Skip to content

Commit 3d68b1d

Browse files
Merge pull request #2629 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-18 06:00 UTC
2 parents 23a4c2b + 2bf6f67 commit 3d68b1d

2 files changed

Lines changed: 4 additions & 2 deletions

File tree

articles/defender-for-cloud/defender-for-containers-azure-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,8 @@ Choose the approach that best aligns with your organization's DevOps practices a
7171

7272
Before deploying Defender for Containers on AKS, ensure you meet these requirements:
7373

74-
- AKS clusters running Kubernetes 1.19 or later
74+
- AKS clusters running Kubernetes 1.22 or later
75+
7576
- Network connectivity for outbound HTTPS to Azure endpoints
7677
- By default, AKS clusters have unrestricted outbound (egress) internet access. Clusters with restricted egress must allow specific endpoints. See: [Microsoft Defender for Containers - Required FQDN/application rules](/azure/aks/outbound-rules-control-egress#microsoft-defender-for-containers)
7778

articles/defender-for-cloud/defender-for-containers-deployment-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,8 @@ Before deploying Defender for Containers, make sure you have:
7676

7777
- An active Azure subscription
7878
- Owner or Contributor role on the subscription
79-
- Kubernetes cluster version 1.19 or later
79+
- Kubernetes cluster version 1.22 or later
80+
8081
- Network connectivity to Azure services
8182
- For sensor-based capabilities: Sufficient cluster resources for Defender components - see [Defender sensor component details](defender-for-containers-architecture.md#defender-sensor-component-details)
8283
- [Enable an OpenId Connect (OIDC) issuer](/azure/aks/use-oidc-issuer) for your cluster.

0 commit comments

Comments
 (0)