Skip to content

Commit 22be4f6

Browse files
committed
Formatting
1 parent 7737fe3 commit 22be4f6

2 files changed

Lines changed: 20 additions & 19 deletions

File tree

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 20 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use Microsoft Defender for Cloud's set of Kubernetes d
44
ms.topic: how-to
55
author: Elazark
66
ms.author: elkrieger
7-
ms.date: 03/15/2026
7+
ms.date: 03/23/2026
88
---
99

1010
# Protect your Kubernetes data plane hardening
@@ -56,11 +56,11 @@ If you disabled the "Azure Policy for Kubernetes" settings under the containers
5656

5757
1. Select **Settings**.
5858

59-
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
59+
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
6060

6161
1. In the Settings & Monitoring page, toggle the **Azure Policy for Kubernetes** to **On**.
6262

63-
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
63+
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
6464

6565
#### Enable for GCP projects
6666

@@ -86,12 +86,14 @@ You can manually configure the Azure Policy for Kubernetes on existing Kubernete
8686
- **Azure -** `"Azure Kubernetes Service clusters should have the Azure Policy add-on for Kubernetes installed"`
8787
- **GCP** - `"GKE clusters should have the Azure Policy extension"`.
8888
- **AWS and On-premises** - `"Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed"`.
89-
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
89+
90+
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
9091

9192
1. Select a found recommendation.
9293

9394
1. Select **Fix**.
94-
:::image type="content" source="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png" alt-text="Screenshot of a recommendation with the Fix button highlighted.":::
95+
96+
:::image type="content" source="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png" alt-text="Screenshot of a recommendation with the Fix button highlighted." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png":::
9597

9698
1. Repeat for each additional recommendation.
9799

@@ -138,33 +140,30 @@ For recommendations with parameters that need to be customized, you need to set
138140
1. Select the relevant subscription.
139141

140142
1. From the navigation menu, select **Security policies**.
141-
:::image type="content" source="media/kubernetes-workload-protections/security-policies-page.png" alt-text="Screenshot of the Security policies page.":::
143+
144+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-page.png" alt-text="Screenshot of the Security policies page." lightbox="media/kubernetes-workload-protections/security-policies-page.png":::
142145

143146
1. On the **Standards** tab, search for the appropriate security standard.
144147

145148
1. Select the security standard's 3-dot menu and select **Manage**.
146-
:::image type="content" source="media/kubernetes-workload-protections/security-policies-select-manage.png" alt-text="Screenshot of selecting Manage from the recommendation's 3-dot menu.":::
149+
150+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-select-manage.png" alt-text="Screenshot of selecting Manage from the recommendation's 3-dot menu." lightbox="media/kubernetes-workload-protections/security-policies-select-manage.png":::
147151

148152
1. Select the relevant policy assignment's 3-dot menu and select **Manage effect and parameters**.
149-
:::image type="content" source="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png" alt-text="Screenshot of selecting the 3-dot menu and then selecting Manage effect and aparameters.":::
153+
154+
:::image type="content" source="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png" alt-text="Screenshot of selecting the 3-dot menu and then selecting Manage effect and aparameters." lightbox="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png":::
150155

151156
1. Modify the values as required.
152-
153-
154-
1. Select the relevant assignment. The default assignment is `ASC default`.
155-
156-
1. Open the **Parameters** tab and modify the values as required.
157-
:::image type="content" source="media/kubernetes-workload-protections/manage-effect-and-parameters.png" alt-text="Screenshot of the paraments panel.":::
158-
159-
:::image type="content" source="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png" alt-text="Screenshot showing where to modify the parameters for one of the recommendations in the Kubernetes data plane hardening protection bundle." lightbox="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png":::
157+
158+
:::image type="content" source="media/kubernetes-workload-protections/manage-effect-and-parameters.png" alt-text="Screenshot of the paraments panel." lightbox="media/kubernetes-workload-protections/manage-effect-and-parameters.png":::
160159

161160
1. Select **Save**.
162161

163162
**To enforce any of the recommendations**:
164163

165164
1. Open the recommendation details page and select **Deny**:
166165

167-
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
166+
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
168167

169168
The pane to set the scope opens.
170169

@@ -177,15 +176,17 @@ For recommendations with parameters that need to be customized, you need to set
177176
1. Go to **Defender for Cloud** > **Inventory**.
178177

179178
1. Set the resource type filter to **Kubernetes services** and select **Apply**.
180-
:::image type="content" source="media/kubernetes-workload-protections/resource-type-kubernetes-service.png" alt-text="Screenshot of using the resource type filter to select kubernetes service.":::
179+
180+
:::image type="content" source="media/kubernetes-workload-protections/resource-type-kubernetes-service.png" alt-text="Screenshot of using the resource type filter to select kubernetes service." lightbox="media/kubernetes-workload-protections/resource-type-kubernetes-service.png":::
181181

182182
1. Select a cluster to investigate.
183183

184184
1. Review the available recommendations for it. When you view a recommendation from the workload protection set, the number of affected pods ("Kubernetes components") is listed alongside the cluster.
185185

186186

187187
1. Optional: For a list of the specific pods, select the recommendation.
188-
:::image type="content" source="media/kubernetes-workload-protections/resource-health-recommendation.png" alt-text="Screenshot of selecting a recommendation from the Resource health page.":::
188+
189+
:::image type="content" source="media/kubernetes-workload-protections/resource-health-recommendation.png" alt-text="Screenshot of selecting a recommendation from the Resource health page." lightbox="media/kubernetes-workload-protections/resource-health-recommendation.png":::
189190
1. and then select **Take action**.
190191

191192
:::image type="content" source="./media/defender-for-kubernetes-usage/view-affected-pods-for-recommendation.gif" alt-text="Screenshot showing where to view the affected pods for a Kubernetes recommendation.":::
-8.86 KB
Loading

0 commit comments

Comments
 (0)