Skip to content

Commit ae741d7

Browse files
authored
Merge pull request #259354 from dcurwin/wi-181050-mdvm-migrate-nov22-2023
MDVM migration
2 parents d223109 + 0641674 commit ae741d7

14 files changed

+394
-14
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -367,7 +367,7 @@
367367
displayName: map, network map
368368
href: protect-network-resources.md
369369
- name: Lock down logins with multifactor authentication
370-
displayName: identity, access, AAD, active directory, multi-factor,
370+
displayName: identity, access, AAD, active directory, multifactor,
371371
authentication, multifactor, users, passwords
372372
href: multi-factor-authentication-enforcement.md
373373
- name: Other threat protections
@@ -615,6 +615,10 @@
615615
href: disable-vulnerability-findings-containers.md
616616
- name: REST API
617617
href: subassessment-rest-api.md
618+
- name: Transition to Defender Vulnerability Management
619+
href: transition-to-defender-vulnerability-management.md
620+
- name: Common questions
621+
href: common-questions-microsoft-defender-vulnerability-management.md
618622
- name: Vulnerability assessment for AWS powered by Trivy (deprecated)
619623
displayName: AWS, ECR, registry, images, qualys
620624
href: defender-for-containers-vulnerability-assessment-elastic.md
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
title: Common questions about the Microsoft Defender Vulnerability Management solution
3+
description: Answers to common questions on the new Container VA offering powered by Microsoft Defender Vulnerability Management
4+
ms.topic: faq
5+
ms.date: 11/30/2023
6+
---
7+
8+
# Common questions about the Microsoft Defender Vulnerability Management solution
9+
10+
Get answers to common questions on the new Container VA offering powered by Microsoft Defender Vulnerability Management solution.
11+
12+
## How do I transition to the container vulnerability assessment powered by Microsoft Defender Vulnerability Management?
13+
14+
See the [Transition Guide for Containers](transition-to-defender-vulnerability-management.md) for recommended guidance on transitioning to Microsoft Defender Vulnerability Management for container image vulnerability assessment scanning.
15+
16+
## Is there any change to pricing when transitioning to container vulnerability assessment scanning powered by Microsoft Defender Vulnerability Management?
17+
18+
No. The cost of the vulnerability assessment scanning is included in Defender for Containers, Defender CSPM and Defender for Container Registries (deprecated) and doesn't differ in regard to the scanner being used.
19+
20+
## Am I being billed twice when scanning with both offerings?
21+
22+
No. Each unique image is billed once according to the pricing of the Defender plan enabled, regardless of scanner.
23+
24+
## Does container vulnerability assessment powered by Microsoft Defender Vulnerability Management require an agent?
25+
26+
Vulnerability assessment for container images in the registry is agentless.
27+
Vulnerability assessment for runtime supports both agentless and agent-based deployment. This approach allows us to provide maximum visibility when vulnerability assessment is enabled, while providing improved refresh rate for image inventory on clusters running our agent.
28+
29+
## Is there any difference in supported environments between the Qualys and Microsoft Defender Vulnerability Management powered offerings?
30+
31+
Both offerings support registry scan for ACR and ECR as well as runtime vulnerability assessment for AKS and EKS.
32+
33+
## How complicated is it to enable container vulnerability assessment powered by Microsoft Defender Vulnerability Management?
34+
35+
The Microsoft Defender Vulnerability Management powered offering is already enabled by default in all supported plans. For instructions on how to re-enable Microsoft Defender Vulnerability Management with a single click if you previously disabled this offering, see [Enabling vulnerability assessments powered by Microsoft Defender Vulnerability Management](enable-vulnerability-assessment.md).
36+
37+
## How long does it take for a new image to be scanned with the Microsoft Defender Vulnerability Management powered offering?
38+
39+
In Azure, new images are typically scanned in a few minutes, and it might take up to an hour in rare cases. In AWS, new images are typically scanned within a few hours, and might take up to a day in rare cases.
40+
41+
## Is there any difference between scanning criteria for the Qualys and Microsoft Defender Vulnerability Management offerings?
42+
43+
Container vulnerability assessment powered by Microsoft Defender Vulnerability Management for Azure supports all scan triggers supported by Qualys, and in addition also supports scanning of all images pushed in the last 90 days to a registry. For more information, see [scanning triggers for Microsoft Defender Vulnerability Management for Azure](agentless-vulnerability-assessment-azure.md#scan-triggers). Container vulnerability assessment powered by Microsoft Defender Vulnerability Management for AWS supports a subset of the scanning criteria. For more information, see [scanning triggers for Microsoft Defender Vulnerability Management for AWS](agentless-vulnerability-assessment-aws.md#scan-triggers).
44+
45+
## Is there a difference in rescan period between the Qualys and Microsoft Defender Vulnerability Management offerings?
46+
47+
Vulnerability assessments performed using the Qualys scanner are refreshed weekly.
48+
Vulnerability assessments performed using the Microsoft Defender Vulnerability Management scanner are refreshed daily. For Defender for Container Registries (deprecated), rescan period is once every 7 days for vulnerability assessments performed by both the Qualys and Microsoft Defender Vulnerability Management scanner.
49+
50+
## Is there any difference between the OS and language packages covered by the Qualys and Microsoft Defender Vulnerability Management offerings?
51+
52+
Container vulnerability assessment powered by Microsoft Defender Vulnerability Management supports all OS packages and language packages supported by Qualys except FreeBSD. In addition, the offering powered by Microsoft Defender Vulnerability Management also provides support for Red Hat Enterprise version 8 and 9, CentOS versions 8 and 9, Oracle Linux 9, openSUSE Tumbleweed, Debian 12, Fedora 36 and 37, and CBL-Mariner 1 and 2.
53+
There's no difference for coverage of language specific packages between the Qualys and Microsoft Defender Vulnerability Management powered offerings.
54+
55+
- [Full list of supported packages and their versions for Microsoft Defender Vulnerability Management](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management)
56+
57+
- [Full list of supported packages and their versions for Qualys](support-matrix-defender-for-containers.md#registries-and-images-support-for-azure---vulnerability-assessment-powered-by-qualys)
58+
59+
## Are there any other capabilities that are unique to the Microsoft Defender Vulnerability Management powered offering?
60+
61+
- Each reported vulnerability is enriched with real-world exploit exploitability insights, helping customers prioritize remediation of vulnerabilities with known exploit methods and exploitability tools. Exploit sources include CISA key, exploit DB, Microsoft Security Response Center, and more.
62+
- Vulnerability reports for OS packages are enriched with evidence on commands that can be used to find the vulnerable package.
63+
64+
## Next steps
65+
66+
- Learn about [Defender for Containers](defender-for-containers-introduction.md)
67+
- Learn more about [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md)
68+
- Learn more about [Vulnerability assessments for AWS with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-aws.md)

