You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-enable-agentless-containers.md
+79-13Lines changed: 79 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,38 +8,104 @@ ms.date: 03/02/2026
8
8
9
9
# Onboard agentless container posture in Defender CSPM
10
10
11
-
When you onboard agentless container posture in Defender CSPM, you get all its [capabilities](concept-agentless-containers.md#capabilities).
11
+
Enable agentless container posture in Defender CSPM to gain visibility into Kubernetes clusters and container images without deploying agents.
12
12
13
-
Defender CSPM includes extensions that provide agentless visibility into Kubernetes and container registries throughout your organization's software development lifecycle: **Agentless scanning for machines** for scanning runtime container images, **K8S API access** for Kubernetes cluster discovery, and **Registry access** to access images in a supported container registry.
14
-
15
-
> [!NOTE]
16
-
> Agentless container posture is available for Azure, AWS, and GCP clouds.
13
+
Agentless container posture is available for Azure, AWS, and GCP environments.
17
14
18
15
## Prerequisites
19
16
20
-
-The subscription or management group is onboarded to [Microsoft Defender CSPM](enable-enhanced-security.md).
17
+
-[Defender CSPM plan is enabled for your environment](enable-enhanced-security.md).
21
18
22
19
## How to onboard agentless container posture in Defender CSPM
23
20
21
+
# [Azure](#tab/azure)
22
+
23
+
1. Sign in to the [Azure portal](https://portal.azure.com).
24
+
25
+
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
26
+
27
+
1. Select your subscription.
28
+
29
+
1. Under **Defender plans**, locate **Defender CSPM**.
30
+
31
+
1. Select **Settings**.
32
+
33
+
1. Enable the following settings:
34
+
-**Kubernetes API access**
35
+
-**Registry access**
36
+
37
+
:::image type="content" source="media/concept-agentless-containers/toggle-on-components-aks.png" alt-text="Screenshot of the Defender CSPM plan configuration for Azure Kubernetes Service (AKS) showing Kubernetes API access and Registry access enabled." lightbox="media/concept-agentless-containers/toggle-on-components-aks.png":::
38
+
39
+
1. Select **Continue**. (check this)
40
+
41
+
1. Select **Save**.
42
+
43
+
# [AWS](#tab/aws)
44
+
45
+
1. Sign in to the [Azure portal](https://portal.azure.com).
46
+
47
+
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
48
+
49
+
1. Select your AWS connector.
50
+
51
+
1. Under **Defender plans**, locate **Defender CSPM**.
52
+
53
+
1. Select **Settings**.
54
+
55
+
1. Enable the following settings:
56
+
-**Kubernetes API access**
57
+
-**Registry access**
58
+
59
+
:::image type="content" source="media/concept-agentless-containers/toggle-on-components-aws.png" alt-text="Screenshot of the Defender CSPM plan configuration for AWS showing Kubernetes API access and Registry access enabled." lightbox="media/concept-agentless-containers/toggle-on-components-aws.png":::
60
+
61
+
1. Select **Continue**.
62
+
63
+
1. Select **Save**.
64
+
65
+
1. Select **Next: Configure access**.
66
+
67
+
1. Redeploy the CloudFormation or Terraform template.
68
+
69
+
1. Select **Next: Review and generate**.
70
+
71
+
1. Select **Update**.
72
+
73
+
# [GCP](#tab/gcp)
24
74
25
75
1. Sign in to the [Azure portal](https://portal.azure.com).
26
-
1. Go to **Microsoft Defender for Cloud** > **Environment Settings**.
27
-
1. Select the relevant subscription.
28
-
1. Locate Defender CSPM and select **Settings**.
29
-
1. Toggle **K8S API access** and **Registry access** extensions to **On**.
30
76
31
-
:::image type="content" source="media/concept-agentless-containers/select-components.png" alt-text="Screenshot of selecting components 8S API access and Registry access." lightbox="media/concept-agentless-containers/select-components.png":::
77
+
1. Go to **Microsoft Defender for Cloud** > **Environment settings**.
78
+
79
+
1. Select your GCP connector.
80
+
81
+
1. Under **Defender plans**, locate **Defender CSPM**.
82
+
83
+
1. Select **Settings**.
84
+
85
+
1. Enable the following settings:
86
+
-**Kubernetes API access**
87
+
-**Registry access**
88
+
89
+
:::image type="content" source="media/concept-agentless-containers/toggle-on-components-gcp.png" alt-text="Screenshot of the Defender CSPM plan configuration for GCP showing Kubernetes API access and Registry access enabled." lightbox="media/concept-agentless-containers/toggle-on-components-gcp.png":::
32
90
33
91
1. Select **Continue**.
92
+
34
93
1. Select **Save**.
35
94
36
-
A notification message in the top right corner verifies that the settings are saved successfully.
95
+
1. Select **Next: Configure access**.
96
+
97
+
1. Redeploy the Cloud Shell or Terraform template.
98
+
99
+
1. Select **Next: Review and generate**.
100
+
101
+
1. Select **Update**.
37
102
38
103
> [!NOTE]
39
-
> K8S API access uses AKS trusted access. For more information about AKS trusted access, see [Enable Azure resources to access Azure Kubernetes Service (AKS) clusters using Trusted Access](/azure/aks/trusted-access-feature).
104
+
> Kubernetes API access uses AKS trusted access. For more information about AKS trusted access, see [Enable Azure resources to access Azure Kubernetes Service (AKS) clusters using Trusted Access](/azure/aks/trusted-access-feature).
40
105
41
106
## Related content
42
107
108
+
- Learn more about [agentless container posture capabilities](concept-agentless-containers.md#capabilities).
43
109
- Check out [common questions about Defender for Containers](faq-defender-for-containers.yml).
44
110
- Learn more about [Trusted Access](/azure/aks/trusted-access-feature).
45
111
- Learn how to [view and remediate vulnerability assessment findings for registry images](view-and-remediate-vulnerability-assessment-findings.md).
0 commit comments