Skip to content

Commit 02c7af9

Browse files
authored
Merge pull request #220070 from AlizaBernstein/WI-2011755-episode-twenty-two
WI-2011755 episode twenty-two
2 parents 95f2d1b + 71f16e6 commit 02c7af9

File tree

3 files changed

+49
-2
lines changed

3 files changed

+49
-2
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -609,7 +609,9 @@
609609
- name: Cloud security explorer and attack path analysis
610610
href: episode-twenty.md
611611
- name: Latest updates in the regulatory compliance dashboard
612-
href: episode-twenty-one.md
612+
href: episode-twenty-one.md
613+
- name: Defender EASM
614+
href: episode-twenty-two.md
613615
- name: Manage user data
614616
href: privacy.md
615617
- name: Microsoft Defender for IoT documentation

articles/defender-for-cloud/episode-twenty-one.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,4 +42,4 @@ ms.date: 11/24/2022
4242
## Next steps
4343

4444
> [!div class="nextstepaction"]
45-
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)
45+
> [Defender External Attack Surface Management (Defender EASM)](episode-twenty-two.md)
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: Defender EASM | Defender for Cloud in the field
3+
titleSuffix: Microsoft Defender for Cloud
4+
description: Learn about Microsoft Defender External Attack Surface Management (Defender EASM)
5+
ms.topic: reference
6+
ms.date: 12/01/2022
7+
---
8+
9+
# Defender EASM | Defender for Cloud in the Field
10+
11+
**Episode description**: In this episode of Defender for Cloud in the Field, Jamil Mirza joins Yuri Diogenes to talk about Microsoft Defender External Attack Surface Management (Defender EASM). Jamil explains how Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. Jamil also covers the integration with Defender for Cloud, how it works, and he demonstrates different capabilities available in Defender EASM..
12+
<br>
13+
<br>
14+
<iframe src="https://aka.ms/docs/player?id=5a3e2eab-52ce-4527-94e0-baae1b9cc81d" width="1080" height="530" allowFullScreen="true" frameBorder="0"></iframe>
15+
16+
- [01:11](/shows/mdc-in-the-field/defender-easm#time=01m11s) - What is Defender EASM?
17+
18+
- [02:59](/shows/mdc-in-the-field/defender-easm#time=02m59s) - How does Defender EASM work?
19+
20+
- [05:55](/shows/mdc-in-the-field/defender-easm#time=05m55s) - What type of information is discovered?
21+
22+
- [09:50](/shows/mdc-in-the-field/defender-easm#time=09m50s) - Integration with Defender for Cloud
23+
24+
- [11:51](/shows/mdc-in-the-field/security-explorer#time=11m51s) - Demonstration
25+
26+
27+
## Recommended resources
28+
- [Learn more](concept-easm.md) about external attack surface management.
29+
- Subscribe to [Microsoft Security on YouTube](https://www.youtube.com/playlist?list=PL3ZTgFEc7LysiX4PfHhdJPR7S8mGO14YS)
30+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
31+
- For more about [Microsoft Security](https://msft.it/6002T9HQY)
32+
33+
- Follow us on social media:
34+
35+
- [LinkedIn](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbFk5TXZuQld2NlpBRV9BQlJqMktYSm95WWhCZ3xBQ3Jtc0tsQU13MkNPWGNFZzVuem5zc05wcnp0VGxybHprVTkwS2todWw0b0VCWUl4a2ZKYVktNGM1TVFHTXpmajVLcjRKX0cwVFNJaDlzTld4MnhyenBuUGRCVmdoYzRZTjFmYXRTVlhpZGc4MHhoa3N6ZDhFMA&q=https%3A%2F%2Fwww.linkedin.com%2Fshowcase%2Fmicrosoft-security%2F)
36+
- [Twitter](https://twitter.com/msftsecurity)
37+
38+
- Join our [Tech Community](https://aka.ms/SecurityTechCommunity)
39+
40+
- Learn more about [Microsoft Security](https://msft.it/6002T9HQY)
41+
42+
## Next steps
43+
44+
> [!div class="nextstepaction"]
45+
> [New AWS Connector in Microsoft Defender for Cloud](episode-one.md)

0 commit comments

Comments
 (0)