Edit

Share via


What's new in Defender for Cloud features

This article summarizes what's new in Microsoft Defender for Cloud. It includes information about new features in preview or in general availability (GA), feature updates, upcoming feature plans, and deprecated functionality.

  • This page is updated frequently with the latest updates in Defender for Cloud.

  • Find the latest information about security recommendations and alerts in What's new in recommendations and alerts.

  • If you're looking for items older than six months, you can find them in the What's new archive.

Tip

Get notified when this page is updated by copying and pasting the following URL into your feed reader:

https://aka.ms/mdc/rss

July 2025

Date Category Update
July 3, 2025 GA Scanning support for Chainguard container images and Wolfi

Scanning support for Chainguard container images and Wolfi

July 3, 2025

Microsoft Defender for Cloud's vulnerability scanner, powered by Microsoft Defender Vulnerability Management, is extending its scanning coverage to Chainguard container images, and identify vulnerabilities in Chainguard Images and Wolfi to validate that they're shipping the most secure builds possible. As additional image types are being scanned, your bill might increase. For all supported distributions, see Registries and images support for vulnerability assessment.

June 2025

Date Category Update
June 30 Preview Defender for container DNS detections based on Helm (Preview)
June 25 Preview Optional index tags for storing malware scanning results (Preview)
June 25 Preview API discovery and security posture for APIs hosted in Function Apps and Logic Apps (Preview)
June 25 Preview Agentless File Integrity Monitoring (Preview)
June 18 Preview Agentless code scanning – GitHub support and customizable coverage now available (Preview)

Defender for container DNS detections based on Helm (Preview)

What's included:

For more information see: Sensor for Defender for Containers Changelog.

Optional index tags for storing malware scanning results (Preview)

June 25, 2025

Defender for Storage malware scanning introduces optional index tags for both on-upload and on-demand scans. With this new capability, users can choose whether to publish results to blob’s index tags when a blob is scanned (default) or to not use index tags. Index tags can be enabled or disabled at the subscription and storage account level through the Azure portal or via API.

API discovery and security posture for APIs hosted in Function Apps and Logic Apps (Preview)

June 25, 2025

Defender for Cloud now extends its API discovery and security posture capabilities to include APIs hosted in Azure Function Apps and Logic Apps, in addition to its existing support for APIs published in Azure API Management.

This enhancement empowers security teams with a comprehensive and continuously updated view of their organization’s API attack surface. Key capabilities include:

  • Centralized API Inventory: Automatically discover and catalog APIs across supported Azure services.
  • Security Risk Assessments: Identify and prioritize risks, including identification of dormant APIs that may warrant removal, as well as unencrypted APIs that could expose sensitive data.

These capabilities are automatically available to all Defender for Cloud Security Posture Management (DCSPM) customers who have enabled the API Security Posture Management extension.

Rollout Timeline: The rollout of these updates will begin on June 25, 2025, and is expected to reach all supported regions within one week.

Agentless File Integrity Monitoring (Preview)

June 25, 2025

Agentless File Integrity Monitoring (FIM) is now available in preview. This capability complements the generally available (GA) FIM solution based on the Microsoft Defender for Endpoint agent, and introduces support for custom file and registry monitoring.

Agentless FIM enables organizations to monitor file and registry changes across their environment without deploying other agents. It provides a lightweight, scalable alternative while maintaining compatibility with the existing agent-based solution.

Key capabilities include:

  • Custom monitoring: Meet specific compliance and security requirements by defining and monitoring custom file paths and registry keys.
  • Unified experience: Events from both agentless and MDE-based FIM are stored in the same workspace table, with clear source indicators.

Learn more about File integrity monitoring and how to Enable file integrity monitoring.

Agentless code scanning – GitHub support and customizable coverage now available (Preview)

June 18, 2025

We have updated the agentless code scanning feature to include key capabilities that extend both coverage and control. These updates include:

  • Support for GitHub repositories, in addition to Azure DevOps
  • Customizable scanner selection – select which tools (e.g., Bandit, Checkov, ESLint) to run
  • Granular scope configuration – include or exclude specific organizations, projects, or repositories

Agentless code scanning provides scalable security scanning for code and infrastructure-as-code (IaC) without requiring changes to CI/CD pipelines. It helps security teams detect vulnerabilities and misconfigurations without interrupting developer workflows.

Learn more about configuring agentless code scanning in Azure DevOps or GitHub.

