Defender for Containers support

This article summarizes support information for the Defender for Containers plan in Microsoft Defender for Cloud.

Note

Specific features are in preview. The Azure Preview Supplemental Terms include other legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.

Azure (AKS)

Feature Supported Resources Linux release state Windows release state Agentless/Agent-based Pricing Tier Azure clouds availability
Agentless discovery for Kubernetes ACR, AKS GA GA Agentless Defender for Containers or Defender CSPM Azure commercial clouds
Compliance-Docker CIS VM, Virtual Machine Scale Set GA - Log Analytics agent Defender for Servers Plan 2 Commercial clouds

National clouds: Azure Government, Microsoft Azure operated by 21Vianet
Vulnerability assessment (powered by Qualys) - registry scan OS packages ACR, Private ACR GA Preview Agentless Defender for Containers Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet
Vulnerability assessment (powered by Qualys) -registry scan language packages ACR, Private ACR Preview - Agentless Defender for Containers Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet
Vulnerability assessment (powered by Qualys) - running images AKS GA Preview Defender agent Defender for Containers Commercial clouds
Vulnerability assessment powered by MDVM - registry scan ACR, Private ACR Preview Agentless Defender for Containers Commercial clouds
Vulnerability assessment powered by MDVM - running images AKS Preview Defender agent Defender for Containers Commercial clouds
Hardening (control plane) ACR, AKS GA Preview Agentless Free Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet
Hardening (Kubernetes data plane) AKS GA - Azure Policy Free Commercial clouds

National clouds: Azure Government,Azure operated by 21Vianet
Runtime threat detection (control plane) AKS GA GA Agentless Defender for Containers Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet
Runtime threat detection (workload) AKS GA - Defender agent Defender for Containers Commercial clouds
Discovery/provisioning-Unprotected clusters AKS GA GA Agentless Free Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet
Discovery/provisioning-Collecting control plane threat data AKS GA GA Agentless Defender for Containers Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet
Discovery/provisioning-Defender agent auto provisioning AKS GA - Agentless Defender for Containers Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet
Discovery/provisioning-Azure Policy for Kubernetes auto provisioning AKS GA - Agentless Free Commercial clouds

National clouds: Azure Government, Azure operated by 21Vianet

Registries and images support for Azure - powered by Qualys

Aspect Details
Registries and images Supported
ACR registries protected with Azure Private Link (Private registries requires access to Trusted Services)
• Windows images using Windows OS version 1709 and above (Preview). This is free while it's in preview, and will incur charges (based on the Defender for Containers plan) when it becomes generally available.

Unsupported
• Super-minimalist images such as Docker scratch images
• "Distroless" images that only contain an application and its runtime dependencies without a package manager, shell, or OS
• Images with Open Container Initiative (OCI) Image Format Specification
• Providing image tag information for multi-architecture images is currently unsupported
OS Packages Supported
• Alpine Linux 3.12-3.16
• Red Hat Enterprise Linux 6, 7, 8
• CentOS 6, 7
• Oracle Linux 6, 7, 8
• Amazon Linux 1, 2
• openSUSE Leap 42, 15
• SUSE Enterprise Linux 11, 12, 15
• Debian GNU/Linux wheezy, jessie, stretch, buster, bullseye
• Ubuntu 10.10-22.04
• FreeBSD 11.1-13.1
• Fedora 32, 33, 34, 35
Language specific packages (Preview)

(Only supported for Linux images)
Supported
• Python
• Node.js
• .NET
• JAVA
• Go

Registries and images for Azure - powered by MDVM

Aspect Details
Registries and images Supported
• ACR registries
ACR registries protected with Azure Private Link (Private registries requires access to Trusted Services)
• Container images in Docker V2 format
Unsupported
• Super-minimalist images such as Docker scratch images
• "Distroless" images that only contain an application and its runtime dependencies without a package manager, shell, or OS
is currently unsupported
• Images with Open Container Initiative (OCI) image format specification
• Windows images
OS Packages Supported
• Alpine Linux 3.12-3.16
• Red Hat Enterprise Linux 6-9
• CentOS 6-9
• Oracle Linux 6-9
• Amazon Linux 1, 2
• openSUSE Leap, openSUSE Tumbleweed
• SUSE Enterprise Linux 11-15
• Debian GNU/Linux 7-12
• Ubuntu 12.04-22.04
• Fedora 31-37
• Mariner 1-2
Language specific packages

