You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Identify vulnerabilities in Azure Container Registry with Microsoft Defen
3
3
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
4
4
author: bmansheim
5
5
ms.author: benmansheim
6
-
ms.date: 01/03/2023
6
+
ms.date: 01/11/2023
7
7
ms.topic: how-to
8
8
ms.custom: ignite-2022
9
9
---
@@ -55,21 +55,23 @@ For a list of the types of images and container registries supported by Microsof
55
55
56
56
1. To view the findings, open the **Recommendations** page. If issues were found, you'll see the recommendation [Container registry images should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/dbd0cb49-b563-45e7-9724-889e799fa648).
57
57
58
-

58
+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/container-registry-images-name-line.png" alt-text="Screenshot showing the recommendation line." lightbox="media/defender-for-containers-vulnerability-assessment-azure/container-registry-images-name-line.png":::
59
59
60
60
1. Select the recommendation.
61
61
62
62
The recommendation details page opens with additional information. This information includes the list of registries with vulnerable images ("Affected resources") and the remediation steps.
63
63
64
64
1. Select a specific registry to see the repositories in it that have vulnerable repositories.
65
65
66
-

66
+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/container-registry-images-unhealthy-registry.png" alt-text="Screenshot showing where to select a specific registry." lightbox="media/defender-for-containers-vulnerability-assessment-azure/container-registry-images-unhealthy-registry.png":::
67
67
68
68
The registry details page opens with the list of affected repositories.
69
69
70
70
1. Select a specific repository to see the repositories in it that have vulnerable images.
71
71
72
-

72
+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/container-registry-details.png" alt-text="Screenshot showing select specific image to see vulnerabilities." lightbox="media/defender-for-containers-vulnerability-assessment-azure/container-registry-details.png":::
73
+
74
+
73
75
74
76
The repository details page opens. It lists the vulnerable images together with an assessment of the severity of the findings.
75
77
@@ -79,13 +81,13 @@ For a list of the types of images and container registries supported by Microsof
79
81
80
82
The list of findings for the selected image opens.
81
83
82
-

84
+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/list-of-findings.png" alt-text="Screenshot showing list of findings for the selected image." lightbox="media/defender-for-containers-vulnerability-assessment-azure/list-of-findings.png":::
83
85
84
86
1. To learn more about a finding, select the finding.
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/finding-details.png" alt-text="Screenshot showing details about a specific finding." lightbox="media/defender-for-containers-vulnerability-assessment-azure/finding-details.png":::
89
91
90
92
This pane includes a detailed description of the issue and links to external resources to help mitigate the threats.
91
93
@@ -136,7 +138,7 @@ To create a rule:
136
138
1. Define your criteria.
137
139
1. Select **Apply rule**.
138
140
139
-
:::image type="content" source="./media/defender-for-containers-vulnerability-assessment-azure/new-disable-rule-for-registry-finding.png" alt-text="Create a disable rule for VA findings on registry.":::
141
+
:::image type="content" source="./media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png" alt-text="Screenshot showing how to create a disable rule for VA findings on registry." lightbox="media/defender-for-containers-vulnerability-assessment-azure/disable-rule.png":::
140
142
141
143
1. To view, override, or delete a rule:
142
144
1. Select **Disable rule**.
@@ -150,7 +152,7 @@ Defender for Cloud gives its customers the ability to prioritize the remediation
150
152
151
153
To provide findings for the recommendation, Defender for Cloud collects the inventory of your running containers that are collected by the Defender agent installed on your AKS clusters. Defender for Cloud correlates that inventory with the vulnerability assessment scan of images that are stored in ACR. The recommendation shows your running containers with the vulnerabilities associated with the images that are used by each container and provides vulnerability reports and remediation steps.
152
154
153
-
:::image type="content" source="media/defender-for-containers/running-image-vulnerabilities-recommendation.png" alt-text="Screenshot showing where the recommendation is viewable." lightbox="media/defender-for-containers/running-image-vulnerabilities-recommendation-expanded.png":::
155
+
:::image type="content" source="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png" alt-text="Screenshot of recommendations showing your running containers with the vulnerabilities associated with the images used by each container." lightbox="media/defender-for-containers-vulnerability-assessment-azure/view-running-containers-vulnerability.png":::
0 commit comments