Skip to content

Commit f3d6af2

Browse files
committed
implementing feedback
1 parent f6a857f commit f3d6af2

File tree

3 files changed

+17
-10
lines changed

3 files changed

+17
-10
lines changed

articles/defender-for-cloud/attack-path-reference.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -131,8 +131,8 @@ This section lists all of the cloud security graph components (connections and
131131
| DEASM findings | Microsoft Defender External Attack Surface Management (DEASM) internet scanning findings | Public IP |
132132
| Privileged container | Indicates that a Kubernetes container runs in a privileged mode | Kubernetes container |
133133
| Uses host network | Indicates that a Kubernetes pod uses the network namespace of its host machine | Kubernetes pod |
134-
| Has high severity vulnerabilities | Indicates that a resource has high severity vulnerabilities | Azure VM, AWS EC2, Kubernetes image |
135-
| Vulnerable to remote code execution | Indicates that a resource has vulnerabilities allowing remote code execution | Azure VM, AWS EC2, Kubernetes image |
134+
| Has high severity vulnerabilities | Indicates that a resource has high severity vulnerabilities | Azure VM, AWS EC2, Container image |
135+
| Vulnerable to remote code execution | Indicates that a resource has vulnerabilities allowing remote code execution | Azure VM, AWS EC2, Container image |
136136
| Public IP metadata | Lists the metadata of an Public IP | Public IP |
137137
| Identity metadata | Lists the metadata of an identity | Azure AD Identity |
138138

@@ -144,7 +144,7 @@ This section lists all of the cloud security graph components (connections and
144144
| Has permission to | Indicates that an identity has permissions to a resource or a group of resources | Azure AD user account, Managed Identity, IAM user, EC2 instance | All Azure & AWS resources|
145145
| Contains | Indicates that the source entity contains the target entity | Azure subscription, Azure resource group, AWS account, Kubernetes namespace, Kubernetes pod, Kubernetes cluster, GitHub owner, Azure DevOps project, Azure DevOps organization, Azure SQL server | All Azure & AWS resources, All Kubernetes entities, All DevOps entities, Azure SQL database |
146146
| Routes traffic to | Indicates that the source entity can route network traffic to the target entity | Public IP, Load Balancer, VNET, Subnet, VPC, Internet Gateway, Kubernetes service, Kubernetes pod| Azure VM, Azure VMSS, AWS EC2, Subnet, Load Balancer, Internet gateway, Kubernetes pod, Kubernetes service |
147-
| Is running | Indicates that the source entity is running the target entity as a process | Azure VM, EC2, Kubernetes container | SQL, Arc-Enabled SQL, Hosted MongoDB, Hosted MySQL, Hosted Oracle, Hosted PostgreSQL, Hosted SQL Server, Kubernetes image, Kubernetes pod |
147+
| Is running | Indicates that the source entity is running the target entity as a process | Azure VM, EC2, Kubernetes container | SQL, Arc-Enabled SQL, Hosted MongoDB, Hosted MySQL, Hosted Oracle, Hosted PostgreSQL, Hosted SQL Server, Container image, Kubernetes pod |
148148
| Member of | Indicates that the source identity is a member of the target identities group | Azure AD group, Azure AD user | Azure AD group |
149149
| Maintains | Indicates that the source Kubernetes entity manages the life cycle of the target Kubernetes entity | Kubernetes workload controller, Kubernetes replica set, Kubernetes stateful set, Kubernetes daemon set, Kubernetes jobs, Kubernetes cron job | Kubernetes pod |
150150

articles/defender-for-cloud/concept-agentless-containers.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -68,13 +68,13 @@ Before starting the onboarding process, make sure you have [a subscription onboa
6868

6969
Verify that the settings were saved successfully - a notification message pops up in the top right corner.
7070

71-
### Image refresh intervals
71+
### Container registries vulnerability assessments recommendations
7272

73-
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
73+
For container registries vulnerability assessments, recommendations are available based on the vulnerability assessment timeline.
7474

75-
Recommendations are available based on vulnerability assessment timeline. Learn more about [image scanning](defender-for-containers-vulnerability-assessment-azure.md).
75+
Learn more about [image scanning](defender-for-containers-vulnerability-assessment-azure.md).
7676

77-
## How agentless containers works
77+
## How Agentless discovery for Kubernetes works
7878

7979
The system’s architecture is based on a snapshot mechanism at intervals.
8080

@@ -99,6 +99,10 @@ By enabling the Agentless discovery for Kubernetes extension, the following proc
9999

100100
1. **Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
101101

102+
## Refresh intervals
103+
104+
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
105+
102106
## Next steps
103107

104108
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).

articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,13 @@ When a scan is triggered, findings are available as Defender for Cloud recommend
3636

3737
Before you can scan your ACR images:
3838

39-
- [Enable Defender for Containers](defender-for-containers-enable.md) for your subscription. Defender for Containers is now ready to scan images in your registries.
39+
- Enable one of the following plans for your subscription:
4040

41-
>[!NOTE]
42-
> This feature is charged per image.
41+
- [Defender CSPM](concept-cloud-security-posture-management.md). Make sure to also enable the Container registries vulnerability assessments (preview) extension.
42+
- [Defender for Containers](defender-for-containers-enable.md). Defender for Containers is now ready to scan images in your registries.
43+
44+
>[!NOTE]
45+
> This feature is charged per image.
4346
4447
- If you want to find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
4548

0 commit comments

Comments
 (0)