|
| 1 | +--- |
| 2 | +title: Investigate and respond to container threats in the Microsoft Defender portal |
| 3 | +description: Investigate and respond to container attacks and threats with cloud investigation and response actions in the Microsoft Defender portal. |
| 4 | +ms.service: defender-xdr |
| 5 | +f1.keywords: |
| 6 | + - NOCSH |
| 7 | +ms.author: diannegali |
| 8 | +author: diannegali |
| 9 | +ms.localizationpriority: medium |
| 10 | +manager: deniseb |
| 11 | +audience: ITPro |
| 12 | +ms.collection: |
| 13 | + - m365-security |
| 14 | + - tier1 |
| 15 | +ms.topic: conceptual |
| 16 | +search.appverid: |
| 17 | + - MOE150 |
| 18 | + - MET150 |
| 19 | +ms.date: 11/18/2024 |
| 20 | +appliesto: |
| 21 | +- Microsoft Defender XDR |
| 22 | +--- |
| 23 | +# Investigate and respond to container threats in the Microsoft Defender portal |
| 24 | + |
| 25 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)] |
| 26 | + |
| 27 | +> [!IMPORTANT] |
| 28 | +> Some information in this article relates to a prereleased product, which may be substantially modified before it’s commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here |
| 29 | +
|
| 30 | +Security operations can now investigate and respond to container-related alerts in near real-time in the Microsoft Defender portal with the integration of cloud-native response actions and investigation logs to hunt for related activities. The availability of attack paths can also help analysts immediately investigate and address critical security issues to prevent a potential breach. |
| 31 | + |
| 32 | +As organizations use containers and Kubernetes on platforms like Azure Kubernetes Service (AKS), Google Kubernetes Engine (GKE), ad Amazon Elastic Kubernetes Service (EKS), the attack surface expands, increasing security challenges. Containers can also be targeted by threat actors and used for malicious purposes. |
| 33 | + |
| 34 | +Security operations center (SOC) analysts can now easily track container threats with near real-time alerts and immediately respond to these threats by isolating or terminating container pods. This integration allows analysts to instantly mitigate a container attack from their environment in a click. |
| 35 | + |
| 36 | +Analysts can then investigate the full scope of the attack with the ability to hunt for related activities within the incident graph. They can also further apply preventive actions with the availability of potential attack paths in the incident graph. Using the information from the attack paths allows security teams to inspect the paths and prevent possible breaches. In addition, Threat analytics reports specific to container threats and attacks are available for analysts to gain more information and apply recommendations for container attack response and prevention. |
| 37 | + |
| 38 | +## Prerequisites |
| 39 | + |
| 40 | +The following licenses are required to view and resolve container-related alerts in the Microsoft Defender portal: |
| 41 | + |
| 42 | +- [Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction) |
| 43 | +- [Microsoft Defender XDR](prerequisites.md#licensing-requirements) |
| 44 | + |
| 45 | +> [!NOTE] |
| 46 | +> The **isolate pod** response action requires a network policy enforcer. Check whether your Kubernetes cluster has a network policy installed. |
| 47 | +
|
| 48 | +Users on the [Microsoft Defender for Cloud Security Posture Management](/azure/defender-for-cloud/concept-cloud-security-posture-management) plan can view attack paths in the incident graph. |
| 49 | + |
| 50 | +Users with provisioned access to [Microsoft Security Copilot](/copilot/security/microsoft-security-copilot) can also take advantage of the [guided responses](security-copilot-m365d-guided-response.md) to investigate and remediate container threats. |
| 51 | + |
| 52 | +## Permissions |
| 53 | + |
| 54 | +To perform any of the response actions, users must have the following permissions for Microsoft Defender for Cloud in the Microsoft Defender XDR unified role-based access control: |
| 55 | + |
| 56 | +|Permission name|Level| |
| 57 | +|:---|:---| |
| 58 | +|Alerts|Manage| |
| 59 | +|Response|Manage| |
| 60 | + |
| 61 | +For more information on these permissions, see [Permissions in Microsoft Defender XDR Unified role-based access control (RBAC)](custom-permissions-details.md). |
| 62 | + |
| 63 | +## Investigate container threats |
| 64 | + |
| 65 | +To investigate container threats in the Microsoft Defender portal: |
| 66 | + |
| 67 | +1. Select **Investigation & response > Incidents and alerts** in the left-hand navigation menu to open the incident or alert queues. |
| 68 | +2. In the queue, select **Filter** and choose **Microsoft Defender for Cloud > Microsoft Defender for Containers** under Service source. |