Supported
• Python
• Node.js
• .NET
• JAVA
• Go

Kubernetes distributions and configurations - Azure

Aspect Details
Kubernetes distributions and configurations Supported
Azure Kubernetes Service (AKS) with Kubernetes RBAC

Supported via Arc enabled Kubernetes 1 2
Azure Kubernetes Service hybrid
Kubernetes
AKS Engine
Azure Red Hat OpenShift

1 Any Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters should be supported, but only the specified clusters have been tested on Azure.

2 To get Microsoft Defender for Containers protection for your environments, you need to onboard Azure Arc-enabled Kubernetes and enable Defender for Containers as an Arc extension.

Note

For additional requirements for Kubernetes workload protection, see existing limitations.

Defender for Containers relies on the Defender agent for several features. The Defender agent doesn't support the ability to ingest data through Private Link. You can disable public access for ingestion, so that only machines that are configured to send traffic through Azure Monitor Private Link can send data to that workstation. You can configure a private link by navigating to your workspace > Network Isolation and setting the Virtual networks access configurations to No.

Screenshot that shows where to go to turn off data ingestion.

Allowing data ingestion to occur only through Private Link Scope on your workspace Network Isolation settings, can result in communication failures and partial converge of the Defender for Containers feature set.

Learn how to use Azure Private Link to connect networks to Azure Monitor.

AWS (EKS)

Domain Feature Supported Resources Linux release state Windows release state Agentless/Agent-based Pricing tier
Compliance Docker CIS EC2 Preview - Log Analytics agent Defender for Servers Plan 2
Vulnerability Assessment Registry scan ECR Preview - Agentless Defender for Containers
Vulnerability Assessment View vulnerabilities for running images - - - - -
Hardening Control plane recommendations - - - - -
Hardening Kubernetes data plane recommendations EKS Preview - Azure Policy for Kubernetes Defender for Containers
Runtime protection Threat detection (control plane) EKS Preview Preview Agentless Defender for Containers
Runtime protection Threat detection (workload) EKS Preview - Defender agent Defender for Containers
Discovery and provisioning Discovery of unprotected clusters EKS Preview - Agentless Free
Discovery and provisioning Collection of control plane threat data EKS Preview Preview Agentless Defender for Containers
Discovery and provisioning Auto provisioning of Defender agent - - - - -
Discovery and provisioning Auto provisioning of Azure Policy for Kubernetes - - - - -

Images support - AWS

Aspect Details
Registries and images Unsupported
• Images that have at least one layer over 2 GB
• Public repositories and manifest lists
• Images in the AWS management account aren't scanned so that we don't create resources in the management account.

Kubernetes distributions/configurations support - AWS

Aspect Details
Kubernetes distributions and configurations Supported
Amazon Elastic Kubernetes Service (EKS)

Supported via Arc enabled Kubernetes 1 2
Kubernetes

1 Any Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters should be supported, but only the specified clusters have been tested.

2 To get Microsoft Defender for Containers protection for your environments, you need to onboard Azure Arc-enabled Kubernetes and enable Defender for Containers as an Arc extension.

Note

For additional requirements for Kubernetes workload protection, see existing limitations.

Defender for Containers relies on the Defender agent for several features. The Defender agent doesn't support the ability to ingest data through Private Link. You can disable public access for ingestion, so that only machines that are configured to send traffic through Azure Monitor Private Link can send data to that workstation. You can configure a private link by navigating to your workspace > Network Isolation and setting the Virtual networks access configurations to No.