May 2025

Date Category Update
May 28 GA General Availability for Customizable on-upload malware scanning filters in Defender for Storage
May 5 Preview Active User (Public Preview)
May 1 GA General Availability for Defender for AI Services
May 1 GA Microsoft Security Copilot is now Generally Available in Defender for Cloud
May 1 GA General Availability Data and AI security dashboard
May 1 Upcoming change Defender CSPM starts billing for Azure Database for MySQL Flexible Server and Azure Database for PostgreSQL Flexible Server resources

General Availability for Customizable on-upload malware scanning filters in Defender for Storage

May 28, 2025

On-upload malware scanning now supports customizable filters. Users can set exclusion rules for on-upload malware scans based on blob path prefixes, suffixes and by blob size. By excluding specific blob paths and types, such as logs or temporary files, you can avoid unnecessary scans and reduce costs.

Learn how to configure customizable on-upload malware scanning filters.

Active User (Public Preview)

The Active User feature assists security administrators quickly identify and assign recommendations to the most relevant users based on recent control plane activity. For each recommendation, up to three potential active users are suggested at the resource, resource group, or subscription level. Administrators can select a user from the list, assign the recommendation, and set a due date—triggering a notification to the assigned user. This streamlines remediation workflows, reduces investigation time, and strengthens overall security posture.

General Availability for Defender for AI Services

May 1, 2025

Defender for Cloud now supports runtime protection for Azure AI services (previously called threat protection for AI workloads).

Protection for Azure AI services covers threats specific to AI services and applications, such as jailbreak, wallet abuse, data exposure, suspicious access patterns, and more. The detections use signals from Microsoft Threat Intelligence and Azure AI Prompt Shields, and apply machine learning and AI to secure your AI services.

Learn more about Defender for AI Services.

Microsoft Security Copilot is now Generally Available in Defender for Cloud

May 1, 2025

Microsoft Security Copilot is now generally available in Defender for Cloud.

Security Copilot speeds up risk remediation for security teams, making it faster and easier for administrators to address cloud risks. It provides AI-generated summaries, remediation actions, and delegation emails, guiding users through each step of the risk reduction process.

Security administrators can quickly summarize recommendations, generate remediation scripts, and delegate tasks via email to resource owners. These capabilities reduce investigation time, help security teams understand risks in context, and identify resources for quick remediation.

Learn more about Microsoft Security Copilot in Defender for Cloud.

General Availability Data and AI security dashboard

May 1, 2025

Defender for Cloud is enhancing the Data security dashboard to include AI Security with the new Data and AI security dashboard in GA. The dashboard provides a centralized platform to monitor and manage data and AI resources, along with their associated risks and protection status.

Key benefits of the Data and AI security dashboard include:

  • Unified view: Gain a comprehensive view of all organizational data and AI resources.
  • Data insights: Understand where your data is stored and the types of resources holding it.
  • Protection coverage: Assess the protection coverage of your data and AI resources.
  • Critical issues: Highlight resources that require immediate attention based on high-severity recommendations, alerts, and attack paths.
  • Sensitive data discovery: Locate and summarize sensitive data resources in your cloud and AI assets.
  • AI workloads: Discover AI application footprints, including services, containers, data sets, and models.

Learn more about the Data and AI security dashboard.

Defender CSPM starts billing for Azure Database for MySQL Flexible Server and Azure Database for PostgreSQL Flexible Server resources

May 1, 2025

Estimated date for change: June 2025

Beginning June 1, 2025, Microsoft Defender CSPM will start billing for Azure Database for MySQL Flexible Server and Azure Database for PostgreSQL Flexible Server resources in your subscription where Defender CSPM is enabled. These resources are already protected by Defender CSPM and no user action is required. After billing starts, your bill might increase.

For more information, see CSPM plan pricing

April 2025

Date Category Update
April 29 Preview AI Posture Management in GCP Vertex AI (Preview)
April 29 Preview Defender for Cloud integration with Mend.io (Preview)
April 29 Change Updated GitHub Application Permissions
April 28 Change Update to Defender for SQL servers on Machines plan
April 27 GA New default cap for on-upload malware scanning in Microsoft Defender for Storage
April 24 GA General Availability of API Security Posture Management native integration within Defender CSPM Plan
April 7 Upcoming Change Enhancements for Defender for app service alerts

AI Posture Management in GCP Vertex AI (Preview)

April 29, 2025

Defender for Cloud's AI security posture management features now support AI workloads in Google Cloud Platform (GCP) Vertex AI (Preview).

Key features for this release include:

  • Modern AI application Discovery: Automatically discover and catalog AI application components, data, and AI artifacts deployed in GCP Vertex AI.
  • Security Posture Strengthening: Detect misconfigurations and receive built-in recommendations and remediation actions to enhance the security posture of your AI applications.
  • Attack Path Analysis: Identify and remediate risks using advanced attack path analysis to protect your AI workloads from potential threats.

These features are designed to provide comprehensive visibility, misconfiguration detection, and hardening for AI resources, ensuring a reduction of risks for AI workloads developed on the GCP Vertex AI platform.

