Skip to content

Commit 4074fc9

Browse files
Merge pull request #2745 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-16 11:00 UTC
2 parents f9ebf1e + 99b8f09 commit 4074fc9

45 files changed

Lines changed: 490 additions & 329 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/defender-for-cloud/TOC.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -779,10 +779,10 @@
779779
- name: Overview
780780
displayName: k8s, containers, aks, nodes
781781
href: kubernetes-nodes-overview.md
782-
- name: Kubernetes node vulnerability assessment
782+
- name: Review and remediate VA findings for Kubernetes nodes
783783
displayName: k8s, containers, aks, node, vulnerability, assessment
784784
href: kubernetes-nodes-va.md
785-
- name: Kubernetes node malware detection
785+
- name: Review and remediate malware alerts for Kubernetes nodes
786786
displayName: k8s, containers, aks, node, malware
787787
href: kubernetes-nodes-malware.md
788788
- name: Image and runtime container vulnerability assessment
@@ -847,9 +847,10 @@
847847
displayName: faq, frequently asked questions, gated deployment
848848
href: faq-runtime-gated.md
849849
- name: Protect clusters with AKS Security Dashboard
850-
displayName: k8s, containers
851-
href: cluster-security-dashboard.md
852-
- name: Investigate clusters with Cloud Security Explorer
850+
items:
851+
- name: Overview
852+
href: cluster-security-dashboard.md
853+
- name: Investigate Kubernetes vulnerabilities with Cloud Security Explorer
853854
displayName: k8s, containers
854855
href: cloud-security-explorer-kubernetes-clusters.md
855856
- name: Defender for container registries (deprecated)

articles/defender-for-cloud/alerts-ai-workloads.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Alerts for AI services
33
description: This article lists the security alerts for AI services visible in Microsoft Defender for Cloud.
44
ms.topic: reference
55
ms.custom: linux-related-content
6-
ms.date: 03/25/2026
6+
ms.date: 04/16/2026
77
ai-usage: ai-assisted
88
ms.author: elkrieger
99
author: Elazark
@@ -321,8 +321,9 @@ Severity: High 
321321

322322
**Severity:** Low 
323323

324-
### Malicious content detected in uploaded AI model
324+
## Alerts for AI models
325325

326+
### (Preview) Malicious content detected in uploaded AI model
326327
(Ai.AIModelScan_MalwareDetected)
327328

328329
**Description:** A user-uploaded machine learning model was scanned and found to contain malware. The detection indicates the file may execute malicious code if loaded, posing a threat to account integrity, data confidentiality, and the compute environment.
Lines changed: 57 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,51 +1,91 @@
11
---
2-
title: Building Cloud Security Explorer query to identify vulnerabilities in Kubernetes clusters
3-
description: Learn to build queries with cloud security explorer in Microsoft Defender for Cloud to investigate vulnerabilities Kubernetes clusters
2+
title: Build Cloud Security Explorer queries to identify vulnerabilities in Kubernetes clusters
3+
description: Learn how to build queries with Cloud Security Explorer in Microsoft Defender for Cloud to investigate vulnerabilities in Kubernetes clusters.
44
ms.topic: how-to
5-
ms.date: 09/29/2024
5+
ms.date: 03/02/2026
66
ms.author: elkrieger
77
author: Elazark
88
# Customer Intent: As a security professional, I want to learn how to build queries with Cloud Security Explorer in Microsoft Defender for Cloud to show vulnerabilities in Kubernetes clusters.
99
---
1010

1111
# Build Cloud Security Explorer queries to identify vulnerabilities in Kubernetes clusters
1212

13-
You can use the Cloud Security Explorer to identify vulnerabilities in your Kubernetes clusters. The following examples demonstrate the building of queries that you can modify for your specific needs.
13+
Use Cloud Security Explorer to identify vulnerabilities in your Kubernetes clusters. The following examples show how to build queries to investigate container images and cluster nodes, and can be adapted to filter results based on your requirements.
1414

15-
Read [Build queries with Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) for an introduction to Cloud Security Explorer queries.
15+
For an introduction to Cloud Security Explorer queries, see [Build queries with Cloud Security Explorer](how-to-manage-cloud-security-explorer.md).
1616