Screenshot that shows where to go to turn off data ingestion.

Allowing data ingestion to occur only through Private Link Scope on your workspace Network Isolation settings, can result in communication failures and partial converge of the Defender for Containers feature set.

Learn how to use Azure Private Link to connect networks to Azure Monitor.

Outbound proxy support

Outbound proxy without authentication and outbound proxy with basic authentication are supported. Outbound proxy that expects trusted certificates is currently not supported.

GCP (GKE)

Domain Feature Supported Resources Linux release state Windows release state Agentless/Agent-based Pricing tier
Compliance Docker CIS GCP VMs Preview - Log Analytics agent Defender for Servers Plan 2
Vulnerability Assessment Registry scan - - - - -
Vulnerability Assessment View vulnerabilities for running images - - - - -
Hardening Control plane recommendations GKE GA GA Agentless Free
Hardening Kubernetes data plane recommendations GKE Preview - Azure Policy for Kubernetes Defender for Containers
Runtime protection Threat detection (control plane) GKE Preview Preview Agentless Defender for Containers
Runtime protection Threat detection (workload) GKE Preview - Defender agent Defender for Containers
Discovery and provisioning Discovery of unprotected clusters GKE Preview - Agentless Free
Discovery and provisioning Collection of control plane threat data GKE Preview Preview Agentless Defender for Containers
Discovery and provisioning Auto provisioning of Defender agent GKE Preview - Agentless Defender for Containers
Discovery and provisioning Auto provisioning of Azure Policy for Kubernetes GKE Preview - Agentless Defender for Containers

Kubernetes distributions/configurations support - GCP

Aspect Details
Kubernetes distributions and configurations Supported
Google Kubernetes Engine (GKE) Standard

Supported via Arc enabled Kubernetes 1 2
Kubernetes

Unsupported
• Private network clusters
• GKE autopilot
• GKE AuthorizedNetworksConfig

1 Any Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters should be supported, but only the specified clusters have been tested.

2 To get Microsoft Defender for Containers protection for your environments, you need to onboard Azure Arc-enabled Kubernetes and enable Defender for Containers as an Arc extension.

Note

For additional requirements for Kubernetes workload protection, see existing limitations.

Defender for Containers relies on the Defender agent for several features. The Defender agent doesn't support the ability to ingest data through Private Link. You can disable public access for ingestion, so that only machines that are configured to send traffic through Azure Monitor Private Link can send data to that workstation. You can configure a private link by navigating to your workspace > Network Isolation and setting the Virtual networks access configurations to No.

Screenshot that shows where to go to turn off data ingestion.

Allowing data ingestion to occur only through Private Link Scope on your workspace Network Isolation settings, can result in communication failures and partial converge of the Defender for Containers feature set.

Learn how to use Azure Private Link to connect networks to Azure Monitor.

Outbound proxy support

Outbound proxy without authentication and outbound proxy with basic authentication are supported. Outbound proxy that expects trusted certificates is currently not supported.

On-premises, Arc-enabled Kubernetes clusters

Domain Feature Supported Resources Linux release state Windows release state Agentless/Agent-based Pricing tier
Compliance Docker CIS Arc enabled VMs Preview - Log Analytics agent Defender for Servers Plan 2
Vulnerability Assessment Registry scan - OS packages ACR, Private ACR GA Preview Agentless Defender for Containers
Vulnerability Assessment Registry scan - language specific packages ACR, Private ACR Preview - Agentless Defender for Containers
Vulnerability Assessment View vulnerabilities for running images - - - - -
Hardening Control plane recommendations - - - - -
Hardening Kubernetes data plane recommendations Arc enabled K8s clusters Preview - Azure Policy for Kubernetes Defender for Containers
Runtime protection Threat detection (control plane) Arc enabled K8s clusters Preview Preview Defender agent Defender for Containers
Runtime protection for supported OS Threat detection (workload) Arc enabled K8s clusters Preview - Defender agent Defender for Containers
Discovery and provisioning Discovery of unprotected clusters Arc enabled K8s clusters Preview - Agentless Free
Discovery and provisioning Collection of control plane threat data Arc enabled K8s clusters Preview Preview Defender agent Defender for Containers
Discovery and provisioning Auto provisioning of Defender agent Arc enabled K8s clusters Preview Preview Agentless Defender for Containers
Discovery and provisioning Auto provisioning of Azure Policy for Kubernetes Arc enabled K8s clusters Preview - Agentless Defender for Containers

