Skip to content

Commit fd2d721

Browse files
author
David Curwin
committed
Subassessment REST API
1 parent bd01813 commit fd2d721

File tree

3 files changed

+436
-2
lines changed

3 files changed

+436
-2
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -561,7 +561,9 @@
561561
- name: View and remediate vulnerabilities for running images
562562
href: view-and-remediate-vulnerabilities-for-images-running-on-aks.md
563563
- name: Disable vulnerabilities on images
564-
href: disable-vulnerability-findings-containers.md
564+
href: disable-vulnerability-findings-containers.md
565+
- name: Subassessment REST API
566+
href: subassessment-rest-api.md
565567
- name: Vulnerability assessment for AWS
566568
displayName: AWS, ECR, registry, images, qualys
567569
href: defender-for-containers-vulnerability-assessment-elastic.md

articles/defender-for-cloud/agentless-container-registry-vulnerability-assessment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Container vulnerability assessment powered by MDVM (Microsoft Defender Vulnerabi
3030
| [Running container images should have vulnerability findings resolved (powered by Microsoft Defender Vulnerability Management)](https://ms.portal.azure.com/#view/Microsoft_Azure_Security_CloudNativeCompute/ContainersRuntimeRecommendationDetailsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5)  | Container image vulnerability assessment scans your registry for commonly known vulnerabilities (CVEs) and provides a detailed vulnerability report for each image. This recommendation provides visibility to vulnerable images currently running in your Kubernetes clusters. Remediating vulnerabilities in container images that are currently running is key to improving your security posture, significantly reducing the attack surface for your containerized workloads. | c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5 |
3131

3232
- **Query vulnerability information via the Azure Resource Graph** - Ability to query vulnerability information via the [Azure Resource Graph](/azure/governance/resource-graph/overview#how-resource-graph-complements-azure-resource-manager). Learn how to [query recommendations via ARG](review-security-recommendations.md#review-recommendation-data-in-azure-resource-graph-arg).
33-
- **Query vulnerability information via sub-assessment API** - You can get scan results via REST API. See the [subassessment list](/rest/api/defenderforcloud/sub-assessments/get?tabs=HTTP).
33+
- **Query vulnerability information via subassessment API** - You can get scan results via [REST API](subassessment-rest-api.md).
3434
- **Support for exemptions** - Learn how to [create exemption rules for a management group, resource group, or subscription](disable-vulnerability-findings-containers.md).
3535
- **Support for disabling vulnerabilities** - Learn how to [disable vulnerabilities on images](disable-vulnerability-findings-containers.md).
3636

0 commit comments

Comments
 (0)