Skip to content

Commit 08af6be

Browse files
authored
Update ARO Defender documentation on automation
Clarified the role of Microsoft Defender for Cloud in relation to ARO and automation tools.
1 parent 2ba6e4e commit 08af6be

1 file changed

Lines changed: 3 additions & 1 deletion

File tree

0_Azure/8_AzureApps/demos/1_Compute/3_ARO_Defender.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,12 +78,14 @@ To enable it: `This way, you get both runtime threat detection and image vulnera
7878

7979
> Microsoft Defender for Cloud (and Defender for Containers) is primarily a monitoring, detection, and recommendation engine. `It does not directly “reach into” your ARO (Azure Red Hat OpenShift) or AKS/containers and change configurations by itself. Instead, it surfaces recommendations and alerts, and you can automate actions around them.`
8080
81-
8281
> [!TIP]
8382
> - **Defender does not directly “do actions” inside ARO/containers.**
8483
> - It provides **recommendations and alerts**, and you can **wire automation** (Azure Policy, Logic Apps, Kubernetes admission controllers) to enforce or remediate those recommendations.
8584
> - In practice, Defender acts as the **brains** (detect + recommend), while **Policy/Logic Apps/Function Apps/Kubernetes controllers** act as the **hands** (enforce + remediate).
8685
86+
> [!NOTE]
87+
> The pattern is the same across all Azure resources: Defender monitors + recommends, while Azure Policy and automation tools enforce/remediate.
88+
> The specific enforcement mechanisms differ depending on the resource type (VMs, databases, containers, etc.).
8789
8890
> What You *Can* Do in ARO or Containers:
8991

0 commit comments

Comments
 (0)