%3CLINGO-SUB%20id%3D%22lingo-sub-1640691%22%20slang%3D%22en-US%22%3EContinuously%20export%20security%20findings%20from%20vulnerability%20assessment%20solution%20recommendations%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1640691%22%20slang%3D%22en-US%22%3E%3CP%3EAzure%20Security%20Center%20offers%20vulnerability%20assessment%20solutions%20for%20various%20resource%20types%20(e.g.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fdeploy-vulnerability-assessment-vm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EVirtual%20Machines%3C%2FA%3E%2C%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecurity-center-iaas-advanced-data%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ESQL%20servers%20and%20databases%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fazure-container-registry-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EContainer%20Registries%3C%2FA%3E).%20Vulnerability%20assessment%20solutions%20scan%20your%20resources%20periodically%20and%20help%20you%20monitor%20and%20remediate%20health%20issues%20on%20your%20resources.%20Security%20Center%20provides%20security%20recommendations%20that%20include%20all%20found%20vulnerabilities%2C%20along%20with%20remediation%20steps%2C%20and%20are%20updated%20with%20each%20scan%20when%20any%20new%20vulnerability%20is%20found.%20Each%20vulnerability%20is%20a%20security%20finding%2C%20and%20all%20security%20findings%20are%20available%20in%20the%20Security%20Center%20Portal%20under%20the%20related%20recommendation.%3C%2FP%3E%0A%3CP%3EUsing%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fcontinuous-export%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Econtinuous%20export%3C%2FA%3E%20you%20can%20export%20these%20security%20findings%20in%20real-time%20(with%20every%20periodic%20scan%20of%20your%20resources)%20to%20Event%20Hub%20or%20Log%20Analytics%20workspace%2C%20for%20further%20analysis%20or%20integration%20with%20external%20workflows.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EImplementation%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ETo%20enable%20continuous%20export%20for%20security%20findings%2C%20follow%20the%20steps%20below%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EIn%20the%20Azure%20Portal%20go%20to%20%E2%80%98Security%20Center%E2%80%99.%3C%2FLI%3E%0A%3CLI%3EClick%20on%20%3CSTRONG%3EPricing%20%26amp%3B%20settings%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3ESelect%20the%20desired%20subscription.%3C%2FLI%3E%0A%3CLI%3EClick%20on%20%3CSTRONG%3EContinuous%20export%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3EEnable%20%3CEM%3Eexport%20of%20security%20recommendations%3C%2FEM%3E.%20Make%20sure%20that%20the%20recommendations%20you%20would%20like%20to%20export%20security%20findings%20for%20are%20selected%20in%20the%20recommendations%20drop%20down%20menu.%3C%2FLI%3E%0A%3CLI%3EChoose%20the%20%3CEM%3EResource%20Group%3C%2FEM%3E%20in%20which%20the%20automation%20resource%20will%20be%20created.%3C%2FLI%3E%0A%3CLI%3EFill%20in%20the%20details%20of%20your%20export%20destination%20(Event%20Hub%2FLog%20Analytics%20workspace).%3C%2FLI%3E%0A%3CLI%3EClick%20on%20the%20%3CEM%3EInclude%20security%20findings%3C%2FEM%3E%20toggle%20to%20enable%20export%20of%20the%20security%20findings.%3C%2FLI%3E%0A%3CLI%3EClick%20%3CSTRONG%3ESave%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22OrSerokJeppa_0-1599469112809.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F216860i666B3881CF24855D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22OrSerokJeppa_0-1599469112809.png%22%20alt%3D%22OrSerokJeppa_0-1599469112809.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20note%20that%20to%20receive%20security%20findings%20on%20your%20resources%2C%20you%20should%20first%20install%20the%20vulnerability%20assessment%20solution%20on%20the%20relevant%20resources.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EData%20schemas%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EFor%20export%20to%20Event%20Hub%2C%20the%20data%20schema%20is%20in%20line%20with%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Frest%2Fapi%2Fsecuritycenter%2Fsubassessments%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ESub%20Assessments%20API%3C%2FA%3E.%20When%20exporting%20the%20data%20to%20Log%20Analytics%20workspace%20the%20data%20will%20be%20exported%20to%20%3CEM%3ESecurityNestedRecommendation%3C%2FEM%3E%20table%2C%20in%20the%20following%20schema%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22OrSerokJeppa_1-1599469112814.