Bemærk
Adgang til denne side kræver godkendelse. Du kan prøve at logge på eller ændre mapper.
Adgang til denne side kræver godkendelse. Du kan prøve at ændre mapper.
This article explains how to enable the Microsoft Defender for Containers plan in Microsoft Defender for Cloud.
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- Google Kubernetes Engine (GKE)
- Azure Arc-enabled Kubernetes
Prerequisites
Before you begin, make sure that:
You have an AKS cluster. See the support matrix.
You reviewed the Defender for Containers feature access patterns.
You reviewed the required network access and permissions.
Enable the Defender for Containers plan
Sign in to the Azure portal.
Go to Microsoft Defender for Cloud > Environment settings.
Select the subscription where your AKS clusters are located.
On the Defender plans page, find the Containers row and toggle the status to On.
Select Settings in the Containers plan row.
Toggle On or Off the relevant Defender for Containers components:
Agentless scanning for machines
Performs agentless vulnerability and secret scanning on Kubernetes nodes.- To exclude machines from agentless scanning, add the exclusion tag name and value.
Defender sensor
Deploys the Defender sensor to cluster nodes to collect runtime security telemetry used for threat detection.- Enable Defender Security Gating: Adds an admission control layer that evaluates deployments against security policies before workloads run in the cluster.
- Enable Defender Runtime Anti Malware: Enables runtime malware detection for Kubernetes hosts and containers and can optionally block malicious file execution in real time.
Azure Policy
Deploys the Azure Policy for Kubernetes add-on to enable Kubernetes security posture assessments and related security recommendations.Kubernetes API access
Allows Defender for Cloud to access the Kubernetes API for cluster inventory, configuration analysis, and capabilities that rely on Kubernetes metadata.Registry access
Enables agentless vulnerability assessment for container images stored in connected registries.- Security findings: Generates findings and links them to container images when new images are pushed or existing images are updated.
Select Continue.
Select Save.
Verify the plan is enabled
Sign in to the Azure portal.
Go to Microsoft Defender for Cloud > Environment settings.
Select the subscription.
Verify that Containers is set to On.
Select Settings next to Containers and confirm the required components are enabled.