Skip to content

Commit 8b81e55

Browse files
committed
edited kubernetes node va page
1 parent a77c731 commit 8b81e55

3 files changed

Lines changed: 23 additions & 20 deletions

File tree

articles/defender-for-cloud/kubernetes-nodes-malware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,4 +46,4 @@ Before you begin, make sure that:
4646

4747
## Related content
4848

49-
- [Kubernetes node vulnerability assessment](Kubernetes-nodes-va.md)
49+
- [Review and remediate Kubernetes node vulnerabilities](Kubernetes-nodes-va.md).

articles/defender-for-cloud/kubernetes-nodes-va.md

Lines changed: 22 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,57 +1,60 @@
11
---
22
title: Kubernetes Nodes Vulnerability Assessment
33
description: Learn about Defender for Containers vulnerability assessment for Kubernetes nodes.
4-
ms.date: 03/09/2026
5-
ms.topic: concept-article
4+
ms.date: 04/09/2026
5+
ms.topic: how-to
66
ms.custom: sfi-image-nochange
77
---
88

9-
# Kubernetes node vulnerability assessment
9+
# Review and remediate Kubernetes node vulnerabilities
1010

11-
Defender for Cloud can scan the [VMs that host Kubernetes nodes](./kubernetes-nodes-overview.md#protection-for-kubernetes-nodes) to assess vulnerabilities to the OS and installed software. Recommendations for remediation are generated for the customer security team to review and remediate as part of the [shared responsibility](./kubernetes-nodes-overview.md#shared-responsibility-of-kubernetes-nodes) to maintain the Kubernetes nodes of a cluster.
11+
Defender for Cloud scans the [VMs that host Kubernetes nodes](./kubernetes-nodes-overview.md#protection-for-kubernetes-nodes) for vulnerabilities in the operating system and installed software. When vulnerabilities are detected, Defender for Cloud generates recommendations to help you review and remediate them as part of the [shared responsibility](./kubernetes-nodes-overview.md#shared-responsibility-of-kubernetes-nodes) for maintaining Kubernetes node security.
1212

13-
## Prerequisite
13+
## Prerequisites
1414

15-
Vulnerability assessment of the nodes must be [enabled by turning on the **Agentless scanning for machines**](./kubernetes-nodes-overview.md#enable-agentless-scanning-for-machines) option in the Defender for Containers, Defender Cloud Security Posture Management, or Defender for Servers P2 plan.
15+
Before you begin, make sure that:
1616

17-
## Review the Kubernetes node vulnerability recommendations
17+
- You have an Azure subscription. If you don’t have an Azure subscription, create a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn) before you begin.
18+
19+
- [Microsoft Defender for Cloud is enabled on your subscription](connect-azure-subscription.md) with one of the following plans:
20+
- Defender for Containers
21+
- Defender for Servers P2
22+
- Defender CSPM
1823

19-
If vulnerabilities are found for a Kubernetes node, a recommendation is generated for the customer to review. To review Kubernetes node recommendations for remediation:
24+
- [Agentless scanning for machines](kubernetes-nodes-overview.md#enable-agentless-scanning-for-machines) is enabled.
25+
26+
## Review the Kubernetes node vulnerability recommendations
2027

2128
1. Sign in to the [Azure portal](https://portal.azure.com).
2229

23-
1. Search for and select **Microsoft Defender for Cloud**.
24-
25-
1. Select **Recommendations**.
26-
27-
:::image type="content" source="media/kubernetes-nodes-va/recommendations-list.png" alt-text="Screenshot of selecting the recommendations submenu of the Defender for Cloud pane." lightbox="media/kubernetes-nodes-va/recommendations-list.png":::
30+
1. Go to **Microsoft Defender for Cloud** > **Recommendations**.
2831

2932
1. Search for and select the `AKS nodes should have vulnerability findings resolved` recommendation.
3033