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F216858i1705B48710C76912%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22OrSerokJeppa_1-1599469112814.png%22%20alt%3D%22OrSerokJeppa_1-1599469112814.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPlease%20note%20that%20the%20data%20is%20exported%20as%20one%20line%20per%20vulnerability%20per%20resource.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECommon%20queries%20for%20Log%20Analytics%20workspace%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWhen%20consuming%20security%20findings%20data%20through%20Log%20Analytics%20workspace%2C%20you%20might%20like%20to%20further%20analyze%20the%20data.%20Below%20are%20common%20queries%20for%20different%20vulnerability%20assessment%20solutions%2C%20follow%20the%20steps%20below%20to%20use%20them%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EIn%20Azure%20Portal%2C%20navigate%20to%20the%20Log%20Analytics%20workspace%20to%20which%20you%20enabled%20continuous%20export.%3C%2FLI%3E%0A%3CLI%3EClick%20on%20%3CSTRONG%3ELogs%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3ECopy%20and%20paste%20a%20query%20from%20the%20samples%20described%20below.%3C%2FLI%3E%0A%3CLI%3ESet%20the%20desired%20%3CSTRONG%3ETime%20range%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3EClick%20%3CSTRONG%3ERun%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CU%3ESample%20queries%3C%2FU%3E%3C%2FP%3E%0A%3CP%3EJoin%20security%20findings%20with%20security%20recommendations%20table%3A%3C%2FP%3E%0A%3CP%3ESecurityNestedRecommendation%3C%2FP%3E%0A%3CP%3E%7C%20extend%20RecommendationId%3DParentRecommendationId%2C%20SubscriptionId%3DRecommendationSubscriptionId%3C%2FP%3E%0A%3CP%3E%7C%20join%20kind%3Dinner%20(%3C%2FP%3E%0A%3CP%3ESecurityRecommendation%3C%2FP%3E%0A%3CP%3E%7C%20extend%20SubscriptionId%3D%20extract(%40%22%2Fsubscriptions%2F(.%2B)%2FresourceGroup%22%2C1%2CAssessedResourceId))%3C%2FP%3E%0A%3CP%3Eon%20SubscriptionId%2C%20RecommendationId%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExtract%20server%20name%20and%20database%20name%20for%20SQL%20recommendation%3CEM%3E%20Vulnerability%20Assessment%20findings%20on%20your%20SQL%20databases%20should%20be%20remediated%3C%2FEM%3E%3A%3C%2FP%3E%0A%3CP%3ESecurityNestedRecommendation%3C%2FP%3E%0A%3CP%3E%7C%20where%20ParentRecommendationId%20%3D%3D%20%2282e20e14-edc5-4373-bfc4-f13121257c37%22%20%2F%2FVulnerability%20Assessment%20findings%20on%20your%20SQL%20databases%20should%20be%20remediated%3C%2FP%3E%0A%3CP%3E%7C%20extend%20ServerName%20%3D%20extract(%40%22%2Fservers%2F(.%2B)%2Fdatabases%22%2C%201%2C%20AssessedResourceId)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20DatabaseName%20%3D%20extract(%40%22(.%2B)%2F(.%2B)%22%2C%202%2C%20AssessedResourceId)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExtract%20computer%20name%20for%20VM%20recommendation%20%3CEM%3EVulnerabilities%20in%20your%20virtual%20machines%20should%20be%20remediated%3C%2FEM%3E%3A%3C%2FP%3E%0A%3CP%3ESecurityNestedRecommendation%3C%2FP%3E%0A%3CP%3E%7C%20where%20ParentRecommendationId%20%3D%3D%20%221195afff-c881-495e-9bc5-1486211ae03f%22%20%2F%2FVulnerabilities%20in%20your%20virtual%20machines%20should%20be%20remediated%3C%2FP%3E%0A%3CP%3E%7C%20extend%20VMName%20%3D%20extract(%40%22(.%2B)%2F(.%2B)%22%2C%202%2C%20AssessedResourceId)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EExtract%20registry%20resource%20Id%2C%20repository%20and%20image%20digest%20for%20Containers%20recommendation%20%3CEM%3EVulnerabilities%20in%20Azure%20Container%20Registry%20images%20should%20be%20remediated%20(powered%20by%20Qualys)%3C%2FEM%3E%3A%3C%2FP%3E%0A%3CP%3ESecurityNestedRecommendation%3C%2FP%3E%0A%3CP%3E%7C%20where%20ParentRecommendationId%20%3D%3D%20%22dbd0cb49-b563-45e7-9724-889e799fa648%22%2F%2FVulnerabilities%20in%20Azure%20Container%20Registry%20images%20should%20be%20remediated%20(powered%20by%20Qualys)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20RegistryResourceId%20%3D%20extract(%40%22%2Fregistries%2F(.