Skip to content

Commit e5c2e26

Browse files
Merge pull request #247492 from dcurwin/wi-45767-extension-term-aug-8-2023
Update Defender for Containers terminology
2 parents 1d20d7c + ee80ea5 commit e5c2e26

35 files changed

+321
-193
lines changed

articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The triggers for an image scan are:
4646
- **Continuous rescan triggering** – Continuous rescan is required to ensure images that have been previously scanned for vulnerabilities are rescanned to update their vulnerability reports in case a new vulnerability is published.
4747
- **Re-scan** is performed once a day for:
4848
- images pushed in the last 90 days.
49-
- images currently running on the Kubernetes clusters monitored by Defender for Cloud (either via [agentless discovery and visibility for Kubernetes](how-to-enable-agentless-containers.md) or the [Defender for Containers agent](tutorial-enable-containers-azure.md#deploy-the-defender-profile-in-azure)).
49+
- images currently running on the Kubernetes clusters monitored by Defender for Cloud (either via [agentless discovery and visibility for Kubernetes](how-to-enable-agentless-containers.md) or the [Defender agent](tutorial-enable-containers-azure.md#deploy-the-defender-agent-in-azure)).
5050

5151
## How does image scanning work?
5252

@@ -58,9 +58,9 @@ A detailed description of the scan process is described as follows:
5858
- Once a day, or when an image is pushed to a registry:
5959

6060
- All newly discovered images are pulled, and an inventory is created for each image. Image inventory is kept to avoid further image pulls, unless required by new scanner capabilities.​
61-
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile)
61+
- Using the inventory, vulnerability reports are generated for new images, and updated for images previously scanned which were either pushed in the last 90 days to a registry, or are currently running. To determine if an image is currently running, Defender for Cloud uses both [agentless discovery and visibility within Kubernetes components](/azure/defender-for-cloud/concept-agentless-containers) and [inventory collected via the Defender agent running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-agent)
6262
- Vulnerability reports for container images are provided as a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/PhoenixContainerRegistryRecommendationDetailsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5).
63-
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agents running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-profile), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
63+
- For customers using either [agentless discovery and visibility within Kubernetes components](concept-agentless-containers.md) or [inventory collected via the Defender agent running on AKS nodes](defender-for-containers-enable.md#deploy-the-defender-agent), Defender for Cloud also creates a [recommendation](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5) for remediating vulnerabilities for vulnerable images running on an AKS cluster.
6464

6565
> [!NOTE]
6666
> For Defender for Container Registries (deprecated), images are scanned once on push, and rescanned only once a week.

articles/defender-for-cloud/alert-validation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ You can simulate alerts for both of the control plane, and workload alerts with
9898
**Prerequisites**
9999

100100
- Ensure the Defender for Containers plan is enabled.
101-
- **Arc only** - Ensure the Defender extension is installed.
101+
- **Arc only** - Ensure the [Defender agent](defender-for-cloud-glossary.md#defender-agent) is installed.
102102
- **EKS or GKE only** - Ensure the default audit log collection autoprovisioning options are enabled.
103103

104104
**To simulate a Kubernetes control plane security alert**:
@@ -122,7 +122,7 @@ You can simulate alerts for both of the control plane, and workload alerts with
122122
**Prerequisites**
123123
124124
- Ensure the Defender for Containers plan is enabled.
125-
- Ensure the Defender profile\extension is installed.
125+
- Ensure the [Defender agent](defender-for-cloud-glossary.md#defender-agent) is installed.
126126
127127
**To simulate a a Kubernetes workload security alert**:
128128

0 commit comments

Comments
 (0)