You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-introduction.md
+8-9Lines changed: 8 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,12 +13,11 @@ Defender for Containers assists you with the three core aspects of container sec
13
13
14
14
-[**Environment hardening**](#hardening) - Defender for Containers protects your Kubernetes clusters whether they're running on Azure Kubernetes Service, Kubernetes on-premises/IaaS, or Amazon EKS. Defender for Containers continuously assesses clusters to provide visibility into misconfigurations and guidelines to help mitigate identified threats.
15
15
16
-
-[**Vulnerability assessment**](#vulnerability-assessment) - Vulnerability assessment and management tools for images **stored** in ACR registries and **running** in Azure Kubernetes Service.
16
+
-[**Vulnerability assessment**](#vulnerability-assessment) - Vulnerability assessment and management tools for images stored in ACR registries and running in Azure Kubernetes Service.
17
17
18
18
-[**Run-time threat protection for nodes and clusters**](#run-time-protection-for-kubernetes-nodes-and-clusters) - Threat protection for clusters and Linux nodes generates security alerts for suspicious activities.
19
19
20
-
You can learn more by watching this video from the Defender for Cloud in the Field video series:
21
-
-[Microsoft Defender for Containers](episode-three.md)
20
+
You can learn more by watching this video from the Defender for Cloud in the Field video series: [Microsoft Defender for Containers](episode-three.md).
22
21
23
22
## Microsoft Defender for Containers plan availability
24
23
@@ -50,26 +49,26 @@ With the add-on on your AKS cluster, every request to the Kubernetes API server
50
49
51
50
For example, you can mandate that privileged containers shouldn't be created, and any future requests to do so will be blocked.
52
51
53
-
Learn more in[Kubernetes data plane hardening](kubernetes-workload-protections.md).
52
+
You can learn more about[Kubernetes data plane hardening](kubernetes-workload-protections.md).
54
53
55
54
## Vulnerability assessment
56
55
57
56
### Scanning images in ACR registries
58
57
59
58
Defender for Containers includes an integrated vulnerability scanner for scanning images in Azure Container Registry registries. The vulnerability scanner runs on an image:
60
59
61
-
- When you push the image to your registry
62
-
- Weekly on any image that was pulled within the last 30
63
-
- When you import the image to your Azure Container Registry
64
-
- Continuously in specific situations
60
+
- When you push the image to your registry
61
+
- Weekly on any image that was pulled within the last 30
62
+
- When you import the image to your Azure Container Registry
63
+
- Continuously in specific situations
65
64
66
65
Learn more in [Vulnerability assessment](defender-for-containers-usage.md).
67
66
68
67
:::image type="content" source="./media/defender-for-containers/recommendation-acr-images-with-vulnerabilities.png" alt-text="Sample Microsoft Defender for Cloud recommendation about vulnerabilities discovered in Azure Container Registry (ACR) hosted images." lightbox="./media/defender-for-containers/recommendation-acr-images-with-vulnerabilities.png":::
69
68
70
69
### View vulnerabilities for running images
71
70
72
-
The recommendation **Running container images should have vulnerability findings resolved** shows vulnerabilities for running images by using the scan results from ACR registries and information on running images from the Defender security profile/extension. Images that are deployed from a non-ACR registry, will appear under the **Not applicable** tab.
71
+
The recommendation `Running container images should have vulnerability findings resolved` shows vulnerabilities for running images by using the scan results from ACR registries and information on running images from the Defender security profile/extension. Images that are deployed from a non-ACR registry, will appear under the Not applicable tab.
73
72
74
73
:::image type="content" source="media/defender-for-containers/running-image-vulnerabilities-recommendation.png" alt-text="Screenshot showing where the recommendation is viewable." lightbox="media/defender-for-containers/running-image-vulnerabilities-recommendation-expanded.png":::
0 commit comments