You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/view-and-remediate-vulnerabilities-containers.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 09/06/2023
10
10
# View and remediate vulnerabilities for containers running on your Kubernetes clusters (Risk based)
11
11
12
12
> [!NOTE]
13
-
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. If you are using the classic secure score approach, see [View and remediate vulnerabilities for images running on your Kubernetes clusters (Secure Score)](view-and-remediate-vulnerabilities-for-images-secure-score.md).
13
+
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. Defender for CSPM customers should use this method. To use the classic secure score approach, see [View and remediate vulnerabilities for images running on your Kubernetes clusters (Secure Score)](view-and-remediate-vulnerabilities-for-images-secure-score.md).
14
14
15
15
Defender for Cloud gives its customers the ability to prioritize the remediation of vulnerabilities containers running on your Kubernetes clusters based on contextual risk analysis of the vulnerabilities in your cloud environment. In this article, we review the [Containers running in Azure should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/e9acaf48-d2cf-45a3-a6e7-3caa2ef769e0) recommendation. For the other clouds, see the parallel recommendations in [Vulnerability assessments for AWS with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-aws.md) and [Vulnerability assessments for GCP with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-gcp.md).
16
16
@@ -26,7 +26,7 @@ Defender for Cloud presents the findings and related information as recommendati
26
26
27
27
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-image-recommendation-line.png" alt-text="Screenshot showing the recommendation line for running container images should have vulnerability findings resolved." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-image-recommendation-line.png":::
28
28
29
-
1. The recommendation details page opens with additional information. This information includes details about your container image and the remediation steps.
29
+
1. The recommendation details page opens with additional information. This information includes details about your vulnerable container and the remediation steps.
30
30
31
31
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-select-cluster.png" alt-text="Screenshot showing the affected clusters for the recommendation." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-select-cluster.png":::
32
32
@@ -38,7 +38,7 @@ Defender for Cloud presents the findings and related information as recommendati
38
38
39
39
:::image type="content" source="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-list-vulnerabilities.png" alt-text="Screenshot showing the container vulnerabilities." lightbox="media/view-and-remediate-vulnerabilities-for-images-running-on-aks/running-list-vulnerabilities.png":::
40
40
41
-
To find all images impacted by a specific vulnerability, you can also group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
41
+
To find all containers impacted by a specific vulnerability, group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
42
42
43
43
For information on how to remediate the vulnerabilities, see [Remediate recommendations](implement-security-recommendations.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/view-and-remediate-vulnerability-registry-images.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.date: 07/11/2023
9
9
# View and remediate vulnerabilities for registry images (Risk based)
10
10
11
11
> [!NOTE]
12
-
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. If you are using the classic secure score approach, see [View and remediate vulnerabilities for registry images (Secure Score)](view-and-remediate-vulnerability-assessment-findings-secure-score.md).
12
+
> This page describes the new risk-based approach to vulnerability management in Defender for Cloud. Defender for CSPM customers should use this method. To use the classic secure score approach, see [View and remediate vulnerabilities for registry images (Secure Score)](view-and-remediate-vulnerability-assessment-findings-secure-score.md).
13
13
14
14
Defender for Cloud offers customers the capability to remediate vulnerabilities in container images while they're still stored in the registry. Additionally, it conducts contextual analysis of the vulnerabilities in your environment, aiding in prioritizing remediation efforts based on the risk level associated with each vulnerability.
15
15
@@ -33,7 +33,7 @@ In this article, we review the [Container images in Azure registry should have v
33
33
34
34
:::image type="content" source="media/view-and-remediate-vulnerability-assessment-findings/select-image-finding.png" alt-text="Screenshot showing the list of findings on the specific image." lightbox="media/view-and-remediate-vulnerability-assessment-findings/select-image-finding.png":::
35
35
36
-
To find all images impacted by a specific vulnerability, you can also group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
36
+
To find all images impacted by a specific vulnerability, group recommendations by title. For more information, see [Group recommendations by title](review-security-recommendations.md#group-recommendations-by-title).
37
37
38
38
For information on how to remediate the vulnerabilities, see [Remediate recommendations](implement-security-recommendations.md).
0 commit comments