Skip to content

Commit fcb77eb

Browse files
author
David Curwin
committed
Update March 31
1 parent ef11bf1 commit fcb77eb

File tree

3 files changed

+32
-9
lines changed

3 files changed

+32
-9
lines changed

articles/defender-for-cloud/defender-for-containers-architecture.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,9 @@ When you enable the agentless discovery for Kubernetes extension, the following
7979
- **Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
8080
- **Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation by creating a `ClusterRoleBinding` between the created identity and the Kubernetes `ClusterRole` *aks:trustedaccessrole:defender-containers:microsoft-defender-operator*. The `ClusterRole` is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
8181

82+
> [!NOTE]
83+
> The copied snapshot remains in the same region as the cluster.
84+
8285
## [**On-premises / IaaS (Arc)**](#tab/defender-for-container-arch-arc)
8386

8487
### Architecture diagram of Defender for Cloud and Arc-enabled Kubernetes clusters
@@ -125,6 +128,9 @@ When you enable the agentless discovery for Kubernetes extension, the following
125128

126129
- **Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the EKS clusters in your environment using API calls to the API server of EKS.
127130

131+
> [!NOTE]
132+
> The copied snapshot remains in the same region as the cluster.
133+
128134
## [**GCP (GKE)**](#tab/defender-for-container-gke)
129135

130136
### Architecture diagram of Defender for Cloud and GKE clusters
@@ -155,6 +161,9 @@ When you enable the agentless discovery for Kubernetes extension, the following
155161

156162
- **Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the GKE clusters in your environment using API calls to the API server of GKE.
157163

164+
> [!NOTE]
165+
> The copied snapshot remains in the same region as the cluster.
166+
158167
---
159168

160169
## Next steps

articles/defender-for-cloud/release-notes.md

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,20 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
2020

2121
If you're looking for items older than six months, you can find them in the [Archive for What's new in Microsoft Defender for Cloud](release-notes-archive.md).
2222

23+
## April 2024
24+
25+
|Date | Update |
26+
|--|--|
27+
| April 9 | [Runtime threat detection and agentless discovery for AWS and GCP in Defender for Containers now Generally Available (GA)](#runtime-threat-detection-and-agentless-discovery-for-aws-and-gcp-in-defender-for-containers-now-generally-available-ga) |
28+
29+
### Runtime threat detection and agentless discovery for AWS and GCP in Defender for Containers now Generally Available (GA)
30+
31+
April 9, 2024
32+
33+
Runtime threat detection and agentless discovery for AWS and GCP in Defender for Containers are now Generally Available (GA). For more information, see [Containers support matrix in Defender for Cloud](support-matrix-defender-for-containers.md).
34+
35+
In addition, there is a new authentication capability in AWS which simplifies provisioning. For more information, see [Configure Microsoft Defender for Containers components](defender-for-containers-enable.md&pivots=defender-for-container-eks#deploying-the-defender-sensor).
36+
2337
## March 2024
2438

2539
|Date | Update |
@@ -49,6 +63,7 @@ Learn more about [continuous export](benefits-of-continuous-export.md).
4963
March 21, 2024
5064

5165
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we are completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
66+
5267
- Defender for Cloud does not handle the key or decryption process. Key handling and decryption is seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
5368
- The unencrypted VM disk data is never copied or re-encrypted with another key.
5469
- The original key is not replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
@@ -58,14 +73,13 @@ During public preview this capability is not automatically enabled. If you are u
5873
- [Learn more on agentless scanning for VMs](concept-agentless-data-collection.md)
5974
- [Learn more on agentless scanning permissions](faq-permissions.yml#which-permissions-are-used-by-agentless-scanning-)
6075

61-
6276
### New endpoint detection and response recommendations
6377

6478
March 18, 2024
6579

66-
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
80+
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
6781

68-
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
82+
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
6983

