Skip to content

Commit f9d9e97

Browse files
committed
validated cse article vulnerabilities
1 parent 6264005 commit f9d9e97

7 files changed

Lines changed: 42 additions & 17 deletions

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -852,7 +852,7 @@
852852
href: cluster-security-dashboard.md
853853
- name: How to use the AKS Security Dashboard
854854
href: how-to-use-azure-kubernetes-service-dashboard.md
855-
- name: Investigate clusters with Cloud Security Explorer
855+
- name: Investigate Kubernetes vulnerabilities with Cloud Security Explorer
856856
displayName: k8s, containers
857857
href: cloud-security-explorer-kubernetes-clusters.md
858858
- name: Defender for container registries (deprecated)
Lines changed: 41 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Building Cloud Security Explorer query to identify vulnerabilities in Kubernetes clusters
3-
description: Learn to build queries with cloud security explorer in Microsoft Defender for Cloud to investigate vulnerabilities Kubernetes clusters
2+
title: Build Cloud Security Explorer queries to identify vulnerabilities in Kubernetes clusters
3+
description: Learn how to build queries with Cloud Security Explorer in Microsoft Defender for Cloud to investigate vulnerabilities in Kubernetes clusters.
44
ms.topic: how-to
55
ms.date: 03/02/2026
66
ms.author: elkrieger
@@ -10,7 +10,7 @@ author: Elazark
1010

1111
# Build Cloud Security Explorer queries to identify vulnerabilities in Kubernetes clusters
1212

13-
Use Cloud Security Explorer to find vulnerabilities in your Kubernetes clusters. The following examples show how to build queries that you can customize for your specific needs.
13+
Use Cloud Security Explorer to identify vulnerabilities in your Kubernetes clusters. The following examples show how to build queries to investigate container images and cluster nodes, and can be adapted to filter results based on your requirements.
1414

1515
For an introduction to Cloud Security Explorer queries, see [Build queries with Cloud Security Explorer](how-to-manage-cloud-security-explorer.md).
1616

@@ -20,35 +20,60 @@ For an introduction to Cloud Security Explorer queries, see [Build queries with
2020

2121
1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
2222

23-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png" alt-text="Screenshot of main page of Cloud Security Explorer." lightbox="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png":::
23+
1. In **Query builder**, select **Select resource types**.
2424

2525
1. Select **Container Images**.
26-
1. Search for **has installed software**.
2726

28-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query.png" alt-text="Screenshot of Cloud Security Explorer query options to retrieve list of container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query.png":::
27+
1. Search for and select **Has installed software**.
2928

30-
1. Select the **View details** link to see the result details pane.
31-
1. View the details of the installed software in the **Insights** section.
29+
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/query-search-has-installed-software.png" alt-text="Screenshot of search box in Select resource types showing 'Has installed software' under Insights." lightbox="./media/cloud-security-explorer-kubernetes-clusters/query-search-has-installed-software.png":::
30+
31+
1. Select **Search**.
3232

33-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png":::
33+
1. Select **View details >** for the relevant container image.
34+
35+
1. In the **Result details** pane, review **Insights - Has installed software**.
3436

37+
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve container images with software installed." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-explorer-containers-query-result-details.png":::
3538

3639
## Create a query to identify vulnerabilities in cluster nodes
3740

41+
1. Sign in to the [Azure portal](https://portal.azure.com).
42+
3843
1. Go to **Microsoft Defender for Cloud** > **Cloud Security Explorer**.
3944

40-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png" alt-text="Screenshot of main page of Cloud Security Explorer." lightbox="./media/cloud-security-explorer-kubernetes-clusters/cloud-security-explorer-main-page.png":::
45+
1. In **Query builder**, select **Select resource types**.
46+
47+
1. Under **Kubernetes clusters**, select **Azure Kubernetes Service**.
48+
49+
1. Select **Done**.
50+
51+
1. Select **+** > **Select condition**.
52+
53+
1. In **Application**, select **Maintains**.
54+
55+
1. Select **Select resource types** > **Kubernetes Node Pools**.
56+
57+
1. Select **Done**.
58+
59+
1. Select **+** > **Select condition**.
60+
61+
1. Select **Maintains**.
62+
63+
1. Select **Select resource types** > **Virtual machines clusters**.
4164

42-
1. Select **Kubernetes clusters** > **Azure Kubernetes Service**.
43-
1. Select **Application** > **Maintains** > **Kubernetes Node Pools**.
4465
1. Select **Done**.
45-
1. Select **Maintains** > **Virtual machine clusters (group)** that **Has vulnerabilities**.
66+
67+
1. Select **+** > **Select condition**.
68+
69+
1. In **Vulnerabilities**, select **All vulnerabilities**.
70+
4671
1. Select **Search**.
47-
1. Select **View details** for the cluster node pool.
4872

49-
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png" alt-text="Screenshot of Cloud Security Explorer query options to retrieve list of cluster nodes with vulnerabilities." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png":::
73+
1. Select **View details >** for the relevant Kubernetes node pool.
5074

75+
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png" alt-text="Screenshot of Cloud Security Explorer query options to retrieve list of cluster nodes with vulnerabilities." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results.png":::
5176

52-
1. In the **Result details** pane, select the **Virtual machine scale set** icon to view its vulnerabilities.
77+
1. In the **Result details** pane, select the **Virtual machine scale set** icon to view vulnerabilities.
5378

5479
:::image type="content" source="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results-details.png" alt-text="Screenshot shows results of Cloud Security Explorer query to retrieve vulnerabilities in cluster nodes." lightbox="./media/cloud-security-explorer-kubernetes-clusters/security-cloud-explorer-kubernetes-nodes-results-details.png":::
17.4 KB
Loading
Loading
-1.95 KB
Loading

0 commit comments

Comments
 (0)