Skip to content

Commit dfbc4b8

Browse files
committed
Rename container-registries files to containers
1 parent b86b65d commit dfbc4b8

24 files changed

+39
-29
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -684,6 +684,16 @@
684684
"source_path_from_root": "/articles/defender-for-cloud/defender-for-kubernetes-azure-arc.md",
685685
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-enable?pivots=defender-for-container-arc#protect-arc-enabled-kubernetes-clusters",
686686
"redirect_document_id": true
687+
},
688+
{
689+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-container-registries-cicd.md",
690+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-cicd",
691+
"redirect_document_id": true
692+
},
693+
{
694+
"source_path_from_root": "/articles/defender-for-cloud/defender-for-container-registries-usage.md",
695+
"redirect_url": "/azure/defender-for-cloud/defender-for-containers-usage",
696+
"redirect_document_id": true
687697
}
688698
]
689699
}

articles/defender-for-cloud/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -237,10 +237,10 @@
237237
href: defender-for-containers-enable.md
238238
- name: Vulnerability assessment
239239
displayName: ACR, registry, images, qualys
240-
href: defender-for-container-registries-usage.md
240+
href: defender-for-containers-usage.md
241241
- name: Scan images in your CI/CD workflows
242242
displayName: ACR, registry, images, trevi, vulnerabilities, scanner
243-
href: defender-for-container-registries-cicd.md
243+
href: defender-for-containers-cicd.md
244244
- name: Kubernetes data plane hardening
245245
displayName: k8s, containers, aks
246246
href: kubernetes-workload-protections.md

articles/defender-for-cloud/auto-deploy-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,4 +45,4 @@ To assess your machines for vulnerabilities, you can use one of the following so
4545
Defender for Cloud also offers vulnerability assessment for your:
4646

4747
- SQL databases - see [Explore vulnerability assessment reports in the vulnerability assessment dashboard](defender-for-sql-on-machines-vulnerability-assessment.md#explore-vulnerability-assessment-reports)
48-
- Azure Container Registry images - see [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-container-registries-usage.md)
48+
- Azure Container Registry images - see [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-containers-usage.md)

articles/defender-for-cloud/custom-dashboards-azure-workbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Learn more about using these scanners:
9292

9393
- [Find vulnerabilities with Microsoft threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
9494
- [Find vulnerabilities with the integrated Qualys scanner](deploy-vulnerability-assessment-vm.md)
95-
- [Scan your registry images for vulnerabilities](defender-for-container-registries-usage.md)
95+
- [Scan your registry images for vulnerabilities](defender-for-containers-usage.md)
9696
- [Scan your SQL resources for vulnerabilities](defender-for-sql-on-machines-vulnerability-assessment.md)
9797

9898
Findings for each resource type are reported in separate recommendations:

articles/defender-for-cloud/defender-for-cloud-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Review the findings from these vulnerability scanners and respond to them all fr
9595
Learn more on the following pages:
9696

9797
- [Defender for Cloud's integrated Qualys scanner for Azure and hybrid machines](deploy-vulnerability-assessment-vm.md)
98-
- [Identify vulnerabilities in images in Azure container registries](defender-for-container-registries-usage.md#identify-vulnerabilities-in-images-in-other-container-registries)
98+
- [Identify vulnerabilities in images in Azure container registries](defender-for-containers-usage.md#identify-vulnerabilities-in-images-in-other-container-registries)
9999

100100
## Optimize and improve security by configuring recommended controls
101101

articles/defender-for-cloud/defender-for-container-registries-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,12 +90,12 @@ If you connect unsupported registries to your Azure subscription, Defender for C
9090
### Can I customize the findings from the vulnerability scanner?
9191
Yes. If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
9292

93-
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](defender-for-container-registries-usage.md#disable-specific-findings).
93+
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](defender-for-containers-usage.md#disable-specific-findings).
9494

