Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
After you enable Defender for Containers, use this guide to verify all components are functioning correctly on your EKS clusters.
Validation checklist
Complete these verification steps in order:
Tip
If any validation step fails, see the Common verification issues section for troubleshooting guidance.
Verify connector status
Check connector in Azure portal
- Go to Microsoft Defender for Cloud > Environment settings.
- Select your AWS connector.
- Verify the following values:
- Connection status shows as Connected
- Last sync time is recent (within 15 minutes)
- Containers plan shows as On
Verify Arc connection
Check EKS clusters in Arc
az connectedk8s show \
--name <cluster-name> \
--resource-group <resource-group> \
--query connectivityStatus
The output should show Connected.
Verify sensor deployment
Check if the Defender sensor pods are running:
kubectl get pods -n kube-system -l app=microsoft-defender
All pods should show a status of Running.
Test security detection
To verify that your Defender for Containers deployment is working correctly, you can simulate security alerts. These simulations trigger real alerts without causing harm to your clusters.
For detailed instructions on generating test alerts and simulating various threat scenarios, see Kubernetes alerts simulation tool.
Common verification issues
Connector shows disconnected
- Verify CloudFormation stack completed successfully.
- Check IAM role has correct trust policy.
- Ensure you correctly entered the role ARN in Azure.
No security alerts
If you don't see security alerts:
- Make sure audit logging is enabled on EKS clusters.
- Verify Defender sensor pods are running.
- Check that runtime protection is enabled in connector settings.
- Wait 5-10 minutes after generating test events.
Missing vulnerability scans
For missing ECR scans:
- Verify ECR permissions in IAM role.
- Check that images are pushed recently.
- Ensure vulnerability assessment is enabled in connector.
- Wait up to 4 hours for initial scans.
Clusters not appearing
If EKS clusters aren't showing:
- Verify clusters are tagged correctly (no exclusion tags).
- Check IAM role has
eks:ListClusterspermission. - Ensure clusters are in the same AWS account.
- Wait 15-30 minutes for discovery.