Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register todayThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Agentless machine scanning in Microsoft Defender for Cloud improves the security posture of machines connected to Defender for Cloud. Agentless machine scanning includes capabilities such as scanning for software inventory, vulnerabilities, secrets, and malware.
When you turn on Defender for Servers Plan 2 or the Defender Cloud Security Posture Management (CSPM) plan, agentless machine scanning is enabled by default. If needed, you can use the instructions in this article to enable agentless machine scanning manually.
Requirement | Details |
---|---|
Plan | To use agentless scanning the Defender CSPM plan, or Defender for Servers Plan 2 must be enabled. When you enable agentless scanning on either plan, the setting is enabled for both plans. |
Malware scanning | Malware scanning is only available when Defender for Servers Plan 2 is enabled. For malware scanning of Kubernetes node VMs, either Defender for Servers Plan 2 or the Defender for Containers plan is required. |
Supported machines | Agentless machine scanning is available for Azure VMs, AWS EC2 and GCP compute instances connected to Defender for Cloud. |
Azure VMs | Agentless scanning is available on Azure standard VMs with: - Maximum total disk size allowed: 4TB (the sum of all disks) - Maximum number of disks allowed: 6 - Virtual machine scale set - Flex Support for disks that are: - Unencrypted - Encrypted (managed disks using Azure Storage encryption with platform-managed keys (PMK)) - Encrypted with customer-managed keys (preview). |
AWS | Agentless scanning is available on EC2, Auto Scale instances, and disks that are unencrypted, encrypted (PMK), and encrypted (CMK). |
GCP | Agentless scanning is available on compute instances, instance groups (managed and unmanaged), with Google-managed encryption keys, and customer-managed encryption key (CMEK) |
Kubernetes nodes | Agentless scanning for vulnerabilities and malware in Kubernetes node VMs is available. For vulnerability assessment the Defender for Servers Plan 2, or the Defender for Containers plan, or the Defender Cloud Security Posture Management (CSPM) plan is required. For malware scanning, Defender for Servers Plan 2 or Defender for Containers is required. |
Permissions | Review the permissions used by Defender for Cloud for agentless scanning. |
Unsupported | Disk type - If any of the VM's disks are on this list, the VM won't be scanned: - UltraSSD_LRS - PremiumV2_LRS Resource type: - Databricks VM File systems: - UFS (Unix File System) - ReFS (Resilient File System) - ZFS (ZFS Member) RAID and Block storage formats: - OracleASM (Oracle Automatic Storage Management) - DRBD (Distributed Replicated Block Device) - Linux_Raid_Member Integrity mechanisms: - DM_Verity_Hash - Swap |
In Defender for Cloud, open Environment settings.
Select the relevant subscription.
For either the Defender CSPM plan, or Defender for Servers Plan 2, select Settings.
In Settings and monitoring, turn on Agentless scanning for machines.
Select Save.
For agentless scanning of Azure VMs with CMK encrypted disks, you need to grant Defender for Cloud additional permissions on Key Vaults used for CMK encryption for the VMs, to create a secure copy of the disks.
To manually assign the permissions on a Key Vault, do the following:
0c7668b5-3260-4ad0-9f53-34ed54fa19b2
) these permissions: Key Get, Key Wrap, Key Unwrap.0c7668b5-3260-4ad0-9f53-34ed54fa19b2
) the Key Vault Crypto Service Encryption User built-in role.To assign these permissions at scale for multiple Key Vaults, use this script.
In Defender for Cloud, open Environment settings.
Select the relevant account.
For either the Defender Cloud Security Posture Management (CSPM) or Defender for Servers P2 plan, select Settings.
When you enable agentless scanning on either plan, the setting applies to both plans.
In the settings pane, turn on Agentless scanning for machines.
Select Save and Next: Configure Access.
Download the CloudFormation template.
Using the downloaded CloudFormation template, create the stack in AWS as instructed on screen. If you're onboarding a management account, you need to run the CloudFormation template both as Stack and as StackSet. Connectors will be created for the member accounts up to 24 hours after the onboarding.
Select Next: Review and generate.
Select Update.
After you enable agentless scanning, software inventory and vulnerability information are updated automatically in Defender for Cloud.
In Defender for Cloud, select Environment settings.
Select the relevant project or organization.
For either the Defender Cloud Security Posture Management (CSPM) or Defender for Servers P2 plan, select Settings.
Toggle Agentless scanning to On.
Select Save and Next: Configure Access.
Copy the onboarding script.
Run the onboarding script in the GCP organization/project scope (GCP portal or gcloud CLI).
Select Next: Review and generate.
Select Update.
Learn more about:
Events
May 19, 6 PM - May 23, 12 AM
Calling all developers, creators, and AI innovators to join us in Seattle @Microsoft Build May 19-22.
Register todayTraining
Module
Enable Defender for Cloud on your Azure subscription - Training
Learn how to connect your Azure subscriptions to Microsoft Defender for Cloud, enabling enhanced security monitoring, compliance management, and the implementation of best practices for threat protection.
Certification
Microsoft Certified: Security Operations Analyst Associate - Certifications
Investigate, search for, and mitigate threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender.
Documentation
Agentless machine scanning in Microsoft Defender for Cloud - Microsoft Defender for Cloud
Learn how Defender for Cloud can gather information about multicloud machine without installing an agent.
Learn about vulnerability scanning in the Defender for Servers plan in Microsoft Defender for Cloud.
Overview of the extensions that collect data from your workloads - Microsoft Defender for Cloud
Protect your workloads with Microsoft Defender for Cloud by learning about the extensions that collect data from your workloads.