You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/binary-drift-detection.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,8 +25,8 @@ Check out the availability of [binary drift and blocking](support-matrix-defende
25
25
26
26
- Run the Defender for Container sensor.
27
27
-**Binary drift blocking (Preview) only**:
28
-
- AKS: Helm provisioning with sensor version **0.10.1**.
29
-
- Multicloud: Helm provisioning with sensor version **0.10.1** or the ARC extension using `release train=preview`.
28
+
- AKS: Helm provisioning with sensor version **0.10.2**.
29
+
- Multicloud: Helm provisioning with sensor version **0.10.2** or the ARC extension using `release train=preview`.
30
30
-[Enable the Defender for Container sensor](defender-for-containers-azure-enable-portal.md#configure-plan-components) on the subscriptions and connectors.
31
31
- The following roles and permissions:
32
32
-**To create and modify drift policies**: Security Admin or higher permissions on the tenant.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/support-matrix-defender-for-containers.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ The following table lists the features provided by Defender for Containers for t
41
41
| Container registry VA | VA for images in container registries | ACR, ECR, GAR, GCR, Docker Hub, JFrog Artifactory | GA | GA | Requires **Registry access** <sup>[1](#footnote1azva)</sup> or Connector creation for Docker Hub/JFrog|**Defender for Containers** or **Defender CSPM**| Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet |
42
42
| Runtime container VA - Registry scan based | VA of containers running images from supported registries | ACR, ECR, GAR, GCR, Docker Hub, JFrog Artifactory | GA | GA | Requires **Registry access** <sup>[1](#footnote1azva)</sup> or Connector creation for Docker Hub/JFrog and either **K8S API access** or **Defender sensor** <sup>[1](#footnote1azva)</sup> |**Defender for Containers** or **Defender CSPM**| Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet |
43
43
| Runtime container VA | Registry agnostic VA of container running images | All | GA | - | Requires **Agentless scanning for machines** and either **K8S API access** or **Defender sensor** <sup>[1](#footnote1azva)</sup> |**Defender for Containers** or **Defender CSPM**| Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet |
44
-
| Runtime Node VA | Kubernetes node vulnerability assessment | AKS nodes | GA | GA | Requires **Agentless scanning for machines**|**Defender for Containers** or **Defender for servers Plan 2** or **Defender CSPM**| Commercial clouds |
44
+
| Runtime Node VA | Kubernetes node vulnerability assessment | AKS nodes | GA | GA | Requires **Agentless scanning for machines**|**Defender for Containers** or **Defender for servers Plan 2** or **Defender CSPM**| Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet|
45
45
46
46
<sup><aname="footnote1azva"></a>1</sup>National clouds are automatically enabled and can't be disabled.
47
47
@@ -83,7 +83,7 @@ The following table lists the features provided by Defender for Containers for t
83
83
|--|--|--|--|--|--|--|--|
84
84
| Advanced hunting in XDR | View cluster incidents and alerts in Microsoft XDR | AKS | Preview - currently supports audit logs & process events | Preview - currently supports audit logs | Requires **Defender sensor**|**Defender for Containers**| Commercial clouds and National clouds: Azure Government, Azure operated by 21Vianet |
85
85
| Anti-malware | Detection of malware | AKS | Preview | Preview | Requires **Defender sensor via Helm**|**Defender for Containers**| Commercial clouds |
86
-
| Binary drift detection | Detects binary of runtime container from container image | AKS | GA | - | Requires **Defender sensor**|**Defender for Containers**| Commercial clouds |
86
+
| Binary drift detection | Detects binary of runtime container from container image | AKS | GA | - | Requires **Defender sensor**|**Defender for Containers**| Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet|
87
87
| Binary drift blocking | Blocks binary drift in runtime containers | AKS | Preview | Preview | Requires **Defender sensor via Helm**|**Defender for Containers**| Commercial clouds |
88
88
| Control plane detection | Detection of suspicious activity for Kubernetes based on Kubernetes audit trail | AKS | GA | GA | Enabled with plan |**Defender for Containers**| Commercial clouds National clouds: Azure Government, Azure operated by 21Vianet |
89
89
|DNS Detection|DNS Detection capabilities |AKS|Preview||Requires **Defender sensor via Helm**|**Defender for Containers**|Commercial clouds|
@@ -191,13 +191,13 @@ The following table lists the features provided by Defender for Containers for t
