diff --git a/defender-xdr/investigate-respond-container-threats.md b/defender-xdr/investigate-respond-container-threats.md index fb591e6570..ec81b298d3 100644 --- a/defender-xdr/investigate-respond-container-threats.md +++ b/defender-xdr/investigate-respond-container-threats.md @@ -18,7 +18,8 @@ search.appverid: - MET150 ms.date: 11/18/2024 appliesto: -- Microsoft Defender XDR +- ✅ Microsoft Defender XDR +- Microsoft's unified security operations platform --- # Investigate and respond to container threats in the Microsoft Defender portal @@ -99,11 +100,7 @@ To determine the full scope of a container attack, you can deepen your investiga In the [Advanced hunting](advanced-hunting-overview.md) page, you can extend your search for container-related activities using the **CloudProcessEvents** and **CloudAuditEvents** tables. -:::image type="content" source="/defender/media/defender-containers/adv-hunting-cloud-small.png" alt-text="Highlighting the advanced hunting tables related to cloud events." lightbox="/defender/media/defender-containers/adv-hunting-cloud.png"::: - -The **CloudProcessEvents** table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine. - -The **CloudAuditEvents table** contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events. +The [CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md) table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine. On the other hand, the [CloudAuditEvents](advanced-hunting-cloudauditevents-table.md) table contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events. ## See also