You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Validate the following endpoints are configured for outbound access so that the Defender profile can connect to Microsoft Defender for Cloud to send security data and events:
10
10
11
-
See the [required FQDN/application rules for Azure policy](../../aks/limit-egress-traffic.md#microsoft-defender-for-containers) for Microsoft Defender for Containers.
11
+
See the [required FQDN/application rules for Microsoft Defender for Containers](../../aks/limit-egress-traffic.md#microsoft-defender-for-containers).
12
12
13
13
By default, AKS clusters have unrestricted outbound (egress) internet access.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/kubernetes-workload-protections.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Workload protections for your Kubernetes workloads
3
3
description: Learn how to use Microsoft Defender for Cloud's set of Kubernetes workload protection security recommendations
4
4
ms.topic: how-to
5
-
ms.date: 01/25/2022
5
+
ms.date: 01/26/2022
6
6
---
7
7
8
8
# Protect your Kubernetes workloads
@@ -39,7 +39,7 @@ Microsoft Defender for Cloud includes a bundle of recommendations that are avail
39
39
40
40
Validate the following endpoints are configured for outbound access so that the Azure Policy add-on for Kubernetes can connect to Azure Policy to synchronize Kubernetes policies:
41
41
42
-
See [Azure policy](../aks/limit-egress-traffic.md#azure-policy) for the required FQDN/application rules.
42
+
See [Required FQDN/application rules for Azure policy](../aks/limit-egress-traffic.md#azure-policy) for the required FQDN/application rules.
0 commit comments