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,20 @@
11
---
2-
title: Vulnerability assessment for Azure powered by Qualys
2+
title: Vulnerability assessment for Azure powered by Qualys
33
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
44
author: dcurwin
55
ms.author: dacurwin
6-
ms.date: 09/06/2023
6+
ms.date: 12/19/2023
77
ms.topic: how-to
88
ms.custom: ignite-2022, build-2023
99
---
1010

11-
# Vulnerability assessment for Azure powered by Qualys
11+
# Vulnerability assessment for Azure powered by Qualys
1212

1313
Vulnerability assessment for Azure, powered by Qualys, is an out-of-box solution that empowers security teams to easily discover and remediate vulnerabilities in Linux container images, with zero configuration for onboarding, and without deployment of any agents.
1414

1515
> [!NOTE]
1616
>
17-
> - This offering is only available for customers using the Qualys offering prior to November 15, 2023. Customers that onboarded to Defender for Containers after this date should use [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md).
18-
> - This feature supports scanning of images in the Azure Container Registry (ACR) only. If you want to find vulnerabilities stored in other container registries, you can import the images into ACR, after which the imported images are scanned by the built-in vulnerability assessment solution. Learn how to [import container images to a container registry](/azure/container-registry/container-registry-import-images).
17+
> This feature supports scanning of images in the Azure Container Registry (ACR) only. If you want to find vulnerabilities stored in other container registries, you can import the images into ACR, after which the imported images are scanned by the built-in vulnerability assessment solution. Learn how to [import container images to a container registry](/azure/container-registry/container-registry-import-images).
1918
2019
In every subscription where this capability is enabled, all images stored in ACR (existing and new) are automatically scanned for vulnerabilities without any extra configuration of users or registries. Recommendations with vulnerability reports are provided for all images in ACR as well as images that are currently running in AKS that were pulled from an ACR registry. Images are scanned shortly after being added to a registry, and rescanned for new vulnerabilities once every week.
2120

Loading
Loading
Loading
82.6 KB
Loading
Loading
14.5 KB
Loading
67.9 KB
Loading

0 commit comments

Comments
 (0)