| 69 | + :::image type="content" source="/defender/media/defender-containers/incident-queue-small.png" alt-text="Incident queue filtered to show container-related incidents." lightbox="/defender/media/defender-containers/incident-queue.png"::: |
| 70 | +3. In the incident graph, select the pod/service/cluster entity you need to investigate. Select **Kubernetes service details**, **Kubernetes pod details**, **Kubernetes cluster details**, or **Container registry details** to view relevant information about the service, pod, or registry. |
| 71 | + |
| 72 | +Using [Threat analytics](threat-analytics.md) reports, analysts can utilize threat intelligence from expert Microsoft security researchers to learn about active threat actors and campaigns exploiting containers, new attack techniques that might affect containers, and prevalent threats that affect containers. |
| 73 | + |
| 74 | +Access threat analytics reports from **Threat intelligence > Threat analytics**. You can also open a specific report from the incident page by selecting **View threat analytics report** under **Related threats** on the incident side pane. |
| 75 | + |
| 76 | +:::image type="content" source="/defender/media/defender-containers/view-threat-analytics-small.png" alt-text="Highlighting how to view threat analytics reports from the incident page." lightbox="/defender/media/defender-containers/view-threat-analytics.png"::: |
| 77 | + |
| 78 | +Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Here’s an example of an analyst report about a container attack. |
| 79 | + |
| 80 | +:::image type="content" source="/defender/media/defender-containers/threat-analytics-sample-small.png" alt-text="Sample page of a container attack threat analytics report." lightbox="/defender/media/defender-containers/threat-analytics-sample.png"::: |
| 81 | + |
| 82 | +## Respond to container threats |
| 83 | + |
| 84 | +You can **isolate** or **terminate** a pod once you determine that a pod is compromised or malicious. In the incident graph, select the pod then go to **Actions** to view the available response actions. You can also find these response actions on the entity side pane. |
| 85 | + |
| 86 | +:::image type="content" source="/defender/media/defender-containers/container-actions-small.png" alt-text="Highlighting the cloud response actions in an incident." lightbox="/defender/media/defender-containers/container-actions.png"::: |
| 87 | + |
| 88 | +You can release a pod from isolation with the **release from isolation** action once your investigation is complete. This option appears on the side pane for isolated pods. |
| 89 | + |
| 90 | +Details of all response actions can be viewed in the [Action center](m365d-action-center.md). In the Action center page, select the response action you want to inspect to view more information about the action like which entity was acted on, when the action was done, and view the comments on the action. For isolated pods, the **release from isolation** action is also available in the Action center details pane. |
| 91 | + |
| 92 | +:::image type="content" source="/defender/media/defender-containers/action-center-sample-small.png" alt-text="Sample of cloud response actions listed in the Action center." lightbox="/defender/media/defender-containers/action-center-sample.png"::: |
| 93 | + |
| 94 | +## Hunt for container-related activities |
| 95 | + |
| 96 | +To determine the full scope of a container attack, you can deepen your investigation with the **Go hunt** action available in the incident graph. You can immediately view all process events and activities related to container-related incidents from the incident graph. |
| 97 | + |
| 98 | +:::image type="content" source="/defender/media/defender-containers/azure-go-hunt-small.png" alt-text="Highlighting the go hunt action in the incident graph." lightbox="/defender/media/defender-containers/azure-go-hunt.png"::: |
| 99 | + |
| 100 | +In the [Advanced hunting](advanced-hunting-overview.md) page, you can extend your search for container-related activities using the **CloudProcessEvents** and **CloudAuditEvents** tables. |
| 101 | + |
| 102 | +:::image type="content" source="/defender/media/defender-containers/adv-hunting-cloud-small.png" alt-text="Highlighting the advanced hunting tables related to cloud events." lightbox="/defender/media/defender-containers/adv-hunting-cloud.png"::: |
| 103 | + |
| 104 | +The **CloudProcessEvents** table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine. |
| 105 | + |
| 106 | +The **CloudAuditEvents table** contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events. |
| 107 | + |
| 108 | +## See also |
| 109 | + |
| 110 | +- [Microsoft Defender for Containers architecture](/azure/defender-for-cloud/defender-for-containers-architecture?tabs=defender-for-container-arch-aks) |
| 111 | +- [Kubeaudit events in advanced hunting](/azure/defender-for-cloud/kubeaudit-events-advanced-hunting) |
0 commit comments