Skip to content

Commit 367bb49

Browse files
committed
added images
1 parent 103a149 commit 367bb49

17 files changed

+23
-5
lines changed

defender-xdr/investigate-respond-container-threats.md

Lines changed: 23 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,17 +37,17 @@ Analysts can then investigate the full scope of the attack with the ability to h
3737

3838
## Prerequisites
3939

40-
The following licenses are required to view and resolve container-related alerts in the Defender portal:
40+
The following licenses are required to view and resolve container-related alerts in the Microsoft Defender portal:
4141

42-
- [Microsoft Defender for Containers enabled](/azure/defender-for-cloud/defender-for-containers-introduction)
43-
- Microsoft Defender XDR
42+
- [Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction)
43+
- [Microsoft Defender XDR](prerequisites.md#licensing-requirements)
4444

4545
> [!NOTE]
4646
> The **isolate pod** response action requires a network policy enforcer. Check whether your Kubernetes cluster has a network policy installed.
4747
4848
Users on the [Microsoft Defender for Cloud Security Posture Management](/azure/defender-for-cloud/concept-cloud-security-posture-management) plan can view attack paths in the incident graph.
4949

50-
Users with provisioned access to Microsoft Security Copilot can also take advantage of the guided responses delivered in the Microsoft Defender portal to investigate and remediate container threats.
50+
Users with provisioned access to [Microsoft Security Copilot](/copilot/security/microsoft-security-copilot) can also take advantage of the [guided responses](security-copilot-m365d-guided-response.md) to investigate and remediate container threats.
5151

5252
## Permissions
5353

@@ -66,28 +66,46 @@ To investigate container threats in the Microsoft Defender portal:
6666

6767
1. Select **Investigation & response > Incidents and alerts** in the left-hand navigation menu to open the incident or alert queues.
6868
2. In the queue, select **Filter** and choose **Microsoft Defender for Cloud > Microsoft Defender for Containers** under Service source.
69+
:::image type="content" source="/defender/media/defender-containers/incident-queue-small.png" alt-text="Incident queue filtered to show container-related incidents." lightbox="/defender/media/defender-containers/incident-queue.png":::
6970
3. In the incident graph, select the pod/service/cluster entity you need to investigate. Select **Kubernetes service details**, **Kubernetes pod details**, **Kubernetes cluster details**, or **Container registry details** to view relevant information about the service, pod, or registry.
7071

7172
Using [Threat analytics](threat-analytics.md) reports, analysts can utilize threat intelligence from expert Microsoft security researchers to learn about active threat actors and campaigns exploiting containers, new attack techniques that might affect containers, and prevalent threats that affect containers.
7273

7374
Access threat analytics reports from **Threat intelligence > Threat analytics**. You can also open a specific report from the incident page by selecting **View threat analytics report** under **Related threats** on the incident side pane.
7475

76+
:::image type="content" source="/defender/media/defender-containers/view-threat-analytics-small.png" alt-text="Highlighting how to view threat analytics reports from the incident page." lightbox="/defender/media/defender-containers/view-threat-analytics.png":::
77+
7578
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Here’s an example of an analyst report about a container attack.
7679

80+
:::image type="content" source="/defender/media/defender-containers/threat-analytics-sample-small.png" alt-text="Sample page of a container attack threat analytics report." lightbox="/defender/media/defender-containers/threat-analytics-sample.png":::
81+
7782
## Respond to container threats
7883

7984
You can **isolate** or **terminate** a pod once you determine that a pod is compromised or malicious. In the incident graph, select the pod then go to **Actions** to view the available response actions. You can also find these response actions on the entity side pane.
8085

86+
:::image type="content" source="/defender/media/defender-containers/container-actions-small.png" alt-text="Highlighting the cloud response actions in an incident." lightbox="/defender/media/defender-containers/container-actions.png":::
87+
8188
You can release a pod from isolation with the **release from isolation** action once your investigation is complete. This option appears on the side pane for isolated pods.
8289

8390
Details of all response actions can be viewed in the [Action center](m365d-action-center.md). In the Action center page, select the response action you want to inspect to view more information about the action like which entity was acted on, when the action was done, and view the comments on the action. For isolated pods, the **release from isolation** action is also available in the Action center details pane.
8491

92+
:::image type="content" source="/defender/media/defender-containers/action-center-sample-small.png" alt-text="Sample of cloud response actions listed in the Action center." lightbox="/defender/media/defender-containers/action-center-sample.png":::
93+
8594
## Hunt for container-related activities
8695

8796
To determine the full scope of a container attack, you can deepen your investigation with the **Go hunt** action available in the incident graph. You can immediately view all process events and activities related to container-related incidents from the incident graph.
8897

98+
:::image type="content" source="/defender/media/defender-containers/azure-go-hunt-small.png" alt-text="Highlighting the go hunt action in the incident graph." lightbox="/defender/media/defender-containers/azure-go-hunt.png":::
99+
89100
In the [Advanced hunting](advanced-hunting-overview.md) page, you can extend your search for container-related activities using the **CloudProcessEvents** and **CloudAuditEvents** tables.
90101

102+
:::image type="content" source="/defender/media/defender-containers/adv-hunting-cloud-small.png" alt-text="Highlighting the advanced hunting tables related to cloud events." lightbox="/defender/media/defender-containers/adv-hunting-cloud.png":::
103+
91104
The **CloudProcessEvents** table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine.
92105

93-
The **CloudAuditEvents table** contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains kube-audit logs, which holds information about Kubernetes-related events.
106+
The **CloudAuditEvents table** contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events.
107+
108+
## See also
109+
110+
- [Microsoft Defender for Containers architecture](/azure/defender-for-cloud/defender-for-containers-architecture?tabs=defender-for-container-arch-aks)
111+
- [Kubeaudit events in advanced hunting](/azure/defender-for-cloud/kubeaudit-events-advanced-hunting)
39.7 KB
Loading
134 KB
Loading
152 KB
Loading
463 KB
Loading
186 KB
Loading
621 KB
Loading
110 KB
Loading
331 KB
Loading
78.4 KB
Loading

0 commit comments

Comments
 (0)