|
1 | 1 | --- |
2 | | -title: Building Cloud Security Explorer query to identify vulnerabilities in Kubernetes clusters |
3 | | -description: Learn to build queries with cloud security explorer in Microsoft Defender for Cloud to investigate vulnerabilities Kubernetes clusters |
| 2 | +title: Build Cloud Security Explorer queries to identify vulnerabilities in Kubernetes clusters |
| 3 | +description: Learn how to build queries with Cloud Security Explorer in Microsoft Defender for Cloud to investigate vulnerabilities in Kubernetes clusters. |
4 | 4 | ms.topic: how-to |
5 | | -ms.date: 09/29/2024 |
| 5 | +ms.date: 03/02/2026 |
6 | 6 | ms.author: elkrieger |
7 | 7 | author: Elazark |
8 | 8 | # Customer Intent: As a security professional, I want to learn how to build queries with Cloud Security Explorer in Microsoft Defender for Cloud to show vulnerabilities in Kubernetes clusters. |
9 | 9 | --- |
10 | 10 |
|
11 | 11 | # Build Cloud Security Explorer queries to identify vulnerabilities in Kubernetes clusters |
12 | 12 |
|
13 | | -You can use the Cloud Security Explorer to identify vulnerabilities in your Kubernetes clusters. The following examples demonstrate the building of queries that you can modify for your specific needs. |
| 13 | +Use Cloud Security Explorer to identify vulnerabilities in your Kubernetes clusters. The following examples show how to build queries to investigate container images and cluster nodes, and can be adapted to filter results based on your requirements. |
14 | 14 |
|
15 | | -Read [Build queries with Cloud Security Explorer](how-to-manage-cloud-security-explorer.md) for an introduction to Cloud Security Explorer queries. |
| 15 | +For an introduction to Cloud Security Explorer queries, see [Build queries with Cloud Security Explorer](how-to-manage-cloud-security-explorer.md). |
16 | 16 |
|
17 | 17 | ## Create a query to identify software vulnerabilities in container images |
18 | 18 |
|
19 | 19 | 1. Sign in to the [Azure portal](https://portal.azure.com). |
20 | 20 |
|
21 | | -1. Navigate to [Microsoft Defender for Cloud > Cloud Security Explorer](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityMenuBlade/~/SecurityGraph) |
| 21 | +1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**. |
22 | 22 |
|
23 | | - :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png" alt-text="Screenshot of main page of Cloud Security Explorer." lightbox="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png"::: |
| 23 | +1. In **Query builder**, select **Select resource types**. |
24 | 24 |
|
25 | | -1. Filter on the software in the container images to query. |
| 25 | +1. Select **Container Images**. |
26 | 26 |
|
27 | | - :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query.png" alt-text="Screenshot of Cloud Security Explorer query options to retrieve list of container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query.png"::: |
| 27 | +1. Select **+**. |
28 | 28 |
|
29 | | -1. Select the View details link of the container image of interest to see the result details pane. In the Insights section of the Result details pane is a drop-drown list of the software installed on the container image. Select the installed software for review. |
| 29 | +1. **Select condition**. |
30 | 30 |
|
31 | | - :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png"::: |
| 31 | +1. In **Application**, select **Has installed software**. |
| 32 | + |
| 33 | + :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/software-vulnerabilities-in-container-images.png" alt-text="Screenshot of query for identifying software vulnerabilities in container images." lightbox="./media/cloud-security-explorer-kubernetes-clusters/software-vulnerabilities-in-container-images.png"::: |
| 34 | + |
| 35 | +1. Select **Search**. |
32 | 36 |
|
33 | | -1. View the details of the installed software in the Insights section. |
| 37 | +1. Select **View details >** for the relevant container image. |
34 | 38 |
|
35 | | - :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details-insights.png" alt-text="Screenshot shows Cloud Security Explorer query result details and insight results from the selected containers image." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details-insights.png"::: |
| 39 | +1. In the **Result details** pane, review **Insights - Has installed software**. |
| 40 | + |
| 41 | + :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png"::: |
36 | 42 |
|
37 | 43 | ## Create a query to identify vulnerabilities in cluster nodes |
38 | 44 |
|
39 | 45 | 1. Sign in to the [Azure portal](https://portal.azure.com). |
40 | 46 |
|
41 | | -1. Navigate to [Microsoft Defender for Cloud > Cloud Security Explorer](https://ms.portal.azure.com/#view/Microsoft_Azure_Security/SecurityMenuBlade/~/SecurityGraph) |
| 47 | +1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**. |
| 48 | + |
| 49 | +1. In **Query builder**, select **Select resource types**. |
| 50 | + |
| 51 | +1. Under **Kubernetes clusters**, select **Azure Kubernetes Service**. |
| 52 | + |
| 53 | +1. Select **Done**. |
| 54 | + |
| 55 | +1. Select **+**. |
| 56 | + |
| 57 | +1. **Select condition**. |
| 58 | + |
| 59 | +1. In **Application**, select **Maintains**. |
| 60 | + |
| 61 | +1. Select **Select resource types** > **Kubernetes Node Pools**. |
| 62 | + |
| 63 | +1. Select **Done**. |
| 64 | + |
| 65 | +1. Select **+**. |
| 66 | + |
| 67 | +1. **Select condition**. |
| 68 | + |
| 69 | +1. Select **Maintains**. |
| 70 | + |
| 71 | +1. Select **Select resource types** > **Virtual machines clusters**. |
| 72 | + |
| 73 | +1. Select **Done**. |
| 74 | + |
| 75 | +1. Select **+**. |
| 76 | + |
| 77 | +1. **Select condition**. |
| 78 | + |
| 79 | +1. In **Vulnerabilities**, select **All vulnerabilities**. |
| 80 | + |
| 81 | + :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/vulnerabilities-in-cluster-nodes.png" alt-text="Screenshot of query for identifying vulnerabilities in cluster nodes." lightbox="./media/cloud-security-explorer-kubernetes-clusters/vulnerabilities-in-cluster-nodes.png"::: |
42 | 82 |
|
43 | | - :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png" alt-text="Screenshot of main page of Cloud Security Explorer." lightbox="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png"::: |
| 83 | +1. Select **Search**. |
44 | 84 |
|
45 | | -1. Filter on the cluster nodes in the Azure Kubernetes Services environment to query. |
| 85 | +1. Select **View details >** for the relevant Kubernetes node pool. |
46 | 86 |
|
47 | 87 | :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png" alt-text="Screenshot of Cloud Security Explorer query options to retrieve list of cluster nodes with vulnerabilities." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png"::: |
48 | 88 |
|
49 | | -2. Select the View details link of the cluster node pool of interest to see the result details pane. In the Result details pane, select the virtual machine scale set icon, to see the vulnerabilities. |
| 89 | +1. In the **Result details** pane, select the **Virtual machine scale set** icon to view vulnerabilities. |
50 | 90 |
|
51 | 91 | :::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve vulnerabilities in cluster nodes." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results-details.png"::: |
0 commit comments