Hello administrator - simple machine mind
Thank you for reaching out to Microsoft Q&A.
Why does this happen?
The recommendation logic expects a recent vulnerability scan result, not just zero CVEs.
If the scan is stale or the registry hasn’t been rescanned recently, the resource remains Unhealthy even with no vulnerabilities.
This is a known limitation in Defender for Cloud’s compliance evaluation.
Below are the resolution steps: -
1. Trigger a fresh vulnerability scan
Defender for Cloud rescans images:
Daily for images pushed in the last 90 days.
When images are pulled in the last 30 days.
If your images are older, push or re-import them to trigger a scan.
Ensure Microsoft Defender for Containers plan is enabled, and agentless vulnerability assessment is turned on for ACR.
For your reference: https://learn.microsoft.com/en-us/azure/defender-for-cloud/view-and-remediate-vulnerability-registry-images
2.) Create an exemption (mark as Not applicable or Mitigated)
Go to Defender for Cloud → Recommendations → Container registry images should have vulnerability findings resolved.
Select your ACR resource.
Click Disable rule or Exempt.
Define criteria (even if there are no CVEs):
Image digest (sha256)
OS version
Minimum severity
Fix status
Provide justification (e.g., “No vulnerabilities detected; accepted risk”).
After applying, the resource will appear under Not applicable and will no longer impact Secure Score.
For your reference: https://learn.microsoft.com/en-us/azure/defender-for-cloud/exempt-resource
For your reference: https://learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers-secure-score
3.) Validate compliance
After exemption, check Azure Policy → Compliance.
The recommendation should now show as Not applicable with your justification.
This also removes its effect on Secure Score.
For your reference: https://learn.microsoft.com/en-us/azure/defender-for-cloud/disable-vulnerability-findings-containers-secure-score
Please reach out to us in case of any further issue.
Thanks