Skip to content

Commit d2da4a9

Browse files
committed
Merge branch 'pr-2572-sbreingold' into wi552241-container-doc-fixes
2 parents b175c2d + 22be4f6 commit d2da4a9

15 files changed

Lines changed: 65 additions & 37 deletions

articles/defender-for-cloud/kubernetes-nodes-malware.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Kubernetes Nodes Malware Detection
33
description: Learn about Defender for Containers malware detection for Kubernetes nodes.
4-
ms.date: 11/15/2024
4+
ms.date: 03/02/2026
55
ms.topic: concept-article
66
ms.custom: sfi-image-nochange
77
---
@@ -21,14 +21,18 @@ Malware detection in Kubernetes nodes must be [enabled by turning on the **Agent
2121

2222
If malware is found in Kubernetes nodes, a malware security alert is generated for the customer to review. To review a Kubernetes node malware security alert in the Azure portal:
2323

24-
1. Select **Security Alerts** from the **Defender for Cloud** menu and select the line of the malware security alert for the Kubernetes node to the description.
25-
:::image type="content" source="media/kubernetes-nodes-malware/security-alerts-list-select.png" alt-text="Screenshot of selecting the line showing the malware security alert for the Kubernetes node." lightbox="media/kubernetes-nodes-malware/security-alerts-list-select.png":::
24+
1. Sign in to the [Azure portal](https://portal.azure.com).
25+
26+
1. Go to **Microsoft Defender for Cloud** > **General** > **Security alerts**.
27+
28+
1. Select the relevant malware security alert for the Kubernetes node.
29+
:::image type="content" source="media/kubernetes-nodes-malware/security-alerts-list-select.png" alt-text="Screenshot of selecting the line showing the malware security alert for the Kubernetes node." lightbox="media/kubernetes-nodes-malware/security-alerts-list-select.png":::
2630

27-
1. Select the **View full details** button to open the pane showing the full details of the malware found.
28-
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail.png" alt-text="Screenshot of selecting the view full details button to view the full details." lightbox="media/kubernetes-nodes-malware/security-alert-detail.png":::
31+
1. Select the **View full details** button.
32+
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail.png" alt-text="Screenshot of selecting the view full details button to view the full details." lightbox="media/kubernetes-nodes-malware/security-alert-detail.png":::
2933

3034
1. The security alert details describe the malware found, including the affected node pools and malware files found. Select the **Next: Take Action** button to view the instructions to remediate the threat.
31-
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-full.png" alt-text="Screenshot of selecting the take action tab to see the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-full.png":::
35+
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-full.png" alt-text="Screenshot of selecting the take action tab to see the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-full.png":::
3236

3337
1. Follow the instructions to remediate the threat.
34-
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-take-action.png" alt-text="Screenshot showing the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-take-action.png":::
38+
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-take-action.png" alt-text="Screenshot showing the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-take-action.png":::

articles/defender-for-cloud/kubernetes-workload-protections.md

Lines changed: 54 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use Microsoft Defender for Cloud's set of Kubernetes d
44
ms.topic: how-to
55
author: Elazark
66
ms.author: elkrieger
7-
ms.date: 07/15/2025
7+
ms.date: 03/23/2026
88
---
99

1010
# Protect your Kubernetes data plane hardening
@@ -27,9 +27,9 @@ Microsoft Defender for Cloud includes a bundle of recommendations that are avail
2727

2828
You can enable the Azure Policy for Kubernetes by one of two ways:
2929

30-
- Enable for all current and future clusters using plan/connector settings
30+
- Enable for all current and future clusters using plan/connector settings:
3131
- [Enabling for Azure subscriptions or on-premises](#enable-for-azure-subscriptions-or-on-premises)
32-
- [Enabling for GCP projects](#enable-for-gcp-projects)
32+
- [Enabling for Google Cloud Platform (GCP) projects](#enable-for-gcp-projects)
3333
- [Deploy Azure Policy for Kubernetes on existing clusters](#deploy-azure-policy-for-kubernetes-on-existing-clusters)
3434

