Skip to content

Commit 9e39388

Browse files
committed
edits to cspm page
1 parent f351812 commit 9e39388

3 files changed

Lines changed: 79 additions & 13 deletions

File tree

articles/defender-for-cloud/how-to-enable-agentless-containers.md

Lines changed: 79 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,38 +8,104 @@ ms.date: 03/02/2026
88

99
# Onboard agentless container posture in Defender CSPM
1010

11-
When you onboard agentless container posture in Defender CSPM, you get all its [capabilities](concept-agentless-containers.md#capabilities).
11+
Enable agentless container posture in Defender CSPM to gain visibility into Kubernetes clusters and container images without deploying agents.
1212

13-
Defender CSPM includes extensions that provide agentless visibility into Kubernetes and container registries throughout your organization's software development lifecycle: **Agentless scanning for machines** for scanning runtime container images, **K8S API access** for Kubernetes cluster discovery, and **Registry access** to access images in a supported container registry.
14-
15-
> [!NOTE]
16-
> Agentless container posture is available for Azure, AWS, and GCP clouds.
13+
Agentless container posture is available for Azure, AWS, and GCP environments.
1714

1815
## Prerequisites
1916

20-
- The subscription or management group is onboarded to [Microsoft Defender CSPM](enable-enhanced-security.md).
17+
- [Defender CSPM plan is enabled for your environment](enable-enhanced-security.md).
2118

2219
## How to onboard agentless container posture in Defender CSPM
2320

21+
# [Azure](#tab/azure)
22+
23+
1. Sign in to the [Azure portal](https://portal.azure.com).
24+
25+
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
26+
27+
1. Select your subscription.
28+
29+
1. Under **Defender plans**, locate **Defender CSPM**.
30+
31+
1. Select **Settings**.
32+
33+
1. Enable the following settings:
34+
- **Kubernetes API access**
35+
- **Registry access**
36+
37+
:::image type="content" source="media/concept-agentless-containers/toggle-on-components-aks.png" alt-text="Screenshot of the Defender CSPM plan configuration for Azure Kubernetes Service (AKS) showing Kubernetes API access and Registry access enabled." lightbox="media/concept-agentless-containers/toggle-on-components-aks.png":::
38+
39+
1. Select **Continue**. (check this)
40+
41+
1. Select **Save**.
42+
43+
# [AWS](#tab/aws)
44+
45+
1. Sign in to the [Azure portal](https://portal.azure.com).
46+
47+
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
48+
49+
1. Select your AWS connector.
50+
51+
1. Under **Defender plans**, locate **Defender CSPM**.
52+
53+
1. Select **Settings**.
54+
55+
1. Enable the following settings:
56+
- **Kubernetes API access**
57+
- **Registry access**
58+
59+
:::image type="content" source="media/concept-agentless-containers/toggle-on-components-aws.png" alt-text="Screenshot of the Defender CSPM plan configuration for AWS showing Kubernetes API access and Registry access enabled." lightbox="media/concept-agentless-containers/toggle-on-components-aws.png":::
60+
61+
1. Select **Continue**.
62+
63+
1. Select **Save**.
64+
65+
1. Select **Next: Configure access**.
66+
67+
1. Redeploy the CloudFormation or Terraform template.
68+
69+
1. Select **Next: Review and generate**.
70+
71+
1. Select **Update**.
72+
73+
# [GCP](#tab/gcp)
2474

2575
1. Sign in to the [Azure portal](https://portal.azure.com).
26-
1. Go to **Microsoft Defender for Cloud** > **Environment Settings**.
27-
1. Select the relevant subscription.
28-
1. Locate Defender CSPM and select **Settings**.
29-
1. Toggle **K8S API access** and **Registry access** extensions to **On**.
3076

31-
:::image type="content" source="media/concept-agentless-containers/select-components.png" alt-text="Screenshot of selecting components 8S API access and Registry access." lightbox="media/concept-agentless-containers/select-components.png":::
77+
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
78+
79+
1. Select your GCP connector.
80+
81+
1. Under **Defender plans**, locate **Defender CSPM**.
82+
83+
1. Select **Settings**.
84+
85+
1. Enable the following settings:
86+
- **Kubernetes API access**
87+
- **Registry access**
88+
89+
:::image type="content" source="media/concept-agentless-containers/toggle-on-components-gcp.png" alt-text="Screenshot of the Defender CSPM plan configuration for GCP showing Kubernetes API access and Registry access enabled." lightbox="media/concept-agentless-containers/toggle-on-components-gcp.png":::
3290

3391
1. Select **Continue**.
92+
3493
1. Select **Save**.
3594

36-
A notification message in the top right corner verifies that the settings are saved successfully.
95+
1. Select **Next: Configure access**.
96+
97+
1. Redeploy the Cloud Shell or Terraform template.
98+
99+
1. Select **Next: Review and generate**.
100+
101+
1. Select **Update**.
37102

38103
> [!NOTE]
39-
> K8S API access uses AKS trusted access. For more information about AKS trusted access, see [Enable Azure resources to access Azure Kubernetes Service (AKS) clusters using Trusted Access](/azure/aks/trusted-access-feature).
104+
> Kubernetes API access uses AKS trusted access. For more information about AKS trusted access, see [Enable Azure resources to access Azure Kubernetes Service (AKS) clusters using Trusted Access](/azure/aks/trusted-access-feature).
40105
41106
## Related content
42107

108+
- Learn more about [agentless container posture capabilities](concept-agentless-containers.md#capabilities).
43109
- Check out [common questions about Defender for Containers](faq-defender-for-containers.yml).
44110
- Learn more about [Trusted Access](/azure/aks/trusted-access-feature).
45111
- Learn how to [view and remediate vulnerability assessment findings for registry images](view-and-remediate-vulnerability-assessment-findings.md).
Binary file not shown.
106 KB
Loading

0 commit comments

Comments
 (0)