Skip to content

Commit ba00775

Browse files
Update screenshots in Def for containers VA
Updated screenshots
1 parent 3e3b7b0 commit ba00775

File tree

5 files changed

+4
-4
lines changed

5 files changed

+4
-4
lines changed

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -81,13 +81,13 @@ For a list of the types of images and container registries supported by Microsof
8181

8282
The list of findings for the selected image opens.
8383

84-
![List of findings.](media/monitor-container-security/acr-findings.png)
84+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/list-of-findings.png" alt-text="Screenshot showing list of findings for the selected image." lightbox="media/defender-for-containers-vulnerability-assessment-azure/list-of-findings.png":::
8585

8686
1. To learn more about a finding, select the finding.
8787

8888
The findings details pane opens.
8989

90-
[![Findings details pane.](media/monitor-container-security/acr-finding-details-pane.png)](media/monitor-container-security/acr-finding-details-pane.png#lightbox)
90+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/finding-details.png" alt-text="Screenshot showing list of findings for the selected image." lightbox="media/defender-for-containers-vulnerability-assessment-azure/finding-details.png":::
9191

9292
This pane includes a detailed description of the issue and links to external resources to help mitigate the threats.
9393

@@ -138,7 +138,7 @@ To create a rule:
138138
1. Define your criteria.
139139
1. Select **Apply rule**.
140140

141-
:::image type="content" source="./media/defender-for-containers-vulnerability-assessment-azure/new-disable-rule-for-registry-finding.png" alt-text="Create a disable rule for VA findings on registry.":::
141+
:::image type="content" source="./media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png" alt-text="Screenshot showing how to create a disable rule for VA findings on registry." lightbox="media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png":::
142142

143143
1. To view, override, or delete a rule:
144144
1. Select **Disable rule**.
@@ -152,7 +152,7 @@ Defender for Cloud gives its customers the ability to prioritize the remediation
152152

153153
To provide findings for the recommendation, Defender for Cloud collects the inventory of your running containers that are collected by the Defender agent installed on your AKS clusters. Defender for Cloud correlates that inventory with the vulnerability assessment scan of images that are stored in ACR. The recommendation shows your running containers with the vulnerabilities associated with the images that are used by each container and provides vulnerability reports and remediation steps.
154154

155-
:::image type="content" source="media/defender-for-containers/running-image-vulnerabilities-recommendation.png" alt-text="Screenshot showing where the recommendation is viewable." lightbox="media/defender-for-containers/running-image-vulnerabilities-recommendation-expanded.png":::
155+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png" alt-text="Screenshot showing recommendations showing your running containers with the vulnerabilities associated with the images used by each container." lightbox="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png":::
156156

157157

158158
## FAQ
90.3 KB
Loading
89.6 KB
Loading
32.1 KB
Loading
Loading

0 commit comments

Comments
 (0)