You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-architecture.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,6 +79,9 @@ When you enable the agentless discovery for Kubernetes extension, the following
79
79
-**Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the AKS clusters in your environment using API calls to the API server of AKS.
80
80
-**Bind**: Upon discovery of an AKS cluster, Defender for Cloud performs an AKS bind operation by creating a `ClusterRoleBinding` between the created identity and the Kubernetes `ClusterRole`*aks:trustedaccessrole:defender-containers:microsoft-defender-operator*. The `ClusterRole` is visible via API and gives Defender for Cloud data plane read permission inside the cluster.
81
81
82
+
> [!NOTE]
83
+
> The copied snapshot remains in the same region as the cluster.
### Architecture diagram of Defender for Cloud and Arc-enabled Kubernetes clusters
@@ -125,6 +128,9 @@ When you enable the agentless discovery for Kubernetes extension, the following
125
128
126
129
-**Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the EKS clusters in your environment using API calls to the API server of EKS.
127
130
131
+
> [!NOTE]
132
+
> The copied snapshot remains in the same region as the cluster.
### Architecture diagram of Defender for Cloud and GKE clusters
@@ -155,6 +161,9 @@ When you enable the agentless discovery for Kubernetes extension, the following
155
161
156
162
-**Discover**: Using the system assigned identity, Defender for Cloud performs a discovery of the GKE clusters in your environment using API calls to the API server of GKE.
157
163
164
+
> [!NOTE]
165
+
> The copied snapshot remains in the same region as the cluster.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/release-notes.md
+17-3Lines changed: 17 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,20 @@ To learn about *planned* changes that are coming soon to Defender for Cloud, see
20
20
21
21
If you're looking for items older than six months, you can find them in the [Archive for What's new in Microsoft Defender for Cloud](release-notes-archive.md).
22
22
23
+
## April 2024
24
+
25
+
|Date | Update |
26
+
|--|--|
27
+
| April 9 |[Runtime threat detection and agentless discovery for AWS and GCP in Defender for Containers now Generally Available (GA)](#runtime-threat-detection-and-agentless-discovery-for-aws-and-gcp-in-defender-for-containers-now-generally-available-ga)|
28
+
29
+
### Runtime threat detection and agentless discovery for AWS and GCP in Defender for Containers now Generally Available (GA)
30
+
31
+
April 9, 2024
32
+
33
+
Runtime threat detection and agentless discovery for AWS and GCP in Defender for Containers are now Generally Available (GA). For more information, see [Containers support matrix in Defender for Cloud](support-matrix-defender-for-containers.md).
34
+
35
+
In addition, there is a new authentication capability in AWS which simplifies provisioning. For more information, see [Configure Microsoft Defender for Containers components](defender-for-containers-enable.md&pivots=defender-for-container-eks#deploying-the-defender-sensor).
36
+
23
37
## March 2024
24
38
25
39
|Date | Update |
@@ -49,6 +63,7 @@ Learn more about [continuous export](benefits-of-continuous-export.md).
49
63
March 21, 2024
50
64
51
65
Until now agentless scanning covered CMK encrypted VMs in AWS and GCP. With this release we are completing support for Azure as well. The capability employs a unique scanning approach for CMK in Azure:
66
+
52
67
- Defender for Cloud does not handle the key or decryption process. Key handling and decryption is seamlessly handled by Azure Compute and is transparent to Defender for Cloud's agentless scanning service.
53
68
- The unencrypted VM disk data is never copied or re-encrypted with another key.
54
69
- The original key is not replicated during the process. Purging it eradicates the data on both your production VM and Defender for Cloud’s temporary snapshot.
@@ -58,14 +73,13 @@ During public preview this capability is not automatically enabled. If you are u
58
73
-[Learn more on agentless scanning for VMs](concept-agentless-data-collection.md)
59
74
-[Learn more on agentless scanning permissions](faq-permissions.yml#which-permissions-are-used-by-agentless-scanning-)
60
75
61
-
62
76
### New endpoint detection and response recommendations
63
77
64
78
March 18, 2024
65
79
66
-
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
80
+
We are announcing new endpoint detection and response recommendations that discover and assesses the configuration of supported endpoint detection and response solutions. If issues are found, these recommendations offer remediation steps.
67
81
68
-
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
82
+
The following new agentless endpoint protection recommendations are now available if you have Defender for Servers Plan 2 or the Defender CSPM plan enabled on your subscription with the agentless machine scanning feature enabled. The recommendations support Azure and multicloud machines. On-premises machines are not supported.
0 commit comments