|
| 1 | +--- |
| 2 | +title: Common questions about the Microsoft Defender Vulnerability Management solution |
| 3 | +description: Answers to common questions on the new Container VA offering powered by Microsoft Defender Vulnerability Management |
| 4 | +ms.topic: faq |
| 5 | +ms.date: 11/30/2023 |
| 6 | +--- |
| 7 | + |
| 8 | +# Common questions about the Microsoft Defender Vulnerability Management solution |
| 9 | + |
| 10 | +Get answers to common questions on the new Container VA offering powered by Microsoft Defender Vulnerability Management solution. |
| 11 | + |
| 12 | +## How do I transition to the container vulnerability assessment powered by Microsoft Defender Vulnerability Management? |
| 13 | + |
| 14 | +See the [Transition Guide for Containers](transition-to-defender-vulnerability-management.md) for recommended guidance on transitioning to Microsoft Defender Vulnerability Management for container image vulnerability assessment scanning. |
| 15 | + |
| 16 | +## Is there any change to pricing when transitioning to container vulnerability assessment scanning powered by Microsoft Defender Vulnerability Management? |
| 17 | + |
| 18 | +No. The cost of the vulnerability assessment scanning is included in Defender for Containers, Defender CSPM and Defender for Container Registries (deprecated) and doesn't differ in regard to the scanner being used. |
| 19 | + |
| 20 | +## Am I being billed twice when scanning with both offerings? |
| 21 | + |
| 22 | +No. Each unique image is billed once according to the pricing of the Defender plan enabled, regardless of scanner. |
| 23 | + |
| 24 | +## Does container vulnerability assessment powered by Microsoft Defender Vulnerability Management require an agent? |
| 25 | + |
| 26 | +Vulnerability assessment for container images in the registry is agentless. |
| 27 | +Vulnerability assessment for runtime supports both agentless and agent-based deployment. This approach allows us to provide maximum visibility when vulnerability assessment is enabled, while providing improved refresh rate for image inventory on clusters running our agent. |
| 28 | + |
| 29 | +## Is there any difference in supported environments between the Qualys and Microsoft Defender Vulnerability Management powered offerings? |
| 30 | + |
| 31 | +Both offerings support registry scan for ACR and ECR as well as runtime vulnerability assessment for AKS and EKS. |
| 32 | + |
| 33 | +## How complicated is it to enable container vulnerability assessment powered by Microsoft Defender Vulnerability Management? |
| 34 | + |
| 35 | +The Microsoft Defender Vulnerability Management powered offering is already enabled by default in all supported plans. For instructions on how to re-enable Microsoft Defender Vulnerability Management with a single click if you previously disabled this offering, see [Enabling vulnerability assessments powered by Microsoft Defender Vulnerability Management](enable-vulnerability-assessment.md). |
| 36 | + |
| 37 | +## How long does it take for a new image to be scanned with the Microsoft Defender Vulnerability Management powered offering? |
| 38 | + |
| 39 | +In Azure, new images are typically scanned in a few minutes, and it might take up to an hour in rare cases. In AWS, new images are typically scanned within a few hours, and might take up to a day in rare cases. |
| 40 | + |
| 41 | +## Is there any difference between scanning criteria for the Qualys and Microsoft Defender Vulnerability Management offerings? |
| 42 | + |
| 43 | +Container vulnerability assessment powered by Microsoft Defender Vulnerability Management for Azure supports all scan triggers supported by Qualys, and in addition also supports scanning of all images pushed in the last 90 days to a registry. For more information, see [scanning triggers for Microsoft Defender Vulnerability Management for Azure](agentless-vulnerability-assessment-azure.md#scan-triggers). Container vulnerability assessment powered by Microsoft Defender Vulnerability Management for AWS supports a subset of the scanning criteria. For more information, see [scanning triggers for Microsoft Defender Vulnerability Management for AWS](agentless-vulnerability-assessment-aws.md#scan-triggers). |
| 44 | + |
| 45 | +## Is there a difference in rescan period between the Qualys and Microsoft Defender Vulnerability Management offerings? |
| 46 | + |
| 47 | +Vulnerability assessments performed using the Qualys scanner are refreshed weekly. |
| 48 | +Vulnerability assessments performed using the Microsoft Defender Vulnerability Management scanner are refreshed daily. For Defender for Container Registries (deprecated), rescan period is once every 7 days for vulnerability assessments performed by both the Qualys and Microsoft Defender Vulnerability Management scanner. |
| 49 | + |
| 50 | +## Is there any difference between the OS and language packages covered by the Qualys and Microsoft Defender Vulnerability Management offerings? |
| 51 | + |
| 52 | +Container vulnerability assessment powered by Microsoft Defender Vulnerability Management supports all OS packages and language packages supported by Qualys except FreeBSD. In addition, the offering powered by Microsoft Defender Vulnerability Management also provides support for Red Hat Enterprise version 8 and 9, CentOS versions 8 and 9, Oracle Linux 9, openSUSE Tumbleweed, Debian 12, Fedora 36 and 37, and CBL-Mariner 1 and 2. |
| 53 | +There's no difference for coverage of language specific packages between the Qualys and Microsoft Defender Vulnerability Management powered offerings. |
| 54 | + |
| 55 | +- [Full list of supported packages and their versions for Microsoft Defender Vulnerability Management](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management) |
| 56 | + |
| 57 | +- [Full list of supported packages and their versions for Qualys](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-qualys) |
| 58 | + |
| 59 | +## Are there any other capabilities that are unique to the Microsoft Defender Vulnerability Management powered offering? |
| 60 | + |
| 61 | +- Each reported vulnerability is enriched with real-world exploit exploitability insights, helping customers prioritize remediation of vulnerabilities with known exploit methods and exploitability tools. Exploit sources include CISA key, exploit DB, Microsoft Security Response Center, and more. |
| 62 | +- Vulnerability reports for OS packages are enriched with evidence on commands that can be used to find the vulnerable package. |
| 63 | + |
| 64 | +## Next steps |
| 65 | + |
| 66 | +- Learn about [Defender for Containers](defender-for-containers-introduction.md) |
| 67 | +- Learn more about [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md) |
| 68 | +- Learn more about [Vulnerability assessments for AWS with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-aws.md) |
0 commit comments