3134
:::image type="content" source="media/kubernetes-nodes-va/recommendations-list-select-nodes-va.png" alt-text="Screenshot showing the selection of the nodes recommendation line." lightbox="media/kubernetes-nodes-va/recommendations-list-select-nodes-va.png":::
3235

33-
1. The full details of the Kubernetes node recommendation are shown. Along with a full description of the vulnerability, other details such as the name of the affected Kubernetes node pool and its cluster are presented.
36+
1. The full details of the Kubernetes node recommendation are shown. Along with a full description of the vulnerability, other details such as the name of the affected Kubernetes node pool and its cluster are presented. -> change to something like review the blabla
3437

3538
:::image type="content" source="media/kubernetes-nodes-va/recommendation-node-details.png" alt-text="Screenshot showing the details of the recommendation for the Kubernetes node." lightbox="media/kubernetes-nodes-va/recommendation-node-details.png":::
3639

3740
1. Select **Findings**.
3841

3942
:::image type="content" source="media/kubernetes-nodes-va/recommendation-node-details-findings.png" alt-text="Screenshot of selecting the findings tab to view a list of CVEs related to the Kubernetes node." lightbox="media/kubernetes-nodes-va/recommendation-node-details-findings.png":::
4043

41-
1. Select a CVE.
44+
1. Select a CVE. (add to view_)
4245

4346
:::image type="content" source="media/kubernetes-nodes-va/recommendation-node-cve-detail.png" alt-text="Screenshot of the pane showing all the details of the CVE and Kubernetes node resources affected." lightbox="media/kubernetes-nodes-va/recommendation-node-cve-details.png":::
4447

45-
In the details pane, the **Node pool instances** section shows the nodes to be affected by the remediation. The **More affected resources** shows other nodes that have the same CVE and should be remediated as well.
48+
In the details pane, the **Node pool instances** section shows the nodes to be affected by the remediation. The **More affected resources** shows other nodes that have the same CVE and should be remediated as well. (this can be deleted)
4649

4750
## Remediate Kubernetes node vulnerabilities
4851

49-
Kubernetes node vulnerabilities are remediated by updating the node pool VM image version. The customer upgrades the node pool, as part of the shared responsibility between the Kubernetes service and the customer. The customer upgrades the node pool in one of two ways - either upgrade the node pool VM image and/or the cluster's Kubernetes service, to a newer version. **It is recommended to upgrade the node pool VM image first.** In some cases, the customer needs to upgrade the cluster's Kubernetes service version and the node pool VM image version to remediate the vulnerability.
52+
Kubernetes node vulnerabilities are remediated by updating the node pool VM image version. The customer upgrades the node pool, as part of the shared responsibility between the Kubernetes service and the customer. The customer upgrades the node pool in one of two ways - either upgrade the node pool VM image and/or the cluster's Kubernetes service, to a newer version. **It is recommended to upgrade the node pool VM image first.** In some cases, the customer needs to upgrade the cluster's Kubernetes service version and the node pool VM image version to remediate the vulnerability. (do i need this? can imove it if i need it?)
5053

5154
> [!IMPORTANT]
52-
> The cluster's Kubernetes version and the node pool VM image can be [set to auto-upgrade](/azure/aks/upgrade-cluster#configure-automatic-upgrades). These versions should be [regularly upgraded](/azure/aks/upgrade-cluster) to provide maximum security for you AKS resources.
55+
> The cluster's Kubernetes version and the node pool VM image can be [set to auto-upgrade](/azure/aks/upgrade-cluster#configure-automatic-upgrades). These versions should be [regularly upgraded](/azure/aks/upgrade-cluster) to provide maximum security for you AKS resources. (is this needed?)
5356
54-
### Upgrade the node pool VM image
57+
### Upgrade the node pool VM image
5558

5659
1. Sign in to the [Azure portal](https://portal.azure.com).
5760

Binary file not shown.

0 commit comments

Comments
 (0)