3535
### Enable Azure Policy for Kubernetes for all current and future clusters using plan/connector settings
@@ -42,25 +42,25 @@ You can enable the Azure Policy for Kubernetes by one of two ways:
4242
4343
#### Enable for Azure subscriptions or on-premises
4444

45-
When you enable Microsoft Defender for Containers, the "Azure Policy for Kubernetes" setting is enabled by default for the Azure Kubernetes Service, and for Azure Arc-enabled Kubernetes clusters in the relevant subscription. If you disable the setting on initial configuration, you can enable it afterwards manually.
45+
When you enable Microsoft Defender for Containers, the "Azure Policy for Kubernetes" setting is enabled by default for the Azure Kubernetes Service and for Azure Arc-enabled Kubernetes clusters in the relevant subscription. If you disable the setting on initial configuration, you can enable it afterwards manually.
4646

47-
If you disabled the "Azure Policy for Kubernetes" settings under the containers plan, you can follow the below steps to enable it across all clusters in your subscription:
47+
If you disabled the "Azure Policy for Kubernetes" settings under the containers plan, you can follow the steps bellow to enable it across all clusters in your subscription:
4848

4949
1. Sign in to the [Azure portal](https://portal.azure.com).
5050

51-
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
51+
1. Go to **Microsoft Defender for Cloud** > **Management** > **Environment settings**.
5252

5353
1. Select the relevant subscription.
5454

55-
1. On the Defender plans page, ensure that Containers is toggled to **On**.
55+
1. On the Defender plans page, ensure that **Containers** is toggled to **On**.
5656

5757
1. Select **Settings**.
5858

59-
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
59+
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
6060

61-
1. In the Settings & Monitoring page, toggle the "Azure Policy for Kubernetes" to **On**.
61+
1. In the Settings & Monitoring page, toggle the **Azure Policy for Kubernetes** to **On**.
6262

63-
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
63+
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
6464

6565
#### Enable for GCP projects
6666

@@ -73,25 +73,29 @@ If you disabled the "Azure Policy Extension for Azure Arc" settings under the GC
7373
You can manually configure the Azure Policy for Kubernetes on existing Kubernetes clusters through the Recommendations page. Once enabled, the hardening recommendations become available (some of the recommendations require another configuration to work).
7474

7575
> [!NOTE]
76-
> For AWS it isn't possible to do onboarding at scale using the connector, but it can be installed on all existing clusters or on specific clusters using the recommendation Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed**.
76+
> For AWS, onboarding at scale using the connector isn't supported. However, you can install Azure Policy for Kubernetes on all existing clusters or on specific clusters by using the recommendation `Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed`.
7777
78-
**To deploy the** **Azure Policy for Kubernetes** **to specified clusters**:
78+
**To deploy the Azure Policy for Kubernetes to specified clusters**:
7979

80-
1. From the recommendations page, search for the relevant recommendation:
80+
1. Sign in to the [Azure portal](https://portal.azure.com).
81+
82+
1. Go to **Microsoft Defender for Cloud** > **General** > **Recommendations**.
83+
84+
1. Search for the relevant recommendation:
8185

8286
- **Azure -** `"Azure Kubernetes Service clusters should have the Azure Policy add-on for Kubernetes installed"`
8387
- **GCP** - `"GKE clusters should have the Azure Policy extension"`.
8488
- **AWS and On-premises** - `"Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed"`.
85-
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
86-
87-
> [!TIP]
88-
> The recommendation is included in different security controls, and it doesn't matter which one you select in the next step.
89+
90+
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
8991

90-
1. From any of the security controls, select the recommendation to see the resources on which you can install the add-on.
92+
1. Select a found recommendation.
9193

92-
1. Select the relevant cluster, and select **Remediate**.
94+
1. Select **Fix**.
95+
96+
:::image type="content" source="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png" alt-text="Screenshot of a recommendation with the Fix button highlighted." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png":::
9397

94-
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-remediation.png" alt-text="Screenshot that shows how to select the cluster to remediate." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-remediation.png":::
98+
1. Repeat for each additional recommendation.
9599

96100
## View and configure the bundle of recommendations
97101

@@ -131,39 +135,59 @@ For recommendations with parameters that need to be customized, you need to set
131135

