You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enhance ARO Defender documentation with automation details
Added details on automating recommendations with Microsoft Defender for Cloud, including monitoring, automated actions, and examples of automation in ARO and containers.
Copy file name to clipboardExpand all lines: 0_Azure/8_AzureApps/demos/1_Compute/3_ARO_Defender.md
+29Lines changed: 29 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,6 +74,35 @@ To enable it: `This way, you get both runtime threat detection and image vulnera
74
74
75
75
> - Configure image vulnerability scanning for your container registries (e.g., Azure Container Registry or integrated third-party registries).
76
76
77
+
## Automating recommendations
78
+
79
+
> Microsoft Defender for Cloud (and Defender for Containers) is primarily a monitoring, detection, and recommendation engine. `It does not directly “reach into” your ARO (Azure Red Hat OpenShift) or AKS/containers and change configurations by itself. Instead, it surfaces recommendations and alerts, and you can automate actions around them.`
80
+
81
+
82
+
> [!TIP]
83
+
> -**Defender does not directly “do actions” inside ARO/containers.**
84
+
> - It provides **recommendations and alerts**, and you can **wire automation** (Azure Policy, Logic Apps, Kubernetes admission controllers) to enforce or remediate those recommendations.
85
+
> - In practice, Defender acts as the **brains** (detect + recommend), while **Policy/Logic Apps/Function Apps/Kubernetes controllers** act as the **hands** (enforce + remediate).
86
+
87
+
88
+
> What You *Can* Do in ARO or Containers:
89
+
90
+
1.**Monitoring & Recommendations** Defender for Containers integrates with **ARO** (since ARO is built on OpenShift/Kubernetes). It provides:
-**Workflow automation (Logic Apps/Function Apps)** → trigger scripts or actions when Defender raises an alert.
98
+
-**Kubernetes admission controllers / Gatekeeper** → enforce policies at deployment time, often aligned with Defender’s recommendations.
99
+
3.**Examples of Automation**:
100
+
-**ARO / AKS cluster hardening:** Automatically block deployments that violate Defender recommendations (via Azure Policy + Gatekeeper).
101
+
-**Container image scanning:** If Defender finds a vulnerable image in ACR, trigger a Logic App to block its deployment or notify DevOps.
102
+
-**Runtime alerts:** If Defender detects suspicious activity in a container, trigger automation to isolate the pod, scale down the deployment, or alert security teams.
0 commit comments