Registries and images support - on-premises

Aspect Details
Registries and images Supported
ACR registries protected with Azure Private Link (Private registries requires access to Trusted Services)
• Windows images using Windows OS version 1709 and above (Preview). This is free while it's in preview, and will incur charges (based on the Defender for Containers plan) when it becomes generally available.

Unsupported
• Super-minimalist images such as Docker scratch images
• "Distroless" images that only contain an application and its runtime dependencies without a package manager, shell, or OS
• Images with Open Container Initiative (OCI) Image Format Specification
• Providing image tag information for multi-architecture images is currently unsupported
OS Packages Supported
• Alpine Linux 3.12-3.15
• Red Hat Enterprise Linux 6, 7, 8
• CentOS 6, 7
• Oracle Linux 6, 7, 8
• Amazon Linux 1, 2
• openSUSE Leap 42, 15
• SUSE Enterprise Linux 11, 12, 15
• Debian GNU/Linux wheezy, jessie, stretch, buster, bullseye
• Ubuntu 10.10-22.04
• FreeBSD 11.1-13.1
• Fedora 32, 33, 34, 35
Language specific packages (Preview)

(Only supported for Linux images)
Supported
• Python
• Node.js
• .NET
• JAVA
• Go

Kubernetes distributions and configurations

Aspect Details
Kubernetes distributions and configurations Supported via Arc enabled Kubernetes 1 2
Azure Kubernetes Service hybrid
Kubernetes
AKS Engine
Azure Red Hat OpenShift
Red Hat OpenShift (version 4.6 or newer)
VMware Tanzu Kubernetes Grid
Rancher Kubernetes Engine

1 Any Cloud Native Computing Foundation (CNCF) certified Kubernetes clusters should be supported, but only the specified clusters have been tested.

2 To get Microsoft Defender for Containers protection for your environments, you need to onboard Azure Arc-enabled Kubernetes and enable Defender for Containers as an Arc extension.

Note

For additional requirements for Kubernetes workload protection, see existing limitations.

Supported host operating systems

Defender for Containers relies on the Defender agent for several features. The Defender agent is supported on the following host operating systems:

  • Amazon Linux 2
  • CentOS 8
  • Debian 10
  • Debian 11
  • Google Container-Optimized OS
  • Mariner 1.0
  • Mariner 2.0
  • Red Hat Enterprise Linux 8
  • Ubuntu 16.04
  • Ubuntu 18.04
  • Ubuntu 20.04
  • Ubuntu 22.04

Ensure your Kubernetes node is running on one of the verified supported operating systems. Clusters with different host operating systems, only get partial coverage.

Defender agent limitations

The Defender agent is currently not supported on ARM64 nodes.

Network restrictions

Defender for Containers relies on the Defender agent for several features. The Defender agent doesn't support the ability to ingest data through Private Link. You can disable public access for ingestion, so that only machines that are configured to send traffic through Azure Monitor Private Link can send data to that workstation. You can configure a private link by navigating to your workspace > Network Isolation and setting the Virtual networks access configurations to No.

Screenshot that shows where to go to turn off data ingestion.

Allowing data ingestion to occur only through Private Link Scope on your workspace Network Isolation settings, can result in communication failures and partial converge of the Defender for Containers feature set.

Learn how to use Azure Private Link to connect networks to Azure Monitor.

Outbound proxy support

Outbound proxy without authentication and outbound proxy with basic authentication are supported. Outbound proxy that expects trusted certificates is currently not supported.

Next steps