%2B)%2Frepositories%22%2C%201%2C%20AssessedResourceId)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20Repository%20%3D%20tostring(AdditionalData.RepositoryName)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20ImageDigest%20%3D%20tostring(AdditionalData.ImageDigest)%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EContainer%20Registry%20image%20vulnerability%20assessment%20results%20per%20scan%2C%26nbsp%3Bfor%20Containers%20recommendation%20%3CEM%3EVulnerabilities%20in%20Azure%20Container%20Registry%20images%20should%20be%20remediated%20(powered%20by%20Qualys)%3C%2FEM%3E%3A%3C%2FP%3E%0A%3CP%3ESecurityNestedRecommendation%3C%2FP%3E%0A%3CP%3E%7C%20where%20ParentRecommendationId%20%3D%3D%20%22dbd0cb49-b563-45e7-9724-889e799fa648%22%2F%2FVulnerabilities%20in%20Azure%20Container%20Registry%20images%20should%20be%20remediated%20(powered%20by%20Qualys)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20RegistryResourceId%20%3D%20extract(%40%22%2Fregistries%2F(.%2B)%2Frepositories%22%2C%201%2C%20AssessedResourceId)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20Repository%20%3D%20tostring(AdditionalData.RepositoryName)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20ImageDigest%20%3D%20tostring(AdditionalData.ImageDigest)%3C%2FP%3E%0A%3CP%3E%7C%20extend%20ScanStatus%20%3D%20RecommendationState%3C%2FP%3E%0A%3CP%3E%7C%20extend%20ScanTime%20%3D%20TimeGenerated%3C%2FP%3E%0A%3CP%3E%7C%20summarize%20scanFindingSeverityCount%20%3D%20count()%20by%20RecommendationSeverity%2C%20RegistryResourceId%2C%20Repository%2C%20ImageDigest%2C%20ScanStatus%2C%20ScanTime%3C%2FP%3E%0A%3CP%3E%7C%20summarize%20severitySummary%20%3D%20make_bag(pack(RecommendationSeverity%2C%20scanFindingSeverityCount))%20by%20RegistryResourceId%2C%20Repository%2C%20ImageDigest%2C%20ScanStatus%2C%20ScanTime%3C%2FP%3E%0A%3CP%3E%7C%20order%20by%20RegistryResourceId%2C%20Repository%2C%20ImageDigest%2CScanTime%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EExport%20to%20CSV%20file%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYou%20might%20like%20to%20export%20the%20results%20to%20CSV%20file%20for%20further%20analysis%20and%20tracking.%20Follow%20the%20steps%20below%20to%20do%20that%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EClick%20on%20%3CSTRONG%3EExport%3C%2FSTRONG%3E.%3C%2FLI%3E%0A%3CLI%3EChoose%20the%20appropriate%20export%20type.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22OrSerokJeppa_2-1599469112819.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F216859i8777C670CAC6B85C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22OrSerokJeppa_2-1599469112819.png%22%20alt%3D%22OrSerokJeppa_2-1599469112819.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%20about%20Continuous%20Export%2C%20make%20sure%20to%20watch%20%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2FFgzcoSsCspo%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEpisode%205%20of%20Azure%20Security%20Center%3C%2FA%3E%20in%20the%20Field%20where%20we%20give%20more%20insights%20on%20this%20feature.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EReviewers%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYuri%20Diogenes%2C%20Principal%20Program%20Manager%20(%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F124214%22%20target%3D%22_blank%22%3E%40Yuri%20Diogenes%3C%2FA%3E)%3C%2FP%3E%0A%3CP%3ESulaiman%20Abu%20Rashed%2C%20Software%20Engineer%3C%2FP%3E%0A%3CP%3EMiri%20Kreitenberger%2C%20Senior%20Software%20Engineer%20Manager%3C%2FP%3E%0A%3CP%3EMeital%20Taran-%20Gutman%2C%20Principal%20PM%20Manager%20(%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F73750%22%20target%3D%22_blank%22%3E%40Meital%20Taran-%20Gutman%3C%2FA%3E)%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESpecial%20Thanks%3C%2FSTRONG%3E%20to%20Maya%20Herskovic%2C%20Senior%20Program%20Manager%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1640691%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22Default%22%20style%3D%22margin-bottom%3A%208.0pt%3B%20line-height%3A%20115%25%3B%22%20data-unlink%3D%22true%22%3E%3CSPAN%20style%3D%22font-size%3A%2010.5pt%3B%20line-height%3A%20115%25%3B%22%3ELearn%20how%20to%20use%20C%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%2010.5pt%3B%20line-height%3A%20115%25%3B%22%3Eontinuous%20Export%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%2010.5pt%3B%20line-height%3A%20115%25%3B%22%3E%26nbsp%3Bto%20export%20security%20findings%20from%20vulnerability%20assessment%20solutions%20in%20real-time%20to%20Event%20Hub%20or%20Log%20Analytics%20workspace%2C%20for%20further%20analysis%20or%20integration%20with%20external%20workflows.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

