Skip to content

Commit 94a4a6d

Browse files
committed
editing data plane hardening page
1 parent 2be232e commit 94a4a6d

2 files changed

Lines changed: 10 additions & 6 deletions

File tree

articles/defender-for-cloud/how-to-enable-agentless-containers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Agentless container posture is available for Azure, AWS, and GCP environments.
2424

2525
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
2626

27-
1. Select your subscription.
27+
1. Select the relevant subscription.
2828

2929
1. Under **Defender plans**, locate **Defender CSPM**.
3030

@@ -46,7 +46,7 @@ Agentless container posture is available for Azure, AWS, and GCP environments.
4646

4747
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
4848

49-
1. Select your AWS connector.
49+
1. Select the relevant AWS connector.
5050

5151
1. Under **Defender plans**, locate **Defender CSPM**.
5252

@@ -76,7 +76,7 @@ Agentless container posture is available for Azure, AWS, and GCP environments.
7676

7777
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
7878

79-
1. Select your GCP connector.
79+
1. Select the relevant GCP connector.
8080

8181
1. Under **Defender plans**, locate **Defender CSPM**.
8282

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,13 @@ ms.author: elkrieger
77
ms.date: 03/23/2026
88
---
99

10-
# Protect your Kubernetes data plane hardening
10+
# Configure Kubernetes data plane hardening in Defender for Cloud
1111

12-
This page describes how to use Microsoft Defender for Cloud's set of security recommendations dedicated to Kubernetes data plane hardening.
12+
Kubernetes data plane hardening helps enforce secure configurations for workloads running in your cluster, such as restricting privileged containers, enforcing resource limits, and limiting network access.
13+
14+
In Microsoft Defender for Cloud, data plane hardening is implemented by using Azure Policy for Kubernetes to evaluate and enforce these configurations. Azure Policy is deployed as part of Defender for Containers automatically when automatic provisioning is enabled. If Azure Policy for Kubernetes is turned off in the Defender for Containers plan settings, you can deploy it by remediating the relevant recommendation.
15+
16+
After Azure Policy for Kubernetes is deployed, Defender for Cloud generates data plane hardening recommendations based on your cluster configuration. This page shows how to review these recommendations, configure policy parameters, and enforce them on your clusters.
1317

1418
> [!TIP]
1519
> For a list of the security recommendations that might appear for Kubernetes clusters and nodes, review [container recommendations](recommendations-reference-container.md).
@@ -48,7 +52,7 @@ If you disabled the "Azure Policy for Kubernetes" settings under the containers
4852

4953
1. Sign in to the [Azure portal](https://portal.azure.com).
5054

51-
1. Go to **Microsoft Defender for Cloud** > **Management** > **Environment settings**.
55+
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
5256

5357
1. Select the relevant subscription.
5458

0 commit comments

Comments
 (0)