132136
1. Sign in to the [Azure portal](https://portal.azure.com).
133137

134-
1. Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
138+
1. Go to **Microsoft Defender for Cloud** > **Management** > **Environment settings**.
135139

136140
1. Select the relevant subscription.
137141

138-
1. From Defender for Cloud's menu, select **Security policy**.
142+
1. From the navigation menu, select **Security policies**.
143+
144+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-page.png" alt-text="Screenshot of the Security policies page." lightbox="media/kubernetes-workload-protections/security-policies-page.png":::
139145

140-
1. Select the relevant assignment. The default assignment is `ASC default`.
146+
1. On the **Standards** tab, search for the appropriate security standard.
141147

142-
1. Open the **Parameters** tab and modify the values as required.
148+
1. Select the security standard's 3-dot menu and select **Manage**.
149+
150+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-select-manage.png" alt-text="Screenshot of selecting Manage from the recommendation's 3-dot menu." lightbox="media/kubernetes-workload-protections/security-policies-select-manage.png":::
143151

144-
:::image type="content" source="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png" alt-text="Screenshot showing where to modify the parameters for one of the recommendations in the Kubernetes data plane hardening protection bundle." lightbox="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png":::
152+
1. Select the relevant policy assignment's 3-dot menu and select **Manage effect and parameters**.
153+
154+
:::image type="content" source="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png" alt-text="Screenshot of selecting the 3-dot menu and then selecting Manage effect and aparameters." lightbox="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png":::
145155

146-
1. Select **Review + save**.
156+
1. Modify the values as required.
157+
158+
:::image type="content" source="media/kubernetes-workload-protections/manage-effect-and-parameters.png" alt-text="Screenshot of the paraments panel." lightbox="media/kubernetes-workload-protections/manage-effect-and-parameters.png":::
147159

148160
1. Select **Save**.
149161

150162
**To enforce any of the recommendations**:
151163

152164
1. Open the recommendation details page and select **Deny**:
153165

154-
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
166+
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
155167

156168
The pane to set the scope opens.
157169

158170
1. Set the scope and select **Change to deny**.
159171

160172
**To see which recommendations apply to your clusters**:
161173

162-
1. Open Defender for Cloud's [asset inventory](asset-inventory.md) page and set the resource type filter to **Kubernetes services**.
174+
1. Sign in to the [Azure portal](https://portal.azure.com).
175+
176+
1. Go to **Defender for Cloud** > **Inventory**.
177+
178+
1. Set the resource type filter to **Kubernetes services** and select **Apply**.
179+
180+
:::image type="content" source="media/kubernetes-workload-protections/resource-type-kubernetes-service.png" alt-text="Screenshot of using the resource type filter to select kubernetes service." lightbox="media/kubernetes-workload-protections/resource-type-kubernetes-service.png":::
181+
182+
1. Select a cluster to investigate.
163183

164-
1. Select a cluster to investigate and review the available recommendations available for it.
184+
1. Review the available recommendations for it. When you view a recommendation from the workload protection set, the number of affected pods ("Kubernetes components") is listed alongside the cluster.
185+
165186

166-
When you view a recommendation from the workload protection set, the number of affected pods ("Kubernetes components") is listed alongside the cluster. For a list of the specific pods, select the cluster and then select **Take action**.
187+
1. Optional: For a list of the specific pods, select the recommendation.
188+
189+
:::image type="content" source="media/kubernetes-workload-protections/resource-health-recommendation.png" alt-text="Screenshot of selecting a recommendation from the Resource health page." lightbox="media/kubernetes-workload-protections/resource-health-recommendation.png":::
190+
1. and then select **Take action**.
167191

168192
:::image type="content" source="./media/defender-for-kubernetes-usage/view-affected-pods-for-recommendation.gif" alt-text="Screenshot showing where to view the affected pods for a Kubernetes recommendation.":::
169193

-12.7 KB
Loading
55 KB
Loading
-5.19 KB
Loading
142 KB
Loading
15.8 KB
Loading
22.7 KB
Loading

0 commit comments

Comments
 (0)