Skip to content

Commit 9bf7cfb

Browse files
Merge pull request #196263 from ElazarK/dine-policy
instructions to install defender profile
2 parents 665b0b7 + e8ed3eb commit 9bf7cfb

File tree

7 files changed

+111
-12
lines changed

7 files changed

+111
-12
lines changed

articles/defender-for-cloud/defender-for-containers-enable.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,10 @@
22
title: How to enable Microsoft Defender for Containers in Microsoft Defender for Cloud
33
description: Enable the container protections of Microsoft Defender for Containers
44
ms.topic: overview
5-
ms.author: elkrieger
6-
author: Elazark
75
zone_pivot_groups: k8s-host
8-
ms.date: 03/27/2022
6+
ms.date: 05/10/2022
97
---
8+
109
# Enable Microsoft Defender for Containers
1110

1211
Microsoft Defender for Containers is the cloud-native solution for securing your containers.
@@ -76,6 +75,18 @@ A full list of supported alerts is available in the [reference table of all Defe
7675
[!INCLUDE [Remove the extension](./includes/defender-for-containers-remove-extension.md)]
7776
::: zone-end
7877

78+
::: zone pivot="defender-for-container-aks,defender-for-container-arc"
79+
[!INCLUDE [Assign a custom workspace](./includes/defender-for-containers-assign-workspace.md)]
80+
::: zone-end
81+
7982
::: zone pivot="defender-for-container-aks"
8083
[!INCLUDE [Remove the profile](./includes/defender-for-containers-remove-profile.md)]
8184
::: zone-end
85+
86+
::: zone pivot="defender-for-container-aks,defender-for-container-arc"
87+
[!INCLUDE [FAQ](./includes/defender-for-containers-override-faq.md)]
88+
::: zone-end
89+
90+
## Next steps
91+
92+
[Use Defender for Containers to scan your ACR images for vulnerabilities](defender-for-container-registries-usage.md).
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
author: ElazarK
3+
ms.service: defender-for-cloud
4+
ms.topic: include
5+
ms.date: 05/10/2022
6+
ms.author: elkrieger
7+
---
8+
9+
## Default Log Analytics workspace
10+
11+
The Log Analytics workspace is used by the Defender profile/extension as a data pipeline to send data from the cluster to Defender for Cloud without retaining any data in the Log Analytics workspace itself. As a result, users will not be billed in this use case.
12+
13+
The Defender profile/extension uses a default Log Analytics workspace. If you do not already have a default Log Analytics workspace, Defender for Cloud will create a new resource group and default workspace when the Defender profile/extension is installed. The default workspace is created based on your [region](../faq-data-collection-agents.yml).
14+
15+
The naming convention for the default Log Analytics workspace and resource group is:
16+
- **Workspace**: DefaultWorkspace-\[subscription-ID]-\[geo]
17+
- **Resource Group**: DefaultResourceGroup-\[geo]
18+
19+
### Assign a custom workspace
20+
21+
Once the Defender profile/extension has been deployed, a default workspace will be automatically assigned. You can assign a custom workspace through Azure Policy.
22+
23+
**To assign custom workspace**:
24+
25+
1. Sign in to the [Azure portal](https://portal.azure.com).
26+
27+
1. Search for, and select **Policy**.
28+
29+
:::image type="content" source="../media/defender-for-containers/find-policy.png" alt-text="Screenshot that shows how to locate the policy page." lightbox="../media/defender-for-containers/find-policy.png":::
30+
31+
1. Select **Definitions**.
32+
33+
1. Search for policy ID `64def556-fbad-4622-930e-72d1d5589bf5`.
34+
35+
:::image type="content" source="../media/defender-for-containers/policy-search.png" alt-text="Screenshot that shows where to search for the policy by I D number." lightbox="../media/defender-for-containers/policy-search.png":::
36+
37+
1. Select **\[Preview]: Configure Azure Kubernetes Service clusters to enable Defender profile**.
38+
39+
1. Select **Assign**.
40+
41+
1. In the **Parameters** tab, deselect the **Only show parameters that need input or review** option.
42+
43+
1. Enter `LogAnalyticsWorkspaceResource`.
44+
45+
1. Select **Review + create**.
46+
47+
1. Select **Create**.

articles/defender-for-cloud/includes/defender-for-containers-enable-plan-aks.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,15 @@
11
---
2-
author: bmansheim
3-
ms.author: benmansheim
2+
author: ElazarK
3+
ms.author: elkrieger
44
ms.service: defender-for-cloud
55
ms.topic: include
6-
ms.date: 04/28/2022
6+
ms.date: 05/10/2022
77
---
8+
89
## Enable the plan
910

11+
**To enable the plan**:
12+
1013
1. From Defender for Cloud's menu, open the [Environment settings page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/EnvironmentSettings) and select the relevant subscription.
1114

1215
1. In the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier), enable **Defender for Containers**
@@ -16,7 +19,7 @@ ms.date: 04/28/2022
1619
>
1720
> :::image type="content" source="../media/release-notes/defender-plans-deprecated-indicator.png" alt-text="Defender for container registries and Defender for Kubernetes plans showing 'Deprecated' and upgrade information.":::
1821
19-
1. By default, when enabling the plan through the Azure Portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan.
22+
1. By default, when enabling the plan through the Azure portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan, including the assignment of a default workspace.
2023

2124
Optionally, you can modify this configuration from the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier) or from the [Auto provisioning page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/dataCollection) on the **Microsoft Defender for Containers components (preview)** row:
2225

