Skip to content

Commit 28c3aa9

Browse files
Merge pull request #2593 from snicklezzz/wi556211-defender-image-cve-lifecycle
wi556211-defender-image-cve-lifecycle
2 parents 68ef820 + fd39567 commit 28c3aa9

1 file changed

Lines changed: 28 additions & 1 deletion

File tree

articles/defender-for-cloud/defender-for-containers-introduction.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,9 @@ Defender for Containers provides real-time threat protection for [supported cont
7676

7777
Threat protection is provided for Kubernetes at the cluster, node, and workload levels. Both sensor-based coverage that requires the [Defender sensor](defender-for-cloud-glossary.md#defender-sensor) and agentless coverage based on analysis of the Kubernetes audit logs are used to detect threats. Security alerts are only triggered for actions and deployments that occur after you enable Defender for Containers on your subscription.
7878

79-
Examples of security events that Microsoft Defenders for Containers monitors include:
79+
### Runtime detection examples
80+
81+
Examples of security events that Microsoft Defender for Containers monitors include:
8082

8183
- Exposed Kubernetes dashboards
8284
- Creation of high privileged roles
@@ -90,6 +92,31 @@ Defender for Cloud monitors the attack surface of multicloud Kubernetes deployme
9092

9193
Defender for Cloud is [integrated with Microsoft Defender XDR](concept-integration-365.md). When Defender for Containers is enabled, security operators can use [Defender XDR to investigate and respond](/defender-xdr/investigate-respond-container-threats) to security issues in supported Kubernetes services.
9294

95+
### Microsoft-maintained container images
96+
97+
Defender for Containers deploys container images that are maintained and updated by Microsoft as part of the runtime protection components. These images are published to Microsoft Container Registry (MCR).
98+
99+
Customers don't modify or patch these images directly. Microsoft maintains and updates them as part of the Defender for Containers release process.
100+
101+
The following images are used by Defender for Containers runtime protection components:
102+
103+
| Image | Purpose | MCR path |
104+
|---|---|---|
105+
| `security-publisher` | Publishes security findings collected from Kubernetes environments | `mcr.microsoft.com/azuredefender/stable/security-publisher` |
106+
| `low-level-collector` | Collects low-level runtime telemetry from Kubernetes nodes | `mcr.microsoft.com/azuredefender/stable/low-level-collector` |
107+
| `pod-collector` | Collects Kubernetes pod runtime data used for threat detection | `mcr.microsoft.com/azuredefender/stable/pod-collector` |
108+
| `anti-malware-collector` | Collects malware detection signals for container workloads | `mcr.microsoft.com/azuredefender/stable/anti-malware-collector` |
109+
| `old-file-cleaner` | Cleans up temporary and stale files as part of initialization workflows | `mcr.microsoft.com/azuredefender/stable/old-file-cleaner` |
110+
| `audit-logs-enabler` | Enables audit log collection for supported environments (for example, on-premises clusters) | `mcr.microsoft.com/azuredefender/stable/audit-logs-enabler` |
111+
| `defender-admission-controller` | Enforces runtime gating policies for Kubernetes workloads | `mcr.microsoft.com/mdc/prd/defender-admission-controller` |
112+
113+
Updates are delivered through the deployment mechanism used by your environment. For example:
114+
115+
- When deployed using the **AKS add-on**, updates are delivered through the AKS release lifecycle.
116+
- When deployed using **Helm**, updates are released within 30 days through updated chart versions.
117+
118+
If you detect a vulnerability in a Microsoft-maintained Defender image, open an Azure support request and include the image name, tag, and CVE identifier.
119+
93120
## Learn more
94121

95122
Learn more about Defender for Containers in the following blogs:

0 commit comments

Comments
 (0)