Skip to content

Commit 962b180

Browse files
committed
VA and RN
1 parent 73b46fd commit 962b180

File tree

2 files changed

+15
-13
lines changed

2 files changed

+15
-13
lines changed

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ ms.topic: how-to
88
ms.custom: ignite-2022
99
---
1010

11-
# Use Defender for Containers to scan your Azure Container Registry images for vulnerabilities
11+
# Scan your Azure Container Registry images for vulnerabilities
1212

13-
This article explains how to use Defender for Containers to scan the container images stored in your Azure Resource Manager-based Azure Container Registry, as part of the protections provided within Microsoft Defender for Cloud.
13+
As part of the protections provided within Microsoft Defender for Cloud, you can scan the container images that are stored in your Azure Resource Manager-based Azure Container Registry.
1414

15-
To enable scanning of vulnerabilities in containers, you have to [enable Defender for Containers](defender-for-containers-enable.md). When the scanner, powered by Qualys, reports vulnerabilities, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific registry.
15+
When the scanner, powered by Qualys, reports vulnerabilities, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific registry.
1616

1717
Defender for Cloud filters and classifies findings from the scanner. Images without vulnerabilities are marked as healthy and Defender for Cloud doesn't send notifications about healthy images to keep you from getting unwanted informational alerts.
1818

@@ -29,7 +29,7 @@ The triggers for an image scan are:
2929
- A continuous scan based on an image pull. This scan is performed every seven days after an image was pulled, and only for 30 days after the image was pulled. This mode doesn't require the security profile, or extension.
3030

3131
- Continuous scan for running images. This scan is performed every seven days for as long as the image runs. This mode runs instead of the above mode when the Defender profile, or extension is running on the cluster.
32-
32+
3333
When a scan is triggered, findings are available as Defender for Cloud recommendations from 2 minutes up to 15 minutes after the scan is complete.
3434

3535
## Prerequisites

articles/defender-for-cloud/release-notes.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,19 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
2020

2121
Updates in April include:
2222

23+
- [Agentless Container Posture in Defender CSPM (Preview)](#agentless-container-posture-in-defender-cspm-preview)
2324
- [New preview Unified Disk Encryption recommendation](#unified-disk-encryption-recommendation-preview)
2425
- [Changes in the recommendation "Machines should be configured securely"](#changes-in-the-recommendation-machines-should-be-configured-securely)
25-
- [Agentless Container Posture](#agentless-container-posture)
26+
27+
### Agentless Container Posture in Defender CSPM (Preview)
28+
29+
The new Agentless Container Posture (Preview) capabilities are available in preview as part of the Defender CSPM (Cloud Security Posture Management) plan.
30+
31+
Agentless Container Posture allows security teams to identify security risks in containers and Kubernetes realms. An agentless approach allows security teams to gain visibility into their Kubernetes and containers registries across SDLC and runtime, removing friction and footprint from the workloads.
32+
33+
Agentless Container Posture offer out-of-the-box container vulnerability assessments that, combined with attack path analysis, enable security teams to prioritize and zoom into specific container vulnerabilities. You can also use cloud security explorer to uncover risks and hunt for container posture insights, such as discovery of applications running vulnerable images or exposed to the internet.
34+
35+
Learn more at [Agentless Container Posture (Preview)](concept-agentless-containers.md).
2636

2737
### Unified Disk Encryption recommendation (preview)
2838

@@ -47,14 +57,6 @@ As part of this update, the recommendation's ID was changed from `181ac480-f7c4-
4757

4858
No action is required on the customer side, and there's no expected impact on the secure score.
4959

50-
### Agentless Container Posture
51-
52-
Agentless Container Posture allows security teams to identify security risks in containers and Kubernetes realms. An agentless approach allows security teams to have visibility into their Kubernetes and containers registries across SDLC and runtime, removing friction and footprint from the workloads.
53-
54-
Agentless Container Posture offer out-of-the-box container vulnerability assessments that, combined with attack path analysis, enable security teams to prioritize and zoom into specific container vulnerabilities. You can also use cloud security explorer to uncover risks and hunt for container posture insights, such as discovery of applications running vulnerable images or exposed to the internet.
55-
56-
Learn more at [Agentless Container Posture (Preview)](concept-agentless-containers.md).
57-
5860
## March 2023
5961

6062
Updates in March include:

0 commit comments

Comments
 (0)