Agentless machine scanning in Microsoft Defender for Cloud improves the security posture of machines connected to Defender for Cloud.
Agentless scanning doesn't need any installed agents or network connectivity, and doesn't affect machine performance. Agentless machine scanning:
Scans endpoint detection and response (EDR) settings: Scan machines to assess whether they're running an EDR solution, and whether settings are correct if machines integrate with Microsoft Defender for Endpoint. Learn more
Scans software inventory: Scan your software inventory with integrated Microsoft Defender Vulnerability Management.
Malware scanning is only available in Defender for Servers Plan 2.
Agentless scanning is available for Azure VMs, AWS EC2 and GCP compute instances connected to Defender for Cloud.
Agentless scanning architecture
Here's how agentless scanning works:
Defender for Cloud takes snapshots of VM disks and performs an out-of-band, deep analysis of the operating system configuration and file system stored in the snapshot.
The copied snapshot remains in the same region as the VM.
The scan doesn't affect the VM.
After Defender for Cloud gets the necessary metadata from the copied disk, it immediately deletes the copied snapshot of the disk and sends the metadata to relevant Microsoft engines to detect configuration gaps and potential threats. For example, in vulnerability assessment, the analysis is done by Defender Vulnerability Management.
Defender for Cloud displays scanning results, which consolidates both the agent-based and agentless results on the Security alerts page.
Defender for Cloud analyses disks in a scanning environment that's regional, volatile, isolated, and highly secure. Disk snapshots and data unrelated to the scan aren't stored longer than is necessary to collect the metadata, typically a few minutes.
Permissions used by agentless scanning
Defender for Cloud used specific roles and permissions to perform agentless scanning.
In Azure, these permissions are automatically added to your subscriptions when you enable agentless scanning.
The built-in role VM scanner operator has read-only permissions for VM disks that are required for the snapshot process. The detailed list of permissions is:
When coverage for CMK encrypted disks is enabled, more permissions are used:
Microsoft.KeyVault/vaults/keys/read
Microsoft.KeyVault/vaults/keys/wrap/action
Microsoft.KeyVault/vaults/keys/unwrap/action
AWS permissions
The role VmScanner is assigned to the scanner when you enable agentless scanning. This role has the minimal permission set to create and clean up snapshots (scoped by tag) and to verify the current state of the VM. The detailed permissions are:
Attribute
Value
SID
VmScannerDeleteSnapshotAccess
Actions
ec2:DeleteSnapshot
Conditions
"StringEquals":{"ec2:ResourceTag/CreatedBy”:<br>"Microsoft Defender for Cloud"}
Discover how to leverage Microsoft Defender for Cloud through the Azure portal to ensure the security of your Azure services and workloads, offering continuous threat detection and prevention.