Learn more about AI security posture management.

Defender for Cloud integration with Mend.io (Preview)

April 29, 2025

Defender for Cloud is now integrated with Mend.io in preview. This integration enhances software application security by identifying and mitigating vulnerabilities in partner dependencies. This integration streamlines discovery and remediation processes, improving overall security.

Learn more about the Mend.io integration.

GitHub Application Permissions Update

April 29, 2025

GitHub connectors in Defender for Cloud will be updated to include administrator permissions for [Custom Properties]. This permission is used to provide new contextualization capabilities and is scoped to managing the custom properties schema. Permissions can be granted in two different ways:

  1. In your GitHub organization, navigate to the Microsoft Security DevOps applications within Settings > GitHub Apps and accept the permissions request.

  2. In an automated email from GitHub Support, select Review permission request to accept or reject this change.

Note: Existing connectors continue to work without the new functionality if the above action isn't taken.

Update to Defender for SQL servers on Machines plan

April 28, 2025

The Defender for SQL Server on machines plan in Microsoft Defender for Cloud protects SQL Server instances hosted on Azure, AWS, GCP, and on-premises machines.

Starting today, we're gradually releasing an enhanced agent solution for the plan. The agent-based solution eliminates the need to deploy the Azure Monitor Agent (AMA) and instead uses the existing SQL infrastructure. The solution is designed to make the onboarding processes easier and improve protection coverage.

Required customer actions

  1. Update Defender for SQL Servers on Machines plan configuration: Customers who enabled Defender for SQL Server on machines plan before today are required to follow these instructions to update their configuration, following the enhanced agent release.

  2. Verify SQL Server instances protection status: With an estimated starting date of May 2025, customers must verify the protection status of their SQL Server instances across their environments. Learn how to troubleshoot any deployment issues Defender for SQL on machines configuration.

Note

After the agent upgrade occurs, you might experience a billing increase if additional SQL Server instances are protected with your enabled Defender for SQL Servers on Machines plan. For billing information, review the Defender for Cloud pricing page.

New default cap for on-upload malware scanning in Microsoft Defender for Storage

April 27, 2025

The default cap value for on-upload malware scanning has been updated from 5,000 GB to 10,000 GB. This new cap applies to the following scenarios:

  • New Subscriptions: Subscriptions where Defender for Storage is enabled for the first time.

  • Re-enabled Subscriptions: Subscriptions where Defender for Storage was previously disabled and is now re-enabled.

When Defender for Storage Malware Scanning is enabled for these subscriptions, the default cap for on-upload malware scanning will be set to 10,000GB. This cap is adjustable to meet your specific needs.

For more detailed information, please refer to the section on Malware scanning - billing per GB, monthly capping, and configuration

General Availability of API Security Posture Management native integration within Defender CSPM Plan

April 24, 2025

API Security Posture Management is now generally available as part of the Defender CSPM plan. This release introduces a unified inventory of your APIs along with posture insights, helping you identify and prioritize API risks more effectively directly from your Defender CSPM plan. You can enable this capability through the Environment Settings page by turning on the API Security Posture extension.

With this update, new risk factors have been added, including risk factors for unauthenticated APIs (AllowsAnonymousAccess) and APIs lacking encryption (UnencryptedAccess). Additionally, APIs published through Azure API Management now allow mapping back to any connected Kubernetes Ingresses and VMs, providing end-to-end visibility into API exposure and support risk remediation through Attack path analysis.

Enhancements for Defender for app service alerts

April 7, 2025

On April 30, 2025, Defender for App Service alerting capabilities will be enhanced. We'll add alerts for suspicious code executions and access to internal or remote endpoints. Additionally, we have improved coverage and reduced noise from relevant alerts by expanding our logic and removing alerts that were causing unnecessary noise. As part of this process, the alert "Suspicious WordPress theme invocation detected" will be deprecated.

March 2025

Date Category Update
March 30 GA Enhanced container protection with vulnerability assessment and malware detection for AKS nodes is now GA
March 27 Preview Kubernetes gated deployment (Preview)
March 27 Preview Customizable on-upload malware scanning filters in Defender for Storage (Preview)
March 26 GA General Availability for agentless VM scanning support for CMK in Azure
March 11 Upcoming Change Upcoming change to the recommendation severity levels
March 03 GA General Availability of File Integrity Monitoring (FIM) based on Microsoft Defender for Endpoint in Azure Government

Enhanced container protection with vulnerability assessment and malware detection for AKS nodes is now GA

March 30, 2025

Defender for Cloud now provides vulnerability assessment and malware detection for the nodes in Azure Kubernetes Service (AKS) as GA. Providing security protection for these Kubernetes nodes allow customers to maintain security and compliance across the managed Kubernetes service, and understand their part in the shared security responsibility they have with the managed cloud provider. To receive the new capabilities, you have to enable the Agentless scanning for machines"** as part of Defender CSPM, Defender for Containers, or Defender for Servers P2 plan on your subscription.

