
> [!div class="nextstepaction"]
102-
> [Scan your images for vulnerabilities](defender-for-containers-va-acr.md)
102+
> [Scan your images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)

articles/defender-for-cloud/defender-for-containers-enable.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Learn about this plan in [Overview of Microsoft Defender for Containers](defende
2727

2828
You can learn more by watching these videos from the Defender for Cloud in the Field video series:
2929

30-
- [Microsoft Defender for Containers in a multi-cloud environment](episode-nine.md)
30+
- [Microsoft Defender for Containers in a multicloud environment](episode-nine.md)
3131
- [Protect Containers in GCP with Defender for Containers](episode-ten.md)
3232

3333
::: zone pivot="defender-for-container-arc,defender-for-container-eks,defender-for-container-gke"
@@ -111,5 +111,5 @@ You can check out the following blogs:
111111

112112
Now that you enabled Defender for Containers, you can:
113113

114-
- [Scan your ACR images for vulnerabilities](defender-for-containers-va-acr.md)
115-
- [Scan your Amazon AWS ECR images for vulnerabilities](defender-for-containers-va-ecr.md)
114+
- [Scan your ACR images for vulnerabilities](defender-for-containers-vulnerability-assessment-azure.md)
115+
- [Scan your Amazon AWS ECR images for vulnerabilities](defender-for-containers-vulnerability-assessment-elastic.md)

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,8 @@ When you push an image to a container registry and while the image is stored in
6565
When the scan completes, Defender for Containers provides details for each vulnerability detected, a security classification for each vulnerability detected, and guidance on how to remediate issues and protect vulnerable attack surfaces.
6666

6767
Learn more about:
68-
- [Vulnerability assessment for Azure Container Registry (ACR)](defender-for-containers-va-acr.md)
69-
- [Vulnerability assessment for Amazon AWS Elastic Container Registry (ECR)](defender-for-containers-va-ecr.md)
68+
- [Vulnerability assessment for Azure Container Registry (ACR)](defender-for-containers-vulnerability-assessment-azure.md)
69+
- [Vulnerability assessment for Amazon AWS Elastic Container Registry (ECR)](defender-for-containers-vulnerability-assessment-elastic.md)
7070

7171
### View vulnerabilities for running images in Azure Container Registry (ACR)
7272

@@ -76,7 +76,7 @@ To provide findings for the recommendation, Defender for Cloud collects the inve
7676

7777
:::image type="content" source="media/defender-for-containers/running-image-vulnerabilities-recommendation.png" alt-text="Screenshot showing where the recommendation is viewable." lightbox="media/defender-for-containers/running-image-vulnerabilities-recommendation-expanded.png":::
7878

79-
Learn more about [viewing vulnerabilities for running images in (ACR)](defender-for-containers-va-acr.md).
79+
Learn more about [viewing vulnerabilities for running images in (ACR)](defender-for-containers-vulnerability-assessment-azure.md).
8080

8181
## Run-time protection for Kubernetes nodes and clusters
8282

@@ -103,7 +103,7 @@ Yes.
103103

104104
### Does Microsoft Defender for Containers support AKS without scale set (default)?
105105

106-
No. Only Azure Kubernetes Service (AKS) clusters that use virtual machine scale sets for the nodes is supported.
106+
No. Only Azure Kubernetes Service (AKS) clusters that use Virtual Machine Scale Sets for the nodes is supported.
107107

108108
### Do I need to install the Log Analytics VM extension on my AKS nodes for security protection?
109109

articles/defender-for-cloud/defender-for-containers-va-acr.md renamed to articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Before you can scan your ACR images:
4949

5050
Learn more in [Import container images to a container registry](../container-registry/container-registry-import-images.md)
5151

52-
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-va-ecr.md) directly from the Azure portal.
52+
You can also [scan images in Amazon AWS Elastic Container Registry](defender-for-containers-vulnerability-assessment-elastic.md) directly from the Azure portal.
5353

5454
For a list of the types of images and container registries supported by Microsoft Defender for Containers, see [Availability](supported-machines-endpoint-solutions-clouds-containers.md?tabs=azure-aks#registries-and-images).
5555

@@ -138,7 +138,7 @@ To create a rule:
138138
1. Define your criteria.
139139
1. Select **Apply rule**.
140140

141-
:::image type="content" source="./media/defender-for-containers-va-acr/new-disable-rule-for-registry-finding.png" alt-text="Create a disable rule for VA findings on registry.":::
141+
:::image type="content" source="./media/defender-for-containers-vulnerability-assessment-azure/new-disable-rule-for-registry-finding.png" alt-text="Create a disable rule for VA findings on registry.":::
142142

143143
1. To view, override, or delete a rule:
144144
1. Select **Disable rule**.

0 commit comments

Comments
 (0)