![]() Based on the result, we propagate the data into the recommendation so you can see all relevant virtual machines. Upon Azure Policy evaluation, we get the compliance data to identify potential and supported virtual machines which don’t have a vulnerability assessment solution deployed. Discovery – To make this integration work, a policy named “vulnerability assessment should be enabled on virtual machines” which is part of the “ASC default” initiative must be enabled. Our integrated vulnerability scanner is based on 5 different stages: from discovery to findings. In this post, I will focus on vulnerability scanning of virtual machines, although standard tier also offers scanning for both containers and container registries - learn more here. This offering is available to all commercial Azure customers that have enabled Microsoft Defender for Cloud standard pricing tier for VMs. Once this integration is enabled, Qualys continually assesses all the installed applications on a virtual machine to find vulnerabilities and presents its findings in the Microsoft Defender for Cloud console. Qualys’s scanner is the leading tool for identifying vulnerabilities in your Azure virtual machines. (Please note that since this article was written, Azure Security Center was renamed to Microsoft Defender for Cloud) In this blog post, I will focus on a the built-in capabilities as you can see on the left side in the image below. If you're using Microsoft Defender for Cloud’s standard tier for VMs, you can quickly deploy a vulnerability assessment solution powered by Qualys with no additional configuration or extra costs. There are several options for deploying a vulnerability assessment solutions for Azure VMs. What is the built-in vulnerability assessment tool in Microsoft Defender for Cloud?
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |