Skip to content

Commit 4020624

Browse files
committed
fixes
1 parent 52f172c commit 4020624

File tree

2 files changed

+16
-10
lines changed

2 files changed

+16
-10
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@
207207
- name: Investigating risks with security explorer/attack paths
208208
displayName: cloud security graph, attack path analysis, cloud security explorer, attack, path, graph, security, explorer
209209
href: concept-attack-path.md
210-
- name: External attack surface management (EASM)
210+
- name: Integration with Defender EASM
211211
displayName: EASM, attack surface management, integration
212212
href: concept-easm.md
213213
- name: Critical assets protection
Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,41 @@
11
---
2-
title: External attack surface management (EASM)
2+
title: Integration with Defender EASM
33
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
44
ms.topic: concept-article
55
ms.date: 07/03/2024
66
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
77
---
88

9-
# External attack surface management (EASM)
9+
# Integration with Defender EASM
1010

11-
Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (DEASM), allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender for Cloud Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from DEASM or any special configurations.
11+
Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (DEASM), allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender for Cloud Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender EASM or any special configurations.
1212

1313
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
1414

15-
- Discover of all the internet facing cloud resources through the use of an outside-in scan
16-
- Attack path analysis which finds all exploitable paths starting from internet exposed IPs
17-
- Custom queries that correlate all internet exposed IPs with the rest of Defender for Cloud data in the cloud security explorer
15+
- Discover digital assets, always-on inventory.
16+
- Analyze and prioritize risks and threats.
17+
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand.
18+
- Gain visibility into third-party attack surfaces.
1819

1920
:::image type="content" source="media/concept-easm/cloud-security-explorer.png" alt-text="Screenshot of the cloud security explorer page in the Defender for Cloud portal." lightbox="media/concept-easm/cloud-security-explorer.png":::
2021

2122
With this information, security and IT teams are able to identify unknowns, prioritize risks, eliminate threats, and extend vulnerability and exposure control beyond the firewall. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
2223

2324
EASM collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
2425

26+
Learn more about [Defender EASM](../external-attack-surface-management/overview.md).
27+
2528
## Defender CSPM integration
2629

27-
The intergartion with Defender EASM is included with the Defender CSPM plan and doesn't require a license from DEASM.
30+
[Defender CSPM](concept-cloud-security-posture-management.md) includes the capabilities from Defender EASM such as:
31+
32+
- Discover of all the internet facing cloud resources through the use of an outside-in scan.
33+
- Attack path analysis which finds all exploitable paths starting from internet exposed IPs.
34+
- Custom queries that correlate all internet exposed IPs with the rest of Defender for Cloud data in the cloud security explorer.
2835

29-
While [Defender CSPM](concept-cloud-security-posture-management.md) includes some external attack surface management capabilities, it doesn't include the full EASM solution. Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
36+
Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
3037

3138
## Related content
3239
- [Detect exposed IP addresses](detect-exposed-ip-addresses.md)
3340
- [Cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
34-
- [Defender EASM overview](../external-attack-surface-management/overview.md).
3541
- [Deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).

0 commit comments

Comments
 (0)