Skip to content

Commit b6b60df

Browse files
Merge pull request #208366 from bmansheim/patch-1
Remove deprecating alerts for VMs
2 parents bf613f1 + 98e6a8f commit b6b60df

File tree

1 file changed

+1
-16
lines changed

1 file changed

+1
-16
lines changed

articles/defender-for-cloud/upcoming-changes.md

Lines changed: 1 addition & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -18,31 +18,16 @@ If you're looking for the latest release notes, you'll find them in the [What's
1818

1919
| Planned change | Estimated date for change |
2020
|--|--|
21-
| [Deprecating three VM alerts](#deprecating-three-vm-alerts) | June 2022|
2221
| [Change in pricing of Runtime protection for Arc-enabled Kubernetes clusters](#change-in-pricing-of-runtime-protection-for-arc-enabled-kubernetes-clusters) | August 2022 |
2322
| [Multiple changes to identity recommendations](#multiple-changes-to-identity-recommendations) | September 2022 |
2423
| [Removing security alerts for machines reporting to cross tenant Log Analytics workspaces](#removing-security-alerts-for-machines-reporting-to-cross-tenant-log-analytics-workspaces) | September 2022 |
2524
| [Legacy Assessments APIs deprecation](#legacy-assessments-apis-deprecation) | September 2022 |
2625

27-
### Deprecating three VM alerts
28-
29-
**Estimated date for change:** June 2022
30-
31-
The following table lists the alerts that will be deprecated during June 2022.
32-
33-
| Alert name | Description | Tactics | Severity |
34-
|--|--|--|--|
35-
| **Docker build operation detected on a Kubernetes node** <br>(VM_ImageBuildOnNode) | Machine logs indicate a build operation of a container image on a Kubernetes node. While this behavior might be legitimate, attackers might build their malicious images locally to avoid detection. | Defense Evasion | Low |
36-
| **Suspicious request to Kubernetes API** <br>(VM_KubernetesAPI) | Machine logs indicate that a suspicious request was made to the Kubernetes API. The request was sent from a Kubernetes node, possibly from one of the containers running in the node. Although this behavior can be intentional, it might indicate that the node is running a compromised container. | LateralMovement | Medium |
37-
| **SSH server is running inside a container** <br>(VM_ContainerSSH) | Machine logs indicate that an SSH server is running inside a Docker container. While this behavior can be intentional, it frequently indicates that a container is misconfigured or breached. | Execution | Medium |
38-
39-
These alerts are used to notify a user about suspicious activity connected to a Kubernetes cluster. The alerts will be replaced with matching alerts that are part of the Microsoft Defender for Cloud Container alerts (`K8S.NODE_ImageBuildOnNode`, `K8S.NODE_ KubernetesAPI` and `K8S.NODE_ ContainerSSH`) which will provide improved fidelity and comprehensive context to investigate and act on the alerts. Learn more about alerts for [Kubernetes Clusters](alerts-reference.md).
40-
4126
### Change in pricing of runtime protection for Arc-enabled Kubernetes clusters
4227

4328
**Estimated date for change:** August 2022
4429

45-
Runtime protection is currently a preview feature for Arc-enabled Kubernetes clusters. In August, Arc-enabled Kubernetes clusters will be charged for runtime protection. You can view pricing details on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). Subscriptions with Kubernetes clusters already onboarded to Arc, will begin to incur charges in August.
30+
Runtime protection is currently a preview feature for Arc-enabled Kubernetes clusters. In August, Arc-enabled Kubernetes clusters will be charged for runtime protection. You can view pricing details on the [pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). Subscriptions with Kubernetes clusters already onboarded to Arc will begin to incur charges in August.
4631

4732
### Multiple changes to identity recommendations
4833

0 commit comments

Comments
 (0)