Azure Security Center offers vulnerability assessment solutions for various resource types (e.g. Virtual Machines, SQL servers and databases and Container Registries). Vulnerability assessment solutions scan your resources periodically and help you monitor and remediate health issues on your resources. Security Center provides security recommendations that include all found vulnerabilities, along with remediation steps, and are updated with each scan when any new vulnerability is found. Each vulnerability is a security finding, and all security findings are available in the Security Center Portal under the related recommendation.

Using continuous export you can export these security findings in real-time (with every periodic scan of your resources) to Event Hub or Log Analytics workspace, for further analysis or integration with external workflows.

 

Implementation

To enable continuous export for security findings, follow the steps below:

 

  1. In the Azure Portal go to ‘Security Center’.
  2. Click on Pricing & settings.
  3. Select the desired subscription.
  4. Click on Continuous export.
  5. Enable export of security recommendations. Make sure that the recommendations you would like to export security findings for are selected in the recommendations drop down menu.
  6. Choose the Resource Group in which the automation resource will be created.
  7. Fill in the details of your export destination (Event Hub/Log Analytics workspace).
  8. Click on the Include security findings toggle to enable export of the security findings.
  9. Click Save.

OrSerokJeppa_0-1599469112809.png

 

Please note that to receive security findings on your resources, you should first install the vulnerability assessment solution on the relevant resources.

 

Data schemas

For export to Event Hub, the data schema is in line with the Sub Assessments API. When exporting the data to Log Analytics workspace the data will be exported to SecurityNestedRecommendation table, in the following schema:

OrSerokJeppa_1-1599469112814.png

 

Please note that the data is exported as one line per vulnerability per resource.