7084
| Recommendation name | Description | Severity |
7185
|--|

articles/defender-for-cloud/support-matrix-defender-for-containers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -105,9 +105,9 @@ Learn how to [use Azure Private Link to connect networks to Azure Monitor](../az
105105
| Security posture management | Kubernetes data plane hardening | EKS | GA| - | Azure Policy for Kubernetes | Defender for Containers |
106106
| [Vulnerability assessment](agentless-vulnerability-assessment-aws.md) | Agentless registry scan (powered by Microsoft Defender Vulnerability Management) [supported packages](#registries-and-images-support-for-aws---vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management)| ECR | Preview | Preview | Agentless | Defender for Containers or Defender CSPM |
107107
| [Vulnerability assessment](agentless-vulnerability-assessment-aws.md) | Agentless/sensor-based runtime (powered by Microsoft Defender Vulnerability Management) [supported packages](#registries-and-images-support-for-aws---vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management)| EKS | Preview | Preview | Agentless **OR/AND** Defender sensor | Defender for Containers or Defender CSPM |
108-
| Runtime protection| Control plane | EKS | Preview | Preview | Agentless | Defender for Containers |
109-
| Runtime protection| Workload | EKS | Preview | - | Defender sensor | Defender for Containers |
110-
| Deployment & monitoring | Discovery of unprotected clusters | EKS | Preview | - | Agentless | Free |
108+
| Runtime protection| Control plane | EKS | GA | Preview | Agentless | Defender for Containers |
109+
| Runtime protection| Workload | EKS | GA | - | Defender sensor | Defender for Containers |
110+
| Deployment & monitoring | Discovery of unprotected clusters | EKS | GA | - | Agentless | Defender for Containers |
111111
| Deployment & monitoring | Auto provisioning of Defender sensor | - | - | - | - | - |
112112
| Deployment & monitoring | Auto provisioning of Azure Policy for Kubernetes | - | - | - | - | - |
113113

@@ -149,9 +149,9 @@ Outbound proxy without authentication and outbound proxy with basic authenticati
149149
| Security posture management | Kubernetes data plane hardening | GKE | GA| - | Azure Policy for Kubernetes | Defender for Containers |
150150
| [Vulnerability assessment](agentless-vulnerability-assessment-gcp.md) | Agentless registry scan (powered by Microsoft Defender Vulnerability Management) [supported packages](#registries-and-images-support-for-gcp---vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management)| GAR, GCR | Preview | Preview | Agentless | Defender for Containers or Defender CSPM |
151151
| [Vulnerability assessment](agentless-vulnerability-assessment-gcp.md) | Agentless/sensor-based runtime (powered by Microsoft Defender Vulnerability Management) [supported packages](#registries-and-images-support-for-gcp---vulnerability-assessment-powered-by-microsoft-defender-vulnerability-management)| GKE | Preview | Preview | Agentless **OR/AND** Defender sensor | Defender for Containers or Defender CSPM |
152-
| Runtime protection| Control plane | GKE | Preview | Preview | Agentless | Defender for Containers |
153-
| Runtime protection| Workload | GKE | Preview | - | Defender sensor | Defender for Containers |
154-
| Deployment & monitoring | Discovery of unprotected clusters | GKE | Preview | - | Agentless | Free |
152+
| Runtime protection| Control plane | GKE | GA | Preview | Agentless | Defender for Containers |
153+
| Runtime protection| Workload | GKE | GA | - | Defender sensor | Defender for Containers |
154+
| Deployment & monitoring | Discovery of unprotected clusters | GKE | GA | - | Agentless | Defender for Containers |
155155
| Deployment & monitoring | Auto provisioning of Defender sensor | GKE | Preview | - | Agentless | Defender for Containers |
156156
| Deployment & monitoring | Auto provisioning of Azure Policy for Kubernetes | GKE | Preview | - | Agentless | Defender for Containers |
157157

0 commit comments

Comments
 (0)