You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/kubernetes-nodes-malware.md
+11-7Lines changed: 11 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Kubernetes Nodes Malware Detection
3
3
description: Learn about Defender for Containers malware detection for Kubernetes nodes.
4
-
ms.date: 11/15/2024
4
+
ms.date: 03/02/2026
5
5
ms.topic: concept-article
6
6
ms.custom: sfi-image-nochange
7
7
---
@@ -21,14 +21,18 @@ Malware detection in Kubernetes nodes must be [enabled by turning on the **Agent
21
21
22
22
If malware is found in Kubernetes nodes, a malware security alert is generated for the customer to review. To review a Kubernetes node malware security alert in the Azure portal:
23
23
24
-
1. Select **Security Alerts** from the **Defender for Cloud** menu and select the line of the malware security alert for the Kubernetes node to the description.
25
-
:::image type="content" source="media/kubernetes-nodes-malware/security-alerts-list-select.png" alt-text="Screenshot of selecting the line showing the malware security alert for the Kubernetes node." lightbox="media/kubernetes-nodes-malware/security-alerts-list-select.png":::
24
+
1. Sign in to the [Azure portal](https://portal.azure.com).
25
+
26
+
1. Go to **Microsoft Defender for Cloud** > **General** > **Security alerts**.
27
+
28
+
1. Select the relevant malware security alert for the Kubernetes node.
29
+
:::image type="content" source="media/kubernetes-nodes-malware/security-alerts-list-select.png" alt-text="Screenshot of selecting the line showing the malware security alert for the Kubernetes node." lightbox="media/kubernetes-nodes-malware/security-alerts-list-select.png":::
26
30
27
-
1. Select the **View full details** button to open the pane showing the full details of the malware found.
28
-
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail.png" alt-text="Screenshot of selecting the view full details button to view the full details." lightbox="media/kubernetes-nodes-malware/security-alert-detail.png":::
31
+
1. Select the **View full details** button.
32
+
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail.png" alt-text="Screenshot of selecting the view full details button to view the full details." lightbox="media/kubernetes-nodes-malware/security-alert-detail.png":::
29
33
30
34
1. The security alert details describe the malware found, including the affected node pools and malware files found. Select the **Next: Take Action** button to view the instructions to remediate the threat.
31
-
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-full.png" alt-text="Screenshot of selecting the take action tab to see the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-full.png":::
35
+
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-full.png" alt-text="Screenshot of selecting the take action tab to see the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-full.png":::
32
36
33
37
1. Follow the instructions to remediate the threat.
34
-
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-take-action.png" alt-text="Screenshot showing the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-take-action.png":::
38
+
:::image type="content" source="media/kubernetes-nodes-malware/security-alert-detail-take-action.png" alt-text="Screenshot showing the instructions to remediate the threat." lightbox="media/kubernetes-nodes-malware/security-alert-detail-take-action.png":::
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/kubernetes-workload-protections.md
+54-30Lines changed: 54 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use Microsoft Defender for Cloud's set of Kubernetes d
4
4
ms.topic: how-to
5
5
author: Elazark
6
6
ms.author: elkrieger
7
-
ms.date: 07/15/2025
7
+
ms.date: 03/23/2026
8
8
---
9
9
10
10
# Protect your Kubernetes data plane hardening
@@ -27,9 +27,9 @@ Microsoft Defender for Cloud includes a bundle of recommendations that are avail
27
27
28
28
You can enable the Azure Policy for Kubernetes by one of two ways:
29
29
30
-
- Enable for all current and future clusters using plan/connector settings
30
+
- Enable for all current and future clusters using plan/connector settings:
31
31
-[Enabling for Azure subscriptions or on-premises](#enable-for-azure-subscriptions-or-on-premises)
32
-
-[Enabling for GCP projects](#enable-for-gcp-projects)
32
+
-[Enabling for Google Cloud Platform (GCP) projects](#enable-for-gcp-projects)
33
33
-[Deploy Azure Policy for Kubernetes on existing clusters](#deploy-azure-policy-for-kubernetes-on-existing-clusters)
34
34
35
35
### Enable Azure Policy for Kubernetes for all current and future clusters using plan/connector settings
@@ -42,25 +42,25 @@ You can enable the Azure Policy for Kubernetes by one of two ways:
42
42
43
43
#### Enable for Azure subscriptions or on-premises
44
44
45
-
When you enable Microsoft Defender for Containers, the "Azure Policy for Kubernetes" setting is enabled by default for the Azure Kubernetes Service, and for Azure Arc-enabled Kubernetes clusters in the relevant subscription. If you disable the setting on initial configuration, you can enable it afterwards manually.