Vulnerability Assessment

A new recommendation is now available in Azure portal: AKS nodes should have vulnerability findings resolved. Using this recommendation, you can now review and remediate vulnerabilities and CVEs found on Azure Kubernetes Service (AKS) nodes.

Malware detection

New security alerts are triggered when the agentless malware detection capability detects malware in AKS nodes. Agentless malware detection uses the Microsoft Defender Antivirus anti-malware engine to scan and detect malicious files. When threats are detected, security alerts are directed into Defender for Cloud and Defender XDR, where they can be investigated and remediated.

Note: Malware detection for AKS nodes is available only for Defender for Containers or Defender for Servers P2 enabled environments.

Kubernetes gated deployment (Preview)

March 27, 2025

We're introducing the Kubernetes gated deployment (Preview) feature to the Defender for Containers plan. Kubernetes gated deployment is a mechanism for enhancing Kubernetes security by controlling the deployment of container images that violate organizational security policies.

This capability is based on two new functionalities:

  • Vulnerability findings artifact: Generation of findings for each container image scanned for vulnerability assessment.
  • Security rules: Addition of security rules to alert or prevent the deployment of vulnerable container images into Kubernetes clusters.

Customized security rules: Customers can customize security rules for various environments, for Kubernetes clusters within their organization, or for namespaces, to enable security controls tailored to specific needs and compliance requirements.

Configurable actions for a security rule:

  • Audit: Attempting to deploy a vulnerable container image triggers an "Audit" action, generating a recommendation with violation details on the container image.

  • Deny: Attempting to deploy a vulnerable container image triggers a "Deny" action to prevent deployment of the container image, ensuring that only secure and compliant images are deployed.

End-to-End Security: Defining protection from deployment of vulnerable container images as the first security rule, we introduce the end-to-end Kubernetes secure gating mechanism, ensuring that vulnerable containers don't enter the customer's Kubernetes environment.

For more information about this feature, see Gated Deployment solution overview.

Customizable on-upload malware scanning filters in Defender for Storage (Preview)

March 27, 2025

On-upload malware scanning now supports customizable filters. Users can set exclusion rules for on-upload malware scans based on blob path prefixes, suffixes and by blob size. By excluding specific blob paths and types, such as logs or temporary files, you can avoid unnecessary scans and reduce costs.

Learn how to configure customizable on-upload malware scanning filters.

General Availability for agentless VM scanning support for CMK in Azure

March 26, 2025

Agentless scanning for Azure VMs with CMK encrypted disks is now Generally Available. Both the Defender CSPM plan, and the Defender for Servers P2 provide support for agentless scanning for VMs, now with CMK support across all clouds

Learn how to enable agentless scanning for Azure VMs with CMK encrypted disks.

Upcoming change to the recommendation severity levels

March 11, 2025

We're enhancing the severity levels of recommendations to improve risk assessment and prioritization. As part of this update, we reevaluated all severity classifications and introduced a new level — Critical. Previously, recommendations were categorized into three levels: Low, Medium, and High. With this update, there are now four distinct levels: Low, Medium, High, and Critical, providing a more granular risk evaluation to help customers focus on the most urgent security issues.

As a result, customers might notice changes in the severity of existing recommendations. Additionally, the risk level evaluation, which is available for Defender CSPM customers only, might also be affected as both recommendation severity and asset context are taken into consideration. These adjustments could affect the overall risk level.

The projected change will take place on March 25, 2025.

General Availability of File Integrity Monitoring (FIM) based on Microsoft Defender for Endpoint in Azure Government

March 03, 2025

File Integrity Monitoring based on Microsoft Defender for Endpoint is now GA in Azure Government (GCCH) as part of Defender for Servers Plan 2.

  • Meet compliance requirements by monitoring critical files and registries in real-time and auditing the changes.
  • Identify potential security issues by detecting suspicious file content changes.

This improved FIM experience replaces the existing one that set for deprecation with the Log Analytics Agent (MMA) retirement. The FIM experience over MMA will remain supported in Azure Government until the end of March 2023.

With this release, an in-product experience will be released to allow you to migrate your FIM configuration over MMA to the new FIM over Defender for Endpoint version.

For information on how to enable FIM over Defender for Endpoint, see File Integrity Monitoring using Microsoft Defender for Endpoint. For information on how to disable previous versions and use the migration tool, see Migrate File Integrity Monitoring from previous versions.

Important

The availability of File Integrity Monitoring in Azure China 21Vianet and in GCCM clouds isn't currently planned to be supported.

Next steps

Check What's new in security recommendations and alerts.