 

Common queries for Log Analytics workspace

When consuming security findings data through Log Analytics workspace, you might like to further analyze the data. Below are common queries for different vulnerability assessment solutions, follow the steps below to use them:

  1. In Azure Portal, navigate to the Log Analytics workspace to which you enabled continuous export.
  2. Click on Logs.
  3. Copy and paste a query from the samples described below.
  4. Set the desired Time range.
  5. Click Run.

Sample queries

Join security findings with security recommendations table:

SecurityNestedRecommendation

| extend RecommendationId=ParentRecommendationId, SubscriptionId=RecommendationSubscriptionId

| join kind=inner (

SecurityRecommendation

| extend SubscriptionId= extract(@"/subscriptions/(.+)/resourceGroup",1,AssessedResourceId))

on SubscriptionId, RecommendationId

 

Extract server name and database name for SQL recommendation Vulnerability Assessment findings on your SQL databases should be remediated:

SecurityNestedRecommendation

| where ParentRecommendationId == "82e20e14-edc5-4373-bfc4-f13121257c37" //Vulnerability Assessment findings on your SQL databases should be remediated

| extend ServerName = extract(@"/servers/(.+)/databases", 1, AssessedResourceId)

| extend DatabaseName = extract(@"(.+)/(.+)", 2, AssessedResourceId)

 

Extract computer name for VM recommendation Vulnerabilities in your virtual machines should be remediated:

SecurityNestedRecommendation

| where ParentRecommendationId == "1195afff-c881-495e-9bc5-1486211ae03f" //Vulnerabilities in your virtual machines should be remediated

| extend VMName = extract(@"(.+)/(.+)", 2, AssessedResourceId)

 

Extract registry resource Id, repository and image digest for Containers recommendation Vulnerabilities in Azure Container Registry images should be remediated (powered by Qualys):

SecurityNestedRecommendation

| where ParentRecommendationId == "dbd0cb49-b563-45e7-9724-889e799fa648"//Vulnerabilities in Azure Container Registry images should be remediated (powered by Qualys)

| extend RegistryResourceId = extract(@"/registries/(.+)/repositories", 1, AssessedResourceId)

| extend Repository = tostring(AdditionalData.RepositoryName)

| extend ImageDigest = tostring(AdditionalData.ImageDigest)

 

Container Registry image vulnerability assessment results per scan, for Containers recommendation Vulnerabilities in Azure Container Registry images should be remediated (powered by Qualys):

SecurityNestedRecommendation

| where ParentRecommendationId == "dbd0cb49-b563-45e7-9724-889e799fa648"//Vulnerabilities in Azure Container Registry images should be remediated (powered by Qualys)

| extend RegistryResourceId = extract(@"/registries/(.+)/repositories", 1, AssessedResourceId)

| extend Repository = tostring(AdditionalData.RepositoryName)

| extend ImageDigest = tostring(AdditionalData.ImageDigest)

| extend ScanStatus = RecommendationState

| extend ScanTime = TimeGenerated

| summarize scanFindingSeverityCount = count() by RecommendationSeverity, RegistryResourceId, Repository, ImageDigest, ScanStatus, ScanTime

| summarize severitySummary = make_bag(pack(RecommendationSeverity, scanFindingSeverityCount)) by RegistryResourceId, Repository, ImageDigest, ScanStatus, ScanTime

| order by RegistryResourceId, Repository, ImageDigest,ScanTime

 

Export to CSV file

You might like to export the results to CSV file for further analysis and tracking. Follow the steps below to do that:

  1. Click on Export.
  2. Choose the appropriate export type.

OrSerokJeppa_2-1599469112819.png

 

To learn more about Continuous Export, make sure to watch Episode 5 of Azure Security Center in the Field where we give more insights on this feature.

 

Reviewers

Yuri Diogenes, Principal Program Manager (@Yuri Diogenes)

Sulaiman Abu Rashed, Software Engineer

Miri Kreitenberger, Senior Software Engineer Manager

Meital Taran- Gutman, Principal PM Manager (@Meital Taran- Gutman)

 

Special Thanks to Maya Herskovic, Senior Program Manager