9595
### Why is Defender for Cloud alerting me to vulnerabilities about an image that isn’t in my registry?
9696
Defender for Cloud provides vulnerability assessments for every image pushed or pulled in a registry. Some images may reuse tags from an image that was already scanned. For example, you may reassign the tag “Latest” every time you add an image to a digest. In such cases, the ‘old’ image does still exist in the registry and may still be pulled by its digest. If the image has security findings and is pulled, it'll expose security vulnerabilities.
9797

9898
## Next steps
9999

100100
> [!div class="nextstepaction"]
101-
> [Scan your images for vulnerabilities](defender-for-container-registries-usage.md)
101+
> [Scan your images for vulnerabilities](defender-for-containers-usage.md)

articles/defender-for-cloud/defender-for-container-registries-cicd.md renamed to articles/defender-for-cloud/defender-for-containers-cicd.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ To enable vulnerability scans of images in your GitHub workflows:
4949
1. In the pane that appears, select an Application Insights account to push the CI/CD scan results from your workflow.
5050
1. Copy the authentication token and connection string into your GitHub workflow.
5151

52-
:::image type="content" source="./media/defender-for-container-registries-cicd/enable-cicd-integration.png" alt-text="Enable the CI/CD integration for vulnerability scans of container images in your GitHub workflows." lightbox="./media/defender-for-container-registries-cicd/enable-cicd-integration.png":::
52+
:::image type="content" source="./media/defender-for-containers-cicd/enable-cicd-integration.png" alt-text="Enable the CI/CD integration for vulnerability scans of container images in your GitHub workflows." lightbox="./media/defender-for-containers-cicd/enable-cicd-integration.png":::
5353

5454
> [!IMPORTANT]
5555
> The authentication token and connection string are used to correlate the ingested security telemetry with resources in the subscription. If you use invalid values for these parameters, it'll lead to dropped telemetry.
@@ -105,27 +105,27 @@ To enable vulnerability scans of images in your GitHub workflows:
105105
106106
1. Open the **affected resources** list and select an unhealthy registry to see the repositories within it that have vulnerable images.
107107
108-
:::image type="content" source="media/defender-for-container-registries-cicd/select-registry.png" alt-text="Select an unhealthy registry.":::
108+
:::image type="content" source="media/defender-for-containers-cicd/select-registry.png" alt-text="Select an unhealthy registry.":::
109109
110110
The registry details page opens with the list of affected repositories.
111111
112112
1. Select a specific repository to see the repositories within it that have vulnerable images.
113113
114-
:::image type="content" source="media/defender-for-container-registries-cicd/select-repository.png" alt-text="Select an unhealthy repository.":::
114+
:::image type="content" source="media/defender-for-containers-cicd/select-repository.png" alt-text="Select an unhealthy repository.":::
115115
116116
The repository details page opens. It lists the vulnerable images together with an assessment of the severity of the findings.
117117
118118
1. Select a specific image to see the vulnerabilities.
119119
120-
:::image type="content" source="media/defender-for-container-registries-cicd/select-image.png" alt-text="Select an unhealthy image.":::
120+
:::image type="content" source="media/defender-for-containers-cicd/select-image.png" alt-text="Select an unhealthy image.":::
121121
122122
The list of findings for the selected image opens.
123123
124-
:::image type="content" source="media/defender-for-container-registries-cicd/cicd-scan-results.png" alt-text="Image scan results.":::
124+
:::image type="content" source="media/defender-for-containers-cicd/cicd-scan-results.png" alt-text="Image scan results.":::
125125
126126
1. To learn more about which GitHub workflow is pushing these vulnerable images, select the information bubble:
127127
128-
:::image type="content" source="media/defender-for-container-registries-cicd/cicd-findings.png" alt-text="CI/CD findings about specific GitHub branches and commits.":::
128+
:::image type="content" source="media/defender-for-containers-cicd/cicd-findings.png" alt-text="CI/CD findings about specific GitHub branches and commits.":::
129129
130130
## Next steps
131131