45
+
When you enable Microsoft Defender for Containers, the "Azure Policy for Kubernetes" setting is enabled by default for the Azure Kubernetes Service and for Azure Arc-enabled Kubernetes clusters in the relevant subscription. If you disable the setting on initial configuration, you can enable it afterwards manually.
46
46
47
-
If you disabled the "Azure Policy for Kubernetes" settings under the containers plan, you can follow the below steps to enable it across all clusters in your subscription:
47
+
If you disabled the "Azure Policy for Kubernetes" settings under the containers plan, you can follow the steps bellow to enable it across all clusters in your subscription:
48
48
49
49
1. Sign in to the [Azure portal](https://portal.azure.com).
50
50
51
-
1.Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
51
+
1.Go to **Microsoft Defender for Cloud** > **Management** > **Environment settings**.
52
52
53
53
1. Select the relevant subscription.
54
54
55
-
1. On the Defender plans page, ensure that Containers is toggled to **On**.
55
+
1. On the Defender plans page, ensure that **Containers** is toggled to **On**.
56
56
57
57
1. Select **Settings**.
58
58
59
-
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
59
+
:::image type="content" source="media/kubernetes-workload-protections/containers-settings.png" alt-text="Screenshot showing the settings button in the Defender plan." lightbox="media/kubernetes-workload-protections/containers-settings.png":::
60
60
61
-
1. In the Settings & Monitoring page, toggle the "Azure Policy for Kubernetes" to **On**.
61
+
1. In the Settings & Monitoring page, toggle the **Azure Policy for Kubernetes** to **On**.
62
62
63
-
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
63
+
:::image type="content" source="media/kubernetes-workload-protections/toggle-on-extensions.png" alt-text="Screenshot showing the toggles used to enable or disable the extensions." lightbox="media/kubernetes-workload-protections/toggle-on-extensions.png":::
64
64
65
65
#### Enable for GCP projects
66
66
@@ -73,25 +73,29 @@ If you disabled the "Azure Policy Extension for Azure Arc" settings under the GC
73
73
You can manually configure the Azure Policy for Kubernetes on existing Kubernetes clusters through the Recommendations page. Once enabled, the hardening recommendations become available (some of the recommendations require another configuration to work).
74
74
75
75
> [!NOTE]
76
-
> For AWS it isn't possible to do onboarding at scale using the connector, but it can be installed on all existing clusters or on specific clusters using the recommendation Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed**.
76
+
> For AWS, onboarding at scale using the connector isn't supported. However, you can install Azure Policy for Kubernetes on all existing clusters or on specific clusters by using the recommendation `Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed`.
77
77
78
-
**To deploy the****Azure Policy for Kubernetes****to specified clusters**:
78
+
**To deploy theAzure Policy for Kubernetesto specified clusters**:
79
79
80
-
1. From the recommendations page, search for the relevant recommendation:
80
+
1. Sign in to the [Azure portal](https://portal.azure.com).
81
+
82
+
1. Go to **Microsoft Defender for Cloud** > **General** > **Recommendations**.
83
+
84
+
1. Search for the relevant recommendation:
81
85
82
86
-**Azure -**`"Azure Kubernetes Service clusters should have the Azure Policy add-on for Kubernetes installed"`
83
87
-**GCP** - `"GKE clusters should have the Azure Policy extension"`.
84
88
-**AWS and On-premises** - `"Azure Arc-enabled Kubernetes clusters should have the Azure policy extension for Kubernetes extension installed"`.
85
-
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
86
-
87
-
> [!TIP]
88
-
> The recommendation is included in different security controls, and it doesn't matter which one you select in the next step.
89
+
90
+
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png" alt-text="Screenshot showing the Azure Kubernetes service clusters recommendation." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation.png":::
89
91
90
-
1.From any of the security controls, select the recommendation to see the resources on which you can install the add-on.
92
+
1.Select a found recommendation.
91
93
92
-
1. Select the relevant cluster, and select **Remediate**.
94
+
1. Select **Fix**.
95
+
96
+
:::image type="content" source="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png" alt-text="Screenshot of a recommendation with the Fix button highlighted." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-fix.png":::
93
97
94
-
:::image type="content" source="./media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-remediation.png" alt-text="Screenshot that shows how to select the cluster to remediate." lightbox="media/kubernetes-workload-protections/azure-kubernetes-service-clusters-recommendation-remediation.png":::
98
+
1. Repeat for each additional recommendation.
95
99
96
100
## View and configure the bundle of recommendations
97
101
@@ -131,39 +135,59 @@ For recommendations with parameters that need to be customized, you need to set
131
135
132
136
1. Sign in to the [Azure portal](https://portal.azure.com).
133
137
134
-
1.Navigate to **Microsoft Defender for Cloud** > **Environment settings**.
