Skip to content

Commit 85e1e6e

Browse files
author
David Curwin
committed
last changes
1 parent 28cde2b commit 85e1e6e

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/defender-for-cloud/view-and-remediate-vulnerabilities-containers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 09/06/2023
1010
# View and remediate vulnerabilities for containers running on your Kubernetes clusters (Risk based)
1111

1212
> [!NOTE]
13-
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. If you are using the classic secure score approach, see [View and remediate vulnerabilities for images running on your Kubernetes clusters (Secure Score)](view-and-remediate-vulnerabilities-for-images-secure-score.md).
13+
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. Defender for CSPM customers should use this method. To use the classic secure score approach, see [View and remediate vulnerabilities for images running on your Kubernetes clusters (Secure Score)](view-and-remediate-vulnerabilities-for-images-secure-score.md).
1414
1515
Defender for Cloud gives its customers the ability to prioritize the remediation of vulnerabilities containers running on your Kubernetes clusters based on contextual risk analysis of the vulnerabilities in your cloud environment. In this article, we review the [Containers running in Azure should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e9acaf48-d2cf-45a3-a6e7-3caa2ef769e0) recommendation. For the other clouds, see the parallel recommendations in [Vulnerability assessments for AWS with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-aws.md) and [Vulnerability assessments for GCP with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-gcp.md).
1616

@@ -26,7 +26,7 @@ Defender for Cloud presents the findings and related information as recommendati
2626

2727
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-image-recommendation-line.png" alt-text="Screenshot showing the recommendation line for running container images should have vulnerability findings resolved." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-image-recommendation-line.png":::
2828

29-
1. The recommendation details page opens with additional information. This information includes details about your container image and the remediation steps.
29+
1. The recommendation details page opens with additional information. This information includes details about your vulnerable container and the remediation steps.
3030

3131
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-select-cluster.png" alt-text="Screenshot showing the affected clusters for the recommendation." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-select-cluster.png":::
3232

@@ -38,7 +38,7 @@ Defender for Cloud presents the findings and related information as recommendati
3838

3939
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-list-vulnerabilities.png" alt-text="Screenshot showing the container vulnerabilities." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-list-vulnerabilities.png":::
4040

41-
To find all images impacted by a specific vulnerability, you can also group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
41+
To find all containers impacted by a specific vulnerability, group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
4242

4343
For information on how to remediate the vulnerabilities, see [Remediate recommendations](implement-security-recommendations.md).
4444

articles/defender-for-cloud/view-and-remediate-vulnerability-registry-images.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 07/11/2023
99
# View and remediate vulnerabilities for registry images (Risk based)
1010

1111
> [!NOTE]
12-
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. If you are using the classic secure score approach, see [View and remediate vulnerabilities for registry images (Secure Score)](view-and-remediate-vulnerability-assessment-findings-secure-score.md).
12+
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. Defender for CSPM customers should use this method. To use the classic secure score approach, see [View and remediate vulnerabilities for registry images (Secure Score)](view-and-remediate-vulnerability-assessment-findings-secure-score.md).
1313
1414
Defender for Cloud offers customers the capability to remediate vulnerabilities in container images while they're still stored in the registry. Additionally, it conducts contextual analysis of the vulnerabilities in your environment, aiding in prioritizing remediation efforts based on the risk level associated with each vulnerability.
1515

@@ -33,7 +33,7 @@ In this article, we review the [Container images in Azure registry should have v
3333

3434
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/select-image-finding.png" alt-text="Screenshot showing the list of findings on the specific image." lightbox="media/view-and-remediate-vulnerability-assessment-findings/select-image-finding.png":::
3535

36-
To find all images impacted by a specific vulnerability, you can also group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
36+
To find all images impacted by a specific vulnerability, group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
3737

3838
For information on how to remediate the vulnerabilities, see [Remediate recommendations](implement-security-recommendations.md).
3939

0 commit comments

Comments
 (0)