1717
## Create a query to identify software vulnerabilities in container images
1818

1919
1. Sign in to the [Azure portal](https://portal.azure.com).
2020

21-
1. Navigate to [Microsoft Defender for Cloud > Cloud Security Explorer](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityMenuBlade/~/SecurityGraph)
21+
1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
2222

23-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png" alt-text="Screenshot of main page of Cloud Security Explorer." lightbox="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png":::
23+
1. In **Query builder**, select **Select resource types**.
2424

25-
1. Filter on the software in the container images to query.
25+
1. Select **Container Images**.
2626

27-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query.png" alt-text="Screenshot of Cloud Security Explorer query options to retrieve list of container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query.png":::
27+
1. Select **+**.
2828

29-
1. Select the View details link of the container image of interest to see the result details pane. In the Insights section of the Result details pane is a drop-drown list of the software installed on the container image. Select the installed software for review.
29+
1. **Select condition**.
3030

31-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png":::
31+
1. In **Application**, select **Has installed software**.
32+
33+
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/software-vulnerabilities-in-container-images.png" alt-text="Screenshot of query for identifying software vulnerabilities in container images." lightbox="./media/cloud-security-explorer-kubernetes-clusters/software-vulnerabilities-in-container-images.png":::
34+
35+
1. Select **Search**.
3236

33-
1. View the details of the installed software in the Insights section.
37+
1. Select **View details >** for the relevant container image.
3438

35-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details-insights.png" alt-text="Screenshot shows Cloud Security Explorer query result details and insight results from the selected containers image." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details-insights.png":::
39+
1. In the **Result details** pane, review **Insights - Has installed software**.
40+
41+
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png":::
3642

3743
## Create a query to identify vulnerabilities in cluster nodes
3844

3945
1. Sign in to the [Azure portal](https://portal.azure.com).
4046

41-
1. Navigate to [Microsoft Defender for Cloud > Cloud Security Explorer](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityMenuBlade/~/SecurityGraph)
47+
1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
48+
49+
1. In **Query builder**, select **Select resource types**.
50+
51+
1. Under **Kubernetes clusters**, select **Azure Kubernetes Service**.
52+
53+
1. Select **Done**.
54+
55+
1. Select **+**.
56+
57+
1. **Select condition**.
58+
59+
1. In **Application**, select **Maintains**.
60+
61+
1. Select **Select resource types** > **Kubernetes Node Pools**.
62+
63+
1. Select **Done**.
64+
65+
1. Select **+**.
66+
67+
1. **Select condition**.
68+
69+
1. Select **Maintains**.
70+
71+
1. Select **Select resource types** > **Virtual machines clusters**.
72+
73+
1. Select **Done**.
74+
75+
1. Select **+**.
76+
77+
1. **Select condition**.
78+
79+
1. In **Vulnerabilities**, select **All vulnerabilities**.
80+
81+
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/vulnerabilities-in-cluster-nodes.png" alt-text="Screenshot of query for identifying vulnerabilities in cluster nodes." lightbox="./media/cloud-security-explorer-kubernetes-clusters/vulnerabilities-in-cluster-nodes.png":::
4282

43-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png" alt-text="Screenshot of main page of Cloud Security Explorer." lightbox="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png":::
83+
1. Select **Search**.
4484

45-
1. Filter on the cluster nodes in the Azure Kubernetes Services environment to query.
85+
1. Select **View details >** for the relevant Kubernetes node pool.
4686

4787
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png" alt-text="Screenshot of Cloud Security Explorer query options to retrieve list of cluster nodes with vulnerabilities." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png":::
4888

49-
2. Select the View details link of the cluster node pool of interest to see the result details pane. In the Result details pane, select the virtual machine scale set icon, to see the vulnerabilities.
89+
1. In the **Result details** pane, select the **Virtual machine scale set** icon to view vulnerabilities.
5090

5191
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve vulnerabilities in cluster nodes." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results-details.png":::

0 commit comments

Comments
 (0)