Skip to content

Commit 9e1f7fc

Browse files
committed
redid aks dashboard page
1 parent a30d9c6 commit 9e1f7fc

3 files changed

Lines changed: 73 additions & 160 deletions

File tree

articles/defender-for-cloud/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -850,8 +850,6 @@
850850
items:
851851
- name: Overview
852852
href: cluster-security-dashboard.md
853-
- name: How to use the AKS Security Dashboard
854-
href: how-to-use-azure-kubernetes-service-dashboard.md
855853
- name: Investigate Kubernetes vulnerabilities with Cloud Security Explorer
856854
displayName: k8s, containers
857855
href: cloud-security-explorer-kubernetes-clusters.md
Lines changed: 73 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,30 @@
11
---
2-
title: Azure Kubernetes Service (AKS) Security Dashboard
3-
description: Explain the views and actions in the AKS security Dashboard to enable and protect an individual cluster with Defender for Containers.
2+
title: Review security findings in the AKS security dashboard
3+
description: Learn how to review and investigate alerts, vulnerabilities, misconfigurations, and compliance findings in the AKS security dashboard in Microsoft Defender for Cloud.
44
ms.author: elkrieger
5-
ms.topic: concept-article
6-
ms.date: 03/23/2026
7-
CustomerIntent: As the person responsible for the security of a cluster, I want know what views and actions the cluster security dashboard provides, so I can remediate security issues in the cluster.
5+
ms.topic: how-to
6+
ms.date: 04/05/2026
7+
ms.service: defender-for-cloud
88
---
99

10-
# Azure Kubernetes Service (AKS) Security Dashboard
10+
# Review security findings in the AKS security dashboard
1111

1212
The AKS security dashboard shows security findings for an Azure Kubernetes Service (AKS) cluster in Microsoft Defender for Cloud.
1313

1414
It includes alerts, vulnerabilities, misconfigurations, and compliance results to help you identify and prioritize issues.
1515

1616
## Prerequisites
1717

18-
To use the AKS Security dashvoard, ensure you have:
18+
To use the AKS Security dashboard, ensure you have:
1919

2020
- A Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
2121

2222
- [Microsoft Defender for Cloud](get-started.md#enable-defender-for-cloud-on-your-azure-subscription) enabled with one of the following plans:
2323
- [Defender for Containers](tutorial-enable-containers-azure.md)
2424
- [Defender CSPM](tutorial-enable-cspm-plan.md)
2525

26+
## Review security findings
27+
2628
## Security alerts
2729

2830
Security alerts indicate suspicious activity or potential threats detected in the cluster.
@@ -38,25 +40,27 @@ Alerts are prioritized by severity to help you identify which issues to investig
3840

3941
1. Sign in to the [Azure portal](https://portal.azure.com/).
4042

41-
1. Search for **Kubernetes Services**.
42-
43-
1. Go to **Clusters**.
43+
1. Go to **Kubernetes services** > **Clusters**.
4444

4545
1. Select the relevant AKS cluster.
4646

47-
5. In the **Security alerts** tab, select an alert.
48-
4947
1. Select **Microsoft Defender for Cloud**.
5048

51-
1. Review the alert details and recommended remediation steps.
49+
1. In the **Security alerts** tab, select an alert to open the details pane.
50+
51+
In the details pane:
5252

53-
1. Use related entities to identify affected resources.
53+
- Review the alert details and recommended remediation steps.
54+
- Use related entities to identify affected resources.
55+
- Select **Open logs** to investigate activity within the relevant timeframe.
56+
- Create a suppression rule if the alert isn't relevant for your organization.
57+
- Configure security rules for supported alert types.
5458

55-
1. Select **Open logs** to investigate activity within the relevant timeframe.
59+
After you mitigate the issue, update the alert status.
5660

57-
1. Update the alert status after remediation.
61+
:::image type="content" source="media/cluster-security-dashboard/alerts-tab-security-findings.png" alt-text="Screenshot of the Security alerts tab showing alert details." lightbox="media/cluster-security-dashboard/alerts-tab-security-findings.png":::
5862

59-
### Vulnerability assessment
63+
## Vulnerability assessment
6064

6165
The vulnerability assessment section shows vulnerabilities for running container images and Kubernetes node pools.
6266

@@ -69,53 +73,81 @@ Vulnerabilities can include:
6973
- **OS packages** (Linux and Windows)
7074
- **Language-specific packages** (Linux)
7175

72-
Learn how to [review vulnerability findings](how-to-use-azure-kubernetes-service-dashboard.md#review-vulnerability-assessment-findings).
76+
For supported configurations, see the [support matrix for Defender for Containers](/azure/defender-for-cloud/support-matrix-defender-for-containers).
77+
78+
### Review vulnerability findings
79+
80+
1. Sign in to the [Azure portal](https://portal.azure.com/).
81+
82+
1. Go to **Kubernetes services** > **Clusters**.
83+
84+
1. Select the relevant AKS cluster.
85+
86+
1. Select **Microsoft Defender for Cloud**.
87+
88+
1. In the **Vulnerabilities** tab, select a component to open the details pane.
89+
90+
In the details pane:
91+
92+
- Review affected packages and associated CVEs.
93+
- Identify the fixed version for the vulnerable package.
94+
- Update the container image or dependency to remediate the issue.
7395