@@ -25,6 +28,8 @@ ms.date: 04/28/2022
2528
> [!NOTE]
2629
> If you choose to **disable the plan** at any time after enabling it through the portal as shown above, you'll need to manually remove Defender for Containers components deployed on your clusters.
2730
31+
You can assign a custom workspace through Azure Policy.
32+
2833
1. If you disable the auto provisioning of any component, you can easily deploy the component to one or more clusters using the appropriate recommendation:
2934

3035
- Policy Add-on for Kubernetes - [Azure Kubernetes Service clusters should have the Azure Policy Add-on for Kubernetes installed](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/08e628db-e2ed-4793-bc91-d13e684401c3)
@@ -40,6 +45,8 @@ ms.date: 04/28/2022
4045

4146
You can enable the Defender for Containers plan and deploy all of the relevant components from the Azure portal, the REST API, or with a Resource Manager template. For detailed steps, select the relevant tab.
4247

48+
Once the Defender profile has been deployed, a default workspace will be automatically assigned. You can override the default workspace and make a change through Azure Policy by assigning a custom workspace
49+
4350
The Defender security profile is a preview feature. [!INCLUDE [Legalese](../../../includes/defender-for-cloud-preview-legal-text.md)]
4451

4552
### [**Azure portal**](#tab/aks-deploy-portal)
@@ -142,4 +149,4 @@ To install the 'SecurityProfile' on an existing cluster with Resource Manager:
142149
},
143150
}
144151
}
145-
```
152+
```

articles/defender-for-cloud/includes/defender-for-containers-enable-plan-arc.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
---
2-
author: bmansheim
3-
ms.author: benmansheim
2+
author: ElazarK
3+
ms.author: elkrieger
44
ms.service: defender-for-cloud
55
ms.topic: include
6-
ms.date: 04/28/2022
6+
ms.date: 05/10/2022
77

88
---
99
## Enable the plan
1010

11+
**To enable the plan**:
12+
1113
1. From Defender for Cloud's menu, open the [Environment settings page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/EnvironmentSettings) and select the relevant subscription.
1214

1315
1. In the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier), enable **Defender for Containers**
@@ -17,7 +19,7 @@ ms.date: 04/28/2022
1719
>
1820
> :::image type="content" source="../media/release-notes/defender-plans-deprecated-indicator.png" alt-text="Defender for container registries and Defender for Kubernetes plans showing 'Deprecated' and upgrade information.":::
1921
20-
1. By default, when enabling the plan through the Azure Portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan.
22+
1. By default, when enabling the plan through the Azure portal, [Microsoft Defender for Containers](../defender-for-containers-introduction.md) is configured to auto provision (automatically install) required components to provide the protections offered by plan, including the assignment of a default workspace.
2123

2224
Optionally, you can modify this configuration from the [Defender plans page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/pricingTier) or from the [Auto provisioning page](https://portal.azure.com/#blade/Microsoft_Azure_Security/SecurityMenuBlade/dataCollection) on the **Microsoft Defender for Containers components (preview)** row:
2325

@@ -26,6 +28,8 @@ ms.date: 04/28/2022
2628
> [!NOTE]
2729
> If you choose to **disable the plan** at any time after enabling it through the portal as shown above, you'll need to manually remove Defender for Containers components deployed on your clusters.
2830
31+
You can assign a custom workspace through Azure Policy.
32+
2933
1. If you disable the auto provisioning of any component, you can easily deploy the component to one or more clusters using the appropriate recommendation:
3034

3135
- Policy Add-on for Kubernetes - [Azure Kubernetes Service clusters should have the Azure Policy Add-on for Kubernetes installed](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/08e628db-e2ed-4793-bc91-d13e684401c3)
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
author: ElazarK
3+
ms.author: elkrieger
4+
ms.service: defender-for-cloud
5+
ms.topic: include
6+
ms.date: 05/10/2022
7+
---
8+
9+
## FAQ
10+
11+
- [How can I use my existing Log Analytics workspace?](#how-can-i-use-my-existing-log-analytics-workspace)
12+
- [Can I delete the default workspaces created by Defender for Cloud?](#can-i-delete-the-default-workspaces-created-by-defender-for-cloud)
13+
- [I deleted my default workspace, how can I get it back?](#i-deleted-my-default-workspace-how-can-i-get-it-back)
14+
- [Where is the default Log Analytics workspace located?](#where-is-the-default-log-analytics-workspace-located)
15+
16+
### How can I use my existing Log Analytics workspace?
17+
18+
You can use your existing Log Analytics workspace by following the steps in the Assign a custom workspace section of this article.
19+
20+
### Can I delete the default workspaces created by Defender for Cloud?
21+
22+
We do not recommend deleting the default workspace. Defender for Containers uses the default workspaces to collect security data from your clusters. Defender for Containers will be unable to collect data, and some security recommendations and alerts, will become unavailable if you delete the default workspace.
23+
24+
### I deleted my default workspace, how can I get it back?
25+
26+
To recover your default workspace, you need to remove the Defender profile/extension, and reinstall the agent. Reinstalling the Defender profile/extension creates a new default workspace.
27+
28+
### Where is the default Log Analytics workspace located?
29+
30+
Depending on your region the default Log Analytics workspace located will be located in various locations. To check your region see [Where is the default Log Analytics workspace created?](../faq-data-collection-agents.yml)
37.3 KB
Loading
54.7 KB
Loading

0 commit comments

Comments
 (0)