Skip to content

Commit e2cc42a

Browse files
authored
Merge pull request #185922 from ElazarK/outbound-access
Outbound access
2 parents 0e3624c + ebbc019 commit e2cc42a

5 files changed

+49
-14
lines changed

articles/defender-for-cloud/defender-for-containers-enable.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: How to enable Microsoft Defender for Containers in Microsoft Defender for
33
description: Enable the container protections of Microsoft Defender for Containers
44
ms.topic: overview
55
zone_pivot_groups: k8s-host
6-
ms.date: 01/02/2022
6+
ms.date: 01/25/2022
77
---
88
# Enable Microsoft Defender for Containers
99

@@ -26,6 +26,14 @@ Learn about this plan in [Overview of Microsoft Defender for Containers](defende
2626
> [!INCLUDE [Legalese](../../includes/defender-for-cloud-preview-legal-text.md)]
2727
::: zone-end
2828

29+
::: zone pivot="defender-for-container-aks"
30+
[!INCLUDE [Prerequisites](./includes/defender-for-container-prerequisites-aks.md)]
31+
::: zone-end
32+
33+
::: zone pivot="defender-for-container-arc,defender-for-container-eks"
34+
[!INCLUDE [Prerequisites](./includes/defender-for-container-prerequisites-arc-eks.md)]
35+
::: zone-end
36+
2937
::: zone pivot="defender-for-container-aks"
3038
[!INCLUDE [Enable plan for AKS](./includes/defender-for-containers-enable-plan-aks.md)]
3139
::: zone-end
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
ms.service: defender-for-cloud
3+
ms.topic: include
4+
ms.date: 01/26/2022
5+
---
6+
7+
## Prerequisites
8+
9+
Validate the following endpoints are configured for outbound access so that the Defender profile can connect to Microsoft Defender for Cloud to send security data and events:
10+
11+
See the [required FQDN/application rules for Microsoft Defender for Containers](../../aks/limit-egress-traffic.md#microsoft-defender-for-containers).
12+
13+
By default, AKS clusters have unrestricted outbound (egress) internet access.
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
ms.service: defender-for-cloud
3+
ms.topic: include
4+
ms.date: 01/25/2022
5+
---
6+
7+
## Prerequisites
8+
9+
Validate the following endpoints are configured for outbound access so that the Defender extension can connect to Microsoft Defender for Cloud to send security data and events:
10+
11+
For Azure public cloud deployments:
12+
13+
| Domain | Port |
14+
| -------------------------- | ---- |
15+
| *.ods.opinsights.azure.com | 443 |
16+
| *.oms.opinsights.azure.com | 443 |
17+
| login.microsoftonline.com | 443 |

articles/defender-for-cloud/includes/defender-for-containers-enable-plan-arc.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
author: memildin
33
ms.service: defender-for-cloud
44
ms.topic: include
5-
ms.date: 01/10/2022
6-
ms.author: memildin
5+
ms.date: 01/24/2022
6+
77
---
88
## Enable the plan
99

@@ -33,20 +33,11 @@ ms.author: memildin
3333
- Azure Kubernetes Service profile - [Azure Kubernetes Service clusters should have Defender profile enabled](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/56a83a6e-c417-42ec-b567-1e6fcb3d09a9)
3434
- Azure Arc-enabled Kubernetes extension - [Azure Arc-enabled Kubernetes clusters should have the Defender extension installed](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/3ef9848c-c2c8-4ff3-8b9c-4c8eb8ddfce6)
3535

36-
## Prerequisites
36+
## Additional Prerequisites
3737

3838
Before deploying the extension, ensure you:
3939
- [Connect the Kubernetes cluster to Azure Arc](../../azure-arc/kubernetes/quickstart-connect-cluster.md)
4040
- Complete the [pre-requisites listed under the generic cluster extensions documentation](../../azure-arc/kubernetes/extensions.md#prerequisites).
41-
- Configure **port 443** on the following endpoints for outbound access:
42-
- For clusters on Azure Government cloud:
43-
- *.ods.opinsights.azure.us
44-
- *.oms.opinsights.azure.us
45-
- :::no-loc text="login.microsoftonline.us":::
46-
- For clusters on other Azure cloud deployments:
47-
- *.ods.opinsights.azure.com
48-
- *.oms.opinsights.azure.com
49-
- :::no-loc text="login.microsoftonline.com":::
5041

5142
## Deploy the Defender extension
5243

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Workload protections for your Kubernetes workloads
33
description: Learn how to use Microsoft Defender for Cloud's set of Kubernetes workload protection security recommendations
44
ms.topic: how-to
5-
ms.date: 12/12/2021
5+
ms.date: 01/26/2022
66
---
77

88
# Protect your Kubernetes workloads
@@ -35,6 +35,12 @@ Defender for Cloud offers more container security features if you enable Microso
3535

3636
Microsoft Defender for Cloud includes a bundle of recommendations that are available when you've installed the **Azure Policy add-on for Kubernetes**.
3737

38+
## Prerequisites
39+
40+
Validate the following endpoints are configured for outbound access so that the Azure Policy add-on for Kubernetes can connect to Azure Policy to synchronize Kubernetes policies:
41+
42+
See [Required FQDN/application rules for Azure policy](../aks/limit-egress-traffic.md#azure-policy) for the required FQDN/application rules.
43+
3844
### Step 1: Deploy the add-on
3945

4046
To configure the recommendations, install the **Azure Policy add-on for Kubernetes**.

0 commit comments

Comments
 (0)