Skip to content

Commit 963ddc3

Browse files
committed
Changes as requested by PM
1 parent 62593d5 commit 963ddc3

File tree

1 file changed

+13
-11
lines changed

1 file changed

+13
-11
lines changed

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,16 @@ ms.devlang: na
1010
ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: na
13-
ms.date: 12/13/2019
13+
ms.date: 03/22/2020
1414
ms.author: memildin
1515

1616
---
1717

1818
# Integrated vulnerability scanner for virtual machines (Standard tier only)
1919

20-
The vulnerability scanner included with Azure Security Center is powered by Qualys and widely recognized as the leading tool for identifying vulnerabilities in real time across your Azure Virtual Machines. It's only available to users on the standard pricing tier. This feature is currently in preview.
20+
The vulnerability scanner included with Azure Security Center is powered by Qualys. Qualys's scanner is the leading tool for real-time identification of vulnerabilities in your Azure Virtual Machines. It's only available to users on the standard pricing tier. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Security Center.
21+
22+
This feature is currently in preview.
2123

2224
> [!NOTE]
2325
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md).
@@ -38,7 +40,7 @@ To deploy the vulnerability scanner extension:
3840

3941
* **Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
4042
* **Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
41-
* **Not applicable resources** – these VMs cant have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
43+
* **Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
4244

4345
- All versions of Windows
4446
- Red Hat Enterprise Linux 6.7, 7.6
@@ -54,11 +56,11 @@ To deploy the vulnerability scanner extension:
5456

5557
The scanner extension will be installed on all of the selected VMs.
5658

57-
Scanning begins automatically as soon as the extension is successfully deployed.
59+
Scanning begins automatically as soon as the extension is successfully deployed. Scans will then run at four-hour intervals. This interval is hard-coded and not configurable.
5860

5961
## Viewing and remediating discovered vulnerabilities
6062

61-
When Security Center identifies vulnerabilities, it presents findings and related information (remediation steps, related CVEs, CVSS scores, and more) as recommendations. You can view the identified vulnerabilities for one or more subscriptions, or for a specific virtual machine.
63+
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific virtual machine.
6264

6365
To see the findings and remediate the identified vulnerability:
6466

@@ -108,9 +110,9 @@ You'll need the following details:
108110
* On Windows, the extension is called "WindowsAgent.AzureSecurityCenter" and provider name is "Qualys"
109111

110112
### How does the extension get updated?
111-
Like the Azure Security Center agent as well as all Azure extensions, minor versions of the Qualys scanner may be automatically updated in the background. All agents and extensions are tested extensively before being automatically deployed.
113+
Like the Azure Security Center agent itself and all other Azure extensions, minor updates of the Qualys scanner may automatically happen in the background. All agents and extensions are tested extensively before being automatically deployed.
112114

113-
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you are running v1.0.0.4, you must take the following steps**:
115+
Some updates to the vulnerability scanner extension may require manual deployment. For example, **if you're running v1.0.0.4, you must take the following steps**:
114116

115117
1. Verify the version of the Qualys vulnerability scanner extension running on your VM:
116118

@@ -135,7 +137,7 @@ When you open the recommendation, you'll see your VMs in one or more of the foll
135137

136138
- **Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
137139
- **Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
138-
- **Not applicable resources** – These VMs cant have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
140+
- **Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
139141

140142
- All versions of Windows
141143
- Red Hat Enterprise Linux 6.7, 7.6
@@ -146,15 +148,15 @@ When you open the recommendation, you'll see your VMs in one or more of the foll
146148
- Debian 7, 8
147149

148150
### What is scanned by the built-in vulnerability scanner?
149-
The scanner is running on your virtual machine and looking for vulnerabilities of the VM itself. From the virtual machine, it cannot scan your network.
151+
The scanner is running on your virtual machine and looking for vulnerabilities of the VM itself. From the virtual machine, it can't scan your network.
150152

151153
### Does the scanner integrate with my existing Qualys console?
152154
The Security Center extension is a separate tool from your existing Qualys scanner and, because of licensing restrictions, can only be used within Azure Security Center.
153155

154156
### Microsoft Defender Advanced Threat Protection also includes Threat & Vulnerability Management (TVM). How is the Security Center Vulnerability Assessment extension different?
155-
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATPs Threat & Vulnerability Management solution, built into Windows.
157+
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATP's Threat & Vulnerability Management solution, built into Windows.
156158

157-
Today, Azure Security Centers Vulnerability Assessment extension is powered by Qualys. This ensures support for both Windows and Linux virtual machines. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
159+
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. This ensures support for both Windows and Linux virtual machines. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
158160

159161
## Next steps
160162
This article described the Azure Security Center Vulnerability Assessment extension (powered by Qualys) for scanning your VMs. For related material, see the following articles:

0 commit comments

Comments
 (0)