Skip to content

Commit cf35fb7

Browse files
Merge pull request #232787 from mayaherskovic/patch-23
Update kubernetes-workload-protections.md
2 parents c9ab3c8 + 5b15fca commit cf35fb7

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ Microsoft Defender for Cloud includes a bundle of recommendations that are avail
2626

2727
## Enable Kubernetes data plane hardening
2828

29-
When you enable Microsoft Defender for Containers, Azure Kubernetes Service clusters, and Azure Arc enabled Kubernetes clusters (Preview) protection are both enabled by default. You can configure your Kubernetes data plane hardening, when you enable Microsoft Defender for Containers.
29+
When you enable Microsoft Defender for Containers, the "Azure Policy for Kubernetes" setting is enabled by default for the Azure Kubernetes Service, and for Azure Arc-enabled Kubernetes clusters in the relevant subscription. If you disable the setting, you can re-enable it later. Either in the Defender for Containers plan settings, or with  Azure Policy.
3030

31-
When you enable data plane hardening, the containers agent installed on each resource allocates a small amount of the AKS cluster CPU and memory for the agent to use. That allocation usually runs at maximum capacity, but does not affect the rest of the CPU and memory on the resource.
31+
When you enable this setting, the Azure Policy for Kubernetes pods are installed on the cluster. This allocates a small amount of CPU and memory for the pods to use. This allocation might reach maximum capacity, but it doesn't affect the rest of the CPU and memory on the resource.
3232

3333
To enable Azure Kubernetes Service clusters and Azure Arc enabled Kubernetes clusters (Preview):
3434

0 commit comments

Comments
 (0)