Skip to content

Commit 147619c

Browse files
authored
Merge pull request #280930 from ElazarK/easm-fixes
fixing easm
2 parents d33394d + 933f2de commit 147619c

File tree

3 files changed

+12
-12
lines changed

3 files changed

+12
-12
lines changed

articles/defender-for-cloud/concept-cloud-security-posture-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Cloud Security Posture Management (CSPM)
33
description: Learn more about Cloud Security Posture Management (CSPM) in Microsoft Defender for Cloud and how it helps improve your security posture.
44
ms.topic: concept-article
5-
ms.date: 07/04/2024
5+
ms.date: 07/16/2024
66
#customer intent: As a reader, I want to understand the concept of Cloud Security Posture Management (CSPM) in Microsoft Defender for Cloud.
77
---
88

@@ -48,7 +48,7 @@ The following table summarizes each plan and their cloud availability.
4848
| [Code-to-cloud mapping for IaC](iac-template-mapping.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure DevOps |
4949
| [PR annotations](review-pull-request-annotations.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | GitHub, Azure DevOps |
5050
| Internet exposure analysis | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
51-
| [External attack surface management (EASM)](concept-easm.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
51+
| [External attack surface management](concept-easm.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5252
| [Permissions Management (CIEM)](permissions-management.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5353
| [Regulatory compliance assessments](concept-regulatory-compliance-standards.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
5454
| [ServiceNow Integration](integration-servicenow.md) | - | :::image type="icon" source="./media/icons/yes-icon.png"::: | Azure, AWS, GCP |
Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
22
title: External attack surface management in Defender for Cloud
3-
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
3+
description: Learn about Defender for Cloud integration with Defender External attack surface management to enhance security and reduce the risk of attacks.
44
ms.topic: concept-article
55
ms.date: 07/03/2024
6-
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
6+
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management so that I can enhance my organization's security.
77
---
88

99
# External attack surface management in Defender for Cloud
1010

11-
Microsoft Defender for Cloud has the capability to perform external attack surface management (EASM), (outside-in) scans on multicloud environments. Defender for Cloud accomplishes this through its integration with Microsoft Defender EASM. The integration allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender EASM or any special configurations.
11+
Microsoft Defender for Cloud has the capability to perform external attack surface management, (outside-in) scans on multicloud environments. Defender for Cloud accomplishes this through its integration with [Microsoft Defender External Attack Surface Management](../external-attack-surface-management/overview.md). The integration allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender External Attack Surface Management or any special configurations.
1212

13-
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
13+
Defender External Attack Surface Management applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
1414

1515
- Discover digital assets, always-on inventory.
1616
- Analyze and prioritize risks and threats.
@@ -19,13 +19,13 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
1919

2020
With this information, security and IT teams are able to identify unknowns, prioritize risks, eliminate threats, and extend vulnerability and exposure control beyond the firewall. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
2121

22-
EASM collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
22+
External Attack Surface Management collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
2323

24-
Learn more about [Defender EASM](../external-attack-surface-management/overview.md).
24+
Learn more about [Defender External Attack Surface Management](../external-attack-surface-management/overview.md).
2525

26-
## EASM capabilities in Defender CSPM
26+
## External Attack Surface Management capabilities in Defender CSPM
2727

28-
The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes the data collected through the Defender EASM integration to provide the following capabilities within the Defender for Cloud portal:
28+
The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes the data collected through the Defender External Attack Surface Management integration to provide the following capabilities within the Defender for Cloud portal:
2929

3030
- Discover of all the internet facing cloud resources through the use of an outside-in scan.
3131
- Attack path analysis which finds all exploitable paths starting from internet exposed IPs.
@@ -36,4 +36,4 @@ The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes
3636
## Related content
3737
- [Detect internet exposed IP addresses](detect-exposed-ip-addresses.md)
3838
- [Cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
39-
- [Deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).
39+
- [Deploy Defender External Attack Surface Management](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).

articles/defender-for-cloud/detect-exposed-ip-addresses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ai-usage: ai-assisted
1111

1212
# Detect internet exposed IP addresses
1313

14-
Microsoft Defender for Cloud's provides organizations the capability to perform External Attack Surface Management (EASM) (outside-in) scans to improve their security posture through its integration with Defender EASM. Defender for Cloud's EASM scans uses the information provided by the Defender EASM integration to provide actionable recommendations and visualizations of attack paths to reduce the risk of bad actors exploiting internet exposed IP addresses.
14+
Microsoft Defender for Cloud's provides organizations the capability to perform external attack surface management (outside-in) scans to improve their security posture through its integration with Defender External Attack Surface Management. Defender for Cloud's external attack surface management scans uses the information provided by the Defender External Attack Surface Management integration to provide actionable recommendations and visualizations of attack paths to reduce the risk of bad actors exploiting internet exposed IP addresses.
1515

1616
Through the use Defender for Cloud's cloud security explorer, security teams can build queries and proactively hunt for security risks. Security teams can also use the attack path analysis to visualize the potential attack paths that an attacker could use to reach their critical assets.
1717

0 commit comments

Comments
 (0)