138
+
1.Go to **Microsoft Defender for Cloud** > **Management** > **Environment settings**.
135
139
136
140
1. Select the relevant subscription.
137
141
138
-
1. From Defender for Cloud's menu, select **Security policy**.
142
+
1. From the navigation menu, select **Security policies**.
143
+
144
+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-page.png" alt-text="Screenshot of the Security policies page." lightbox="media/kubernetes-workload-protections/security-policies-page.png":::
139
145
140
-
1.Select the relevant assignment. The default assignment is `ASC default`.
146
+
1.On the **Standards** tab, search for the appropriate security standard.
141
147
142
-
1. Open the **Parameters** tab and modify the values as required.
148
+
1. Select the security standard's 3-dot menu and select **Manage**.
149
+
150
+
:::image type="content" source="media/kubernetes-workload-protections/security-policies-select-manage.png" alt-text="Screenshot of selecting Manage from the recommendation's 3-dot menu." lightbox="media/kubernetes-workload-protections/security-policies-select-manage.png":::
143
151
144
-
:::image type="content" source="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png" alt-text="Screenshot showing where to modify the parameters for one of the recommendations in the Kubernetes data plane hardening protection bundle." lightbox="media/kubernetes-workload-protections/containers-parameter-requires-configuration.png":::
152
+
1. Select the relevant policy assignment's 3-dot menu and select **Manage effect and parameters**.
153
+
154
+
:::image type="content" source="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png" alt-text="Screenshot of selecting the 3-dot menu and then selecting Manage effect and aparameters." lightbox="media/kubernetes-workload-protections/select-manage-effect-and-parameters.png":::
145
155
146
-
1. Select **Review + save**.
156
+
1. Modify the values as required.
157
+
158
+
:::image type="content" source="media/kubernetes-workload-protections/manage-effect-and-parameters.png" alt-text="Screenshot of the paraments panel." lightbox="media/kubernetes-workload-protections/manage-effect-and-parameters.png":::
147
159
148
160
1. Select **Save**.
149
161
150
162
**To enforce any of the recommendations**:
151
163
152
164
1. Open the recommendation details page and select **Deny**:
153
165
154
-
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
166
+
:::image type="content" source="./media/defender-for-kubernetes-usage/enforce-workload-protection-example.png" alt-text="Screenshot showing the Deny option for Azure Policy parameter." lightbox="media/defender-for-kubernetes-usage/enforce-workload-protection-example.png":::
155
167
156
168
The pane to set the scope opens.
157
169
158
170
1. Set the scope and select **Change to deny**.
159
171
160
172
**To see which recommendations apply to your clusters**:
161
173
162
-
1. Open Defender for Cloud's [asset inventory](asset-inventory.md) page and set the resource type filter to **Kubernetes services**.
174
+
1. Sign in to the [Azure portal](https://portal.azure.com).
175
+
176
+
1. Go to **Defender for Cloud** > **Inventory**.
177
+
178
+
1. Set the resource type filter to **Kubernetes services** and select **Apply**.
179
+
180
+
:::image type="content" source="media/kubernetes-workload-protections/resource-type-kubernetes-service.png" alt-text="Screenshot of using the resource type filter to select kubernetes service." lightbox="media/kubernetes-workload-protections/resource-type-kubernetes-service.png":::
181
+
182
+
1. Select a cluster to investigate.
163
183
164
-
1. Select a cluster to investigate and review the available recommendations available for it.
184
+
1. Review the available recommendations for it. When you view a recommendation from the workload protection set, the number of affected pods ("Kubernetes components") is listed alongside the cluster.
185
+
165
186
166
-
When you view a recommendation from the workload protection set, the number of affected pods ("Kubernetes components") is listed alongside the cluster. For a list of the specific pods, select the cluster and then select **Take action**.
187
+
1. Optional: For a list of the specific pods, select the recommendation.
188
+
189
+
:::image type="content" source="media/kubernetes-workload-protections/resource-health-recommendation.png" alt-text="Screenshot of selecting a recommendation from the Resource health page." lightbox="media/kubernetes-workload-protections/resource-health-recommendation.png":::
190
+
1. and then select **Take action**.
167
191
168
192
:::image type="content" source="./media/defender-for-kubernetes-usage/view-affected-pods-for-recommendation.gif" alt-text="Screenshot showing where to view the affected pods for a Kubernetes recommendation.":::
0 commit comments