Skip to content

Commit bf04d79

Browse files
committed
Update name of container image vulnerability recommendation; specify powered by Qualys
1 parent 10e0b9d commit bf04d79

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/defender-for-cloud/defender-for-container-registries-usage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ author: ElazarK
1111

1212
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
1313

14-
This page explains how to use the built-in vulnerability scanner to scan the container images stored in your Azure Resource Manager-based Azure Container Registry.
14+
This page explains how to use the built-in vulnerability scanner, powered by Qualys, to scan the container images stored in your Azure Resource Manager-based Azure Container Registry.
1515

1616
When **Defender for Containers** is enabled, any image you push to your registry will be scanned immediately. In addition, any image pulled within the last 30 days is also scanned.
1717

@@ -47,7 +47,7 @@ To enable vulnerability scans of images stored in your Azure Resource Manager-ba
4747

4848
## View and remediate findings
4949

50-
1. To view the findings, open the **Recommendations** page. If issues were found, you'll see the recommendation [Container registry images should have vulnerability findings resolved (powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
50+
1. To view the findings, open the **Recommendations** page. If issues were found, you'll see the recommendation [Container registry images should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
5151

5252
![Recommendation to remediate issues .](media/monitor-container-security/acr-finding.png)
5353

@@ -89,7 +89,7 @@ To enable vulnerability scans of images stored in your Azure Resource Manager-ba
8989

9090
1. Push the updated image to trigger a scan.
9191

92-
1. Check the recommendations page for the recommendation [Container registry images should have vulnerability findings resolved (powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
92+
1. Check the recommendations page for the recommendation [Container registry images should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
9393

9494
If the recommendation still appears and the image you've handled still appears in the list of vulnerable images, check the remediation steps again.
9595

@@ -125,7 +125,7 @@ You can use any of the following criteria:
125125

126126
To create a rule:
127127

128-
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved (powered by Qualys)](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648), select **Disable rule**.
128+
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648), select **Disable rule**.
129129
1. Select the relevant scope.
130130
1. Define your criteria.
131131
1. Select **Apply rule**.

0 commit comments

Comments
 (0)