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Defender for Containers includes an integrated vulnerability scanner for scannin
6767
- When you import the image to your Azure Container Registry
6868
- Continuously in specific situations
6969

70-
Learn more in [Vulnerability assessment](defender-for-container-registries-usage.md).
70+
Learn more in [Vulnerability assessment](defender-for-containers-usage.md).
7171

7272
:::image type="content" source="./media/defender-for-containers/recommendation-acr-images-with-vulnerabilities.png" alt-text="Sample Microsoft Defender for Cloud recommendation about vulnerabilities discovered in Azure Container Registry (ACR) hosted images." lightbox="./media/defender-for-containers/recommendation-acr-images-with-vulnerabilities.png":::
7373

articles/defender-for-cloud/defender-for-container-registries-usage.md renamed to articles/defender-for-cloud/defender-for-containers-usage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This page explains how to use the built-in vulnerability scanner to scan the con
1414
When the scanner, powered by Qualys, reports vulnerabilities to Defender for Cloud, Defender for Cloud presents the findings and related information as recommendations. In addition, the findings include related information such as remediation steps, relevant CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific registry.
1515

1616
> [!TIP]
17-
> You can also scan container images for vulnerabilities as the images are built in your CI/CD GitHub workflows. Learn more in [Identify vulnerable container images in your CI/CD workflows](defender-for-container-registries-cicd.md).
17+
> You can also scan container images for vulnerabilities as the images are built in your CI/CD GitHub workflows. Learn more in [Identify vulnerable container images in your CI/CD workflows](defender-for-containers-cicd.md).
1818
1919
There are four triggers for an image scan:
2020

@@ -142,7 +142,7 @@ To create a rule:
142142
1. Define your criteria.
143143
1. Select **Apply rule**.
144144

145-
:::image type="content" source="./media/defender-for-container-registries-usage/new-disable-rule-for-registry-finding.png" alt-text="Create a disable rule for VA findings on registry.":::
145+
:::image type="content" source="./media/defender-for-containers-usage/new-disable-rule-for-registry-finding.png" alt-text="Create a disable rule for VA findings on registry.":::
146146

147147
1. To view, override, or delete a rule:
148148
1. Select **Disable rule**.
@@ -168,7 +168,7 @@ If you connect unsupported registries to your Azure subscription, Defender for C
168168
### Can I customize the findings from the vulnerability scanner?
169169
Yes. If you have an organizational need to ignore a finding, rather than remediate it, you can optionally disable it. Disabled findings don't impact your secure score or generate unwanted noise.
170170

171-
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](defender-for-container-registries-usage.md#disable-specific-findings).
171+
[Learn about creating rules to disable findings from the integrated vulnerability assessment tool](defender-for-containers-usage.md#disable-specific-findings).
172172

173173
### Why is Defender for Cloud alerting me to vulnerabilities about an image that isn’t in my registry?
174174
Some images may reuse tags from an image that was already scanned. For example, you may reassign the tag “Latest” every time you add an image to a digest. In such cases, the ‘old’ image does still exist in the registry and may still be pulled by its digest. If the image has security findings and is pulled, it'll expose security vulnerabilities.

articles/defender-for-cloud/deploy-vulnerability-assessment-byol-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,4 +144,4 @@ When you set up your solution, you must choose a resource group to attach it to.
144144
Defender for Cloud also offers vulnerability analysis for your:
145145

146146
- SQL databases - see [Explore vulnerability assessment reports in the vulnerability assessment dashboard](defender-for-sql-on-machines-vulnerability-assessment.md#explore-vulnerability-assessment-reports)
147-
- Azure Container Registry images - see [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-container-registries-usage.md)
147+
- Azure Container Registry images - see [Use Microsoft Defender for container registries to scan your images for vulnerabilities](defender-for-containers-usage.md)

0 commit comments

Comments
 (0)