74-
### Misconfigurations
96+
If expected vulnerabilities don't appear, verify that the image, package type, and environment are supported. See the [support matrix for Defender for Containers](/azure/defender-for-cloud/support-matrix-defender-for-containers).
97+
98+
:::image type="content" source="media/cluster-security-dashboard/vulnerabilities-assessment-tab.png" alt-text="Screenshot of the Vulnerabilities tab showing vulnerable components and severity." lightbox="media/cluster-security-dashboard/vulnerabilities-assessment-tab.png":::
99+
100+
## Misconfigurations
75101

76102
Misconfigurations identify security configuration issues in Kubernetes resources, cluster settings, and running workloads.
77103

78104
Findings are based on Azure Policy and Kubernetes configuration assessments.
79105

80106
Each finding includes remediation guidance. Some findings support automated remediation through **Quick Fix** or policy enforcement.
81107

82-
Learn how to [review and remediate misconfigurations](how-to-use-azure-kubernetes-service-dashboard.md#review-and-remediate-misconfigurations).
108+
### Review and remediate misconfigurations
83109

84-
### Compliance
110+
1. Sign in to the [Azure portal](https://portal.azure.com/).
85111

86-
The compliance section shows the cluster’s status against regulatory standards and benchmarks.
112+
1. Go to **Kubernetes services** > **Clusters**.
87113

88-
It lists controls that the cluster doesn't meet and provides recommendations to help you remediate them.
114+
1. Select the relevant AKS cluster.
89115

90-
Learn how to [assess compliance](how-to-use-azure-kubernetes-service-dashboard.md#assess-compliance-with-regulatory-standards).
116+
1. Select **Microsoft Defender for Cloud**.
91117

92-
### Settings
118+
1. In the **Misconfigurations** tab, select a finding to open the details pane.
93119

94-
#### Plan enablement
120+
In the details pane:
95121

96-
Enable Microsoft Defender for Cloud containers protection (Defender for Containers) for a single AKS cluster or at the subscription level to protect all clusters in that subscription.
122+
- Review the description and remediation steps.
123+
- For cluster-level misconfigurations, select **Quick Fix** when available.
124+
- For workload issues, apply the recommended Azure Policy to prevent recurrence.
125+
- Assign an owner to track remediation (requires Defender CSPM).
97126

98-
> [!NOTE]
99-
>
100-
> - When you enable Defender for Containers at the subscription level, you can only change plan settings at the subscription level.
101-
>
102-
> - By enabling other Microsoft Defender for Cloud plans, you can scan all your cloud assets to identify cross-resource attack paths, more accurately identify risk, and provide alerts and full visibility into cross-resource security incidents. [Learn more.](/azure/defender-for-cloud/defender-for-cloud-introduction)
103-
>
104-
> - If you configure settings at the subscription level, they override any settings configured at the cluster level.
127+
:::image type="content" source="media/cluster-security-dashboard/misconfigurations-assessment-tab.png" alt-text="Screenshot of the Misconfigurations tab displaying security configuration issues." lightbox="media/cluster-security-dashboard/misconfigurations-assessment-tab.png":::
105128

129+
## Compliance
106130

107-
#### Plan configurations
131+
The compliance section shows the cluster’s status against regulatory standards and benchmarks.
108132

109-
- **Defender Sensor** – Deploys the Defender for Containers agent on the cluster. This sensor is required for runtime threat protection and gated deployment capabilities.
133+
It lists controls that the cluster doesn't meet and provides recommendations to help you remediate them.
134+
135+
### Assess compliance
136+
137+
1. Sign in to the [Azure portal](https://portal.azure.com/).
110138

111-
- **Kubernetes API access** – Required for vulnerability assessment, misconfigurations, compliance assessment, and runtime threat protection.
139+
1. Go to **Kubernetes services** > **Clusters**.
112140

113-
- **Registry access** – Required for vulnerability assessment and gated deployment capabilities.
141+
1. Select the relevant AKS cluster.
142+
143+
1. Select **Microsoft Defender for Cloud**.
114144

115-
- **Azure policy** - Deploys an agent on the cluster to generate recommendations for hardening the cluster data plane.
145+
1. In the **Compliance** tab, review failing controls.
116146

147+
1. Select a control to open the details pane.
117148

118-
## Next steps
149+
1. Review the recommendation and remediation steps.
119150

120-
- Learn how to use the [AKS Security Dashboard](how-to-use-azure-kubernetes-service-dashboard.md)
151+
1. Apply the required changes to meet the control.
121152

153+
:::image type="content" source="media/cluster-security-dashboard/compliance-standards-tab.png" alt-text="Screenshot of the Compliance tab showing regulatory compliance assessment results." lightbox="media/cluster-security-dashboard/compliance-standards-tab.png":::

articles/defender-for-cloud/how-to-use-azure-kubernetes-service-dashboard.md

Lines changed: 0 additions & 117 deletions
This file was deleted.

0 commit comments

Comments
 (0)