You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/attack-path-reference.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,8 +131,8 @@ This section lists all of the cloud security graph components (connections and
131
131
| DEASM findings | Microsoft Defender External Attack Surface Management (DEASM) internet scanning findings | Public IP |
132
132
| Privileged container | Indicates that a Kubernetes container runs in a privileged mode | Kubernetes container |
133
133
| Uses host network | Indicates that a Kubernetes pod uses the network namespace of its host machine | Kubernetes pod |
134
-
| Has high severity vulnerabilities | Indicates that a resource has high severity vulnerabilities | Azure VM, AWS EC2, Kubernetes image |
135
-
| Vulnerable to remote code execution | Indicates that a resource has vulnerabilities allowing remote code execution | Azure VM, AWS EC2, Kubernetes image |
134
+
| Has high severity vulnerabilities | Indicates that a resource has high severity vulnerabilities | Azure VM, AWS EC2, Container image |
135
+
| Vulnerable to remote code execution | Indicates that a resource has vulnerabilities allowing remote code execution | Azure VM, AWS EC2, Container image |
136
136
| Public IP metadata | Lists the metadata of an Public IP | Public IP |
137
137
| Identity metadata | Lists the metadata of an identity | Azure AD Identity |
138
138
@@ -144,7 +144,7 @@ This section lists all of the cloud security graph components (connections and
144
144
| Has permission to | Indicates that an identity has permissions to a resource or a group of resources | Azure AD user account, Managed Identity, IAM user, EC2 instance | All Azure & AWS resources|
145
145
| Contains | Indicates that the source entity contains the target entity | Azure subscription, Azure resource group, AWS account, Kubernetes namespace, Kubernetes pod, Kubernetes cluster, GitHub owner, Azure DevOps project, Azure DevOps organization, Azure SQL server | All Azure & AWS resources, All Kubernetes entities, All DevOps entities, Azure SQL database |
146
146
| Routes traffic to | Indicates that the source entity can route network traffic to the target entity | Public IP, Load Balancer, VNET, Subnet, VPC, Internet Gateway, Kubernetes service, Kubernetes pod| Azure VM, Azure VMSS, AWS EC2, Subnet, Load Balancer, Internet gateway, Kubernetes pod, Kubernetes service |
147
-
| Is running | Indicates that the source entity is running the target entity as a process | Azure VM, EC2, Kubernetes container | SQL, Arc-Enabled SQL, Hosted MongoDB, Hosted MySQL, Hosted Oracle, Hosted PostgreSQL, Hosted SQL Server, Kubernetes image, Kubernetes pod |
147
+
| Is running | Indicates that the source entity is running the target entity as a process | Azure VM, EC2, Kubernetes container | SQL, Arc-Enabled SQL, Hosted MongoDB, Hosted MySQL, Hosted Oracle, Hosted PostgreSQL, Hosted SQL Server, Container image, Kubernetes pod |
148
148
| Member of | Indicates that the source identity is a member of the target identities group | Azure AD group, Azure AD user | Azure AD group |
149
149
| Maintains | Indicates that the source Kubernetes entity manages the life cycle of the target Kubernetes entity | Kubernetes workload controller, Kubernetes replica set, Kubernetes stateful set, Kubernetes daemon set, Kubernetes jobs, Kubernetes cron job | Kubernetes pod |
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
73
+
For container registries vulnerability assessments, recommendations are available based on the vulnerability assessment timeline.
74
74
75
-
Recommendations are available based on vulnerability assessment timeline. Learn more about [image scanning](defender-for-containers-vulnerability-assessment-azure.md).
75
+
Learn more about [image scanning](defender-for-containers-vulnerability-assessment-azure.md).
76
76
77
-
## How agentless containers works
77
+
## How Agentless discovery for Kubernetes works
78
78
79
79
The system’s architecture is based on a snapshot mechanism at intervals.
80
80
@@ -99,6 +99,10 @@ By enabling the Agentless discovery for Kubernetes extension, the following proc
99
99
100
100
1.**Bind**: Upon discovery of an AKS cluster, MDC performs an AKS bind operation between the created identity and the Kubernetes role “Microsoft.Security/pricings/microsoft-defender-operator”. The role is visible via API and gives MDC data plane read permission inside the cluster.
101
101
102
+
## Refresh intervals
103
+
104
+
Agentless information in Defender CSPM is updated once an hour via snapshotting mechanism. It can take up to **24 hours** to see results in Cloud Security Explorer and Attack Path.
105
+
102
106
## Next steps
103
107
104
108
Learn more about [Cloud Security Posture Management](concept-cloud-security-posture-management.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,10 +36,13 @@ When a scan is triggered, findings are available as Defender for Cloud recommend
36
36
37
37
Before you can scan your ACR images:
38
38
39
-
-[Enable Defender for Containers](defender-for-containers-enable.md) for your subscription. Defender for Containers is now ready to scan images in your registries.
39
+
- Enable one of the following plans for your subscription:
40
40
41
-
>[!NOTE]
42
-
> This feature is charged per image.
41
+
-[Defender CSPM](concept-cloud-security-posture-management.md). Make sure to also enable the Container registries vulnerability assessments (preview) extension.
42
+
-[Defender for Containers](defender-for-containers-enable.md). Defender for Containers is now ready to scan images in your registries.
43
+
44
+
>[!NOTE]
45
+
> This feature is charged per image.
43
46
44
47
- If you want to find vulnerabilities in images stored in other container registries, you can import the images into ACR and scan them.
0 commit comments