Skip to content

Commit a7954bd

Browse files
committed
additional changes
1 parent 39f3137 commit a7954bd

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,11 @@ Defender for Containers assists you with the three core aspects of container sec
1313

1414
- [**Environment hardening**](#hardening) - Defender for Containers protects your Kubernetes clusters whether they're running on Azure Kubernetes Service, Kubernetes on-premises/IaaS, or Amazon EKS. Defender for Containers continuously assesses clusters to provide visibility into misconfigurations and guidelines to help mitigate identified threats.
1515

16-
- [**Vulnerability assessment**](#vulnerability-assessment) - Vulnerability assessment and management tools for images **stored** in ACR registries and **running** in Azure Kubernetes Service.
16+
- [**Vulnerability assessment**](#vulnerability-assessment) - Vulnerability assessment and management tools for images stored in ACR registries and running in Azure Kubernetes Service.
1717

1818
- [**Run-time threat protection for nodes and clusters**](#run-time-protection-for-kubernetes-nodes-and-clusters) - Threat protection for clusters and Linux nodes generates security alerts for suspicious activities.
1919

20-
You can learn more by watching this video from the Defender for Cloud in the Field video series:
21-
- [Microsoft Defender for Containers](episode-three.md)
20+
You can learn more by watching this video from the Defender for Cloud in the Field video series: [Microsoft Defender for Containers](episode-three.md).
2221

2322
## Microsoft Defender for Containers plan availability
2423

@@ -50,26 +49,26 @@ With the add-on on your AKS cluster, every request to the Kubernetes API server
5049

5150
For example, you can mandate that privileged containers shouldn't be created, and any future requests to do so will be blocked.
5251

53-
Learn more in [Kubernetes data plane hardening](kubernetes-workload-protections.md).
52+
You can learn more about [Kubernetes data plane hardening](kubernetes-workload-protections.md).
5453

5554
## Vulnerability assessment
5655

5756
### Scanning images in ACR registries
5857

5958
Defender for Containers includes an integrated vulnerability scanner for scanning images in Azure Container Registry registries. The vulnerability scanner runs on an image:
6059

61-
- When you push the image to your registry
62-
- Weekly on any image that was pulled within the last 30
63-
- When you import the image to your Azure Container Registry
64-
- Continuously in specific situations
60+
- When you push the image to your registry
61+
- Weekly on any image that was pulled within the last 30
62+
- When you import the image to your Azure Container Registry
63+
- Continuously in specific situations
6564

6665
Learn more in [Vulnerability assessment](defender-for-containers-usage.md).
6766

6867
:::image type="content" source="./media/defender-for-containers/recommendation-acr-images-with-vulnerabilities.png" alt-text="Sample Microsoft Defender for Cloud recommendation about vulnerabilities discovered in Azure Container Registry (ACR) hosted images." lightbox="./media/defender-for-containers/recommendation-acr-images-with-vulnerabilities.png":::
6968

7069
### View vulnerabilities for running images
7170

72-
The recommendation **Running container images should have vulnerability findings resolved** shows vulnerabilities for running images by using the scan results from ACR registries and information on running images from the Defender security profile/extension. Images that are deployed from a non-ACR registry, will appear under the **Not applicable** tab.
71+
The recommendation `Running container images should have vulnerability findings resolved` shows vulnerabilities for running images by using the scan results from ACR registries and information on running images from the Defender security profile/extension. Images that are deployed from a non-ACR registry, will appear under the Not applicable tab.
7372

7473
:::image type="content" source="media/defender-for-containers/running-image-vulnerabilities-recommendation.png" alt-text="Screenshot showing where the recommendation is viewable." lightbox="media/defender-for-containers/running-image-vulnerabilities-recommendation-expanded.png":::
7574

0 commit comments

Comments
 (0)