191
191
192
192
| Feature | Description | Supported resources | Linux release state | Windows release state | Enablement method | Plans | Clouds availability |
193
193
|--|--|--|--|--|--|--|--|
194
-
|[Agentless discovery for Kubernetes](defender-for-containers-introduction.md#security-posture-management) <sup>[1](#footnote1spm)</sup> | Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations, and deployments. | AKS | GA | GA | Requires **K8S API access**| Defender for Containers **OR** Defender CSPM |Azure commercial clouds |
195
-
| Comprehensive inventory capabilities | Enables you to explore resources, pods, services, repositories, images, and configurations through [security explorer](how-to-manage-cloud-security-explorer.md#build-a-query) to easily monitor and manage your assets. | ACR, AKS | GA | GA | Requires **K8S API access**| Defender for Containers **OR** Defender CSPM |Azure commercial clouds |
196
-
| Attack path analysis | A graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that bad actors might use to breach your environment. | ACR, AKS | GA | GA | Requires **K8S API access**| Defender CSPM |Azure commercial clouds |
197
-
| Enhanced risk-hunting | Enables security admins to actively hunt for posture issues in their containerized assets through queries (built-in and custom) and [security insights](attack-path-reference.md#insights) in the [security explorer](how-to-manage-cloud-security-explorer.md). | ACR, AKS | GA | GA | Requires **K8S API access**| Defender for Containers **OR** Defender CSPM |Azure commercial clouds |
194
+
|[Agentless discovery for Kubernetes](defender-for-containers-introduction.md#security-posture-management) <sup>[1](#footnote1spm)</sup> | Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations, and deployments. | AKS | GA | GA | Requires **K8S API access**| Defender for Containers **OR** Defender CSPM |Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet|
195
+
| Comprehensive inventory capabilities | Enables you to explore resources, pods, services, repositories, images, and configurations through [security explorer](how-to-manage-cloud-security-explorer.md#build-a-query) to easily monitor and manage your assets. | ACR, AKS | GA | GA | Requires **K8S API access**| Defender for Containers **OR** Defender CSPM |Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet|
196
+
| Attack path analysis | A graph-based algorithm that scans the cloud security graph. The scans expose exploitable paths that bad actors might use to breach your environment. | ACR, AKS | GA | GA | Requires **K8S API access**| Defender CSPM |Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet|
197
+
| Enhanced risk-hunting | Enables security admins to actively hunt for posture issues in their containerized assets through queries (built-in and custom) and [security insights](attack-path-reference.md#insights) in the [security explorer](how-to-manage-cloud-security-explorer.md). | ACR, AKS | GA | GA | Requires **K8S API access**| Defender for Containers **OR** Defender CSPM |Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet|
198
198
|[Control plane hardening](defender-for-containers-architecture.md) <sup>[1](#footnote1spm)</sup> | Continuously assesses the configurations of your clusters and compares them with the initiatives applied to your subscriptions. When it finds misconfigurations, Defender for Cloud generates security recommendations that are available on Defender for Cloud's Recommendations page. The recommendations let you investigate and remediate issues. | ACR, AKS | GA | GA | Enabled with plan | Free | Commercial clouds<br><br> National clouds: Azure Government, Azure operated by 21Vianet |
199
199
|[Workload hardening](kubernetes-workload-protections.md) <sup>[1](#footnote1spm)</sup> |Protect workloads of your Kubernetes containers with best practice recommendations. |AKS | GA | - | Requires **Azure Policy**| Free | Commercial clouds<br><br> National clouds: Azure Government, Azure operated by 21Vianet |
200
-
| CIS Azure Kubernetes Service | CIS Azure Kubernetes Service Benchmark | AKS | GA | - | Assigned as a security standard | Defender for Containers **OR** Defender CSPM | Commercial clouds<br><br> |
200
+
| CIS Azure Kubernetes Service | CIS Azure Kubernetes Service Benchmark | AKS | GA | - | Assigned as a security standard | Defender for Containers **OR** Defender CSPM | Commercial clouds<br/><br/>National clouds: Azure Government, Azure operated by 21Vianet<br><br> |
201
201
202
202
<sup><aname="footnote1spm"></a>1</sup> This feature can be enabled for an individual cluster when enabling Defender for Containers at the cluster resource level.
0 commit comments