Skip to content

Commit f4996bc

Browse files
authored
Merge pull request #106466 from memildin/asc-melvyn-vmva
Changed one word
2 parents 97b4f07 + 7d04260 commit f4996bc

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/security-center/container-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ For instructions on how to use these features, see [Monitoring the security of y
3232
## Vulnerability management - scanning container images
3333
To monitor your ARM-based Azure Container Registry, ensure you're on Security Center's standard tier (see [pricing](/azure/security-center/security-center-pricing)). Then, enable the optional Container Registries bundle. When a new image is pushed, Security Center scans the image using a scanner from the industry-leading vulnerability scanning vendor, Qualys.
3434

35-
When issues are found – by Qualys or Security Center – youll get notified in the Security Center dashboard. For every vulnerability, Security Center provides actionable recommendations, along with a severity classification, and guidance for how to remediate the issue. For details of Security Center's recommendations for containers, see the [reference list of recommendations](recommendations-reference.md#recs-containers).
35+
When issues are found – by Qualys or Security Center – you'll get notified in the Security Center dashboard. For every vulnerability, Security Center provides actionable recommendations, along with a severity classification, and guidance for how to remediate the issue. For details of Security Center's recommendations for containers, see the [reference list of recommendations](recommendations-reference.md#recs-containers).
3636

3737
Security Center filters and classifies findings from the scanner. When an image is healthy, Security Center marks it as such. Security Center generates security recommendations only for images that have issues to be resolved. By only notifying when there are problems, Security Center reduces the potential for unwanted informational alerts.
3838

@@ -51,7 +51,7 @@ When you're exploring the security issues of a VM, Security Center provides addi
5151
> These CIS benchmark checks will not run on AKS-managed instances or Databricks-managed VMs.
5252
5353
### Continuous monitoring of your Kubernetes clusters (Preview)
54-
Security Center works together with Azure Kubernetes Service (AKS), Microsofts managed container orchestration service for developing, deploying, and managing containerized applications.
54+
Security Center works together with Azure Kubernetes Service (AKS), Microsoft's managed container orchestration service for developing, deploying, and managing containerized applications.
5555

5656
AKS provides security controls and visibility into the security posture of your clusters. Security Center uses these features to:
5757
* Constantly monitor the configuration of your AKS clusters
@@ -74,7 +74,7 @@ Security Center scans Linux OS based images that provide shell access.
7474
The Qualys scanner doesn't support super minimalist images such as [Docker scratch](https://hub.docker.com/_/scratch/) images, or "Distroless" images that only contain your application and its runtime dependencies without a package manager, shell, or OS.
7575

7676
### How does Azure Security Center scan an image?
77-
The image is extracted from the registry. It's then run in an isolated sandbox with the Qualys scanner that extracts a list of known vulnerabilities.
77+
The image is pulled from the registry. It's then run in an isolated sandbox with the Qualys scanner that extracts a list of known vulnerabilities.
7878

7979
Security Center filters and classifies findings from the scanner. When an image is healthy, Security Center marks it as such. Security Center generates security recommendations only for images that have issues to be resolved. By only notifying when there are problems, Security Center reduces the potential for unwanted informational alerts.
8080

0 commit comments

Comments
 (0)