Skip to content

Commit 4027114

Browse files
committed
DEASM new article
1 parent 939f882 commit 4027114

File tree

7 files changed

+103
-16
lines changed

7 files changed

+103
-16
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -207,8 +207,8 @@
207207
- name: Investigating risks with security explorer/attack paths
208208
displayName: cloud security graph, attack path analysis, cloud security explorer, attack, path, graph, security, explorer
209209
href: concept-attack-path.md
210-
- name: Integration with Defender EASM
211-
displayName: EASM, attack surface management
210+
- name: External attack surface management (EASM)
211+
displayName: EASM, attack surface management, integration
212212
href: concept-easm.md
213213
- name: Critical assets protection
214214
href: critical-assets-protection.md
@@ -424,6 +424,9 @@
424424
- name: Build queries with cloud security explorer
425425
displayName: queries, security explorer, explorer, templates, query
426426
href: how-to-manage-cloud-security-explorer.md
427+
- name: Detect exposed IP addresses
428+
displayName: exposed, ip, addresses, easm
429+
href: detect-exposed-ip-addresses.md
427430
- name: Built-in security protections
428431
items:
429432
- name: Use Purview to protect sensitive data
Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,14 @@
11
---
2-
title: Microsoft Defender for Cloud integration with Defender External attack surface management (EASM)
2+
title: External attack surface management (EASM)
33
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
44
ms.topic: concept-article
5-
ms.date: 05/20/2024
5+
ms.date: 07/02/2024
66
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
77
---
88

9-
# Integration with Defender EASM
9+
# External attack surface management (EASM)
1010

11-
You can use Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (EASM) to improve your organization's security posture, and reduce the potential risk of being attacked.
12-
13-
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
14-
15-
Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
11+
Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (EASM), allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface.
1612

1713
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
1814

@@ -21,14 +17,17 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
2117
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
2218
- Gain visibility into third-party attack surfaces
2319

24-
EASM collects data for publicly exposed assets (“outside-in”). Defender for Cloud CSPM (“inside-out”) can use that data to assist with internet-exposure validation and discovery capabilities, to provide better visibility to customers.
20+
With this information, security and IT teams are able to identify unknowns, prioritize risks, eliminate threats, and extend vulnerability and exposure control beyond the firewall. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
21+
22+
EASM collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
2523

2624
## Defender CSPM integration
2725

28-
While [Defender CSPM](concept-cloud-security-posture-management.md) includes some external attack surface management capabilities, it doesn't include the full EASM solution. Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
26+
The intergartion with Defender EASM is included with the Defender CSPM plan and doesn't require a license from DEASM.
2927

30-
## Next steps
28+
While [Defender CSPM](concept-cloud-security-posture-management.md) includes some external attack surface management capabilities, it doesn't include the full EASM solution. Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
3129

32-
- Learn about [cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
33-
- Learn about [Defender EASM](../external-attack-surface-management/overview.md).
34-
- Learn how to [deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).
30+
## Related content
31+
- [Cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
32+
- [Defender EASM overview](../external-attack-surface-management/overview.md).
33+
- [Deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).
Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Detect exposed IP addresses
3+
description: Learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud to proactively identify security risks.
4+
ms.topic: how-to
5+
ms.date: 07/02/2024
6+
ms.author: dacurwin
7+
author: dcurwin
8+
ai-usage: ai-assisted
9+
#customer intent: As a security professional, I want to learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud so that I can proactively identify security risks in my cloud environment and improve my security posture.
10+
---
11+
12+
# Detect exposed IP addresses
13+
14+
Microsoft Defender for Cloud's integration with Defender External Attack Surface Management (EASM) allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface.
15+
16+
Security teams can utilize the cloud security explorer and the attack path analysis, to understand the potential attack paths that an attacker could use to reach their critical assets. The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments. while the attack path analysis provides a visual representation of the attack paths that an attacker could use to reach your critical assets.
17+
18+
## Prerequisites
19+
20+
- You need a Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
21+
22+
- You must [enable the Defender CSPM plan](tutorial-enable-cspm-plan.md).
23+
24+
## Detect exposed IP addresses with the cloud security explorer
25+
26+
Using the cloud security explorer, you can detect exposed IP addresses in your cloud environment. The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments.
27+
28+
1. Sign in to the [Azure portal](https://portal.azure.com/).
29+
30+
1. Search for and select **Microsoft Defender for Cloud** > **Cloud security explorer**.
31+
32+
1. In the dropdown menu, search for and select **IP addresses**.
33+
34+
:::image type="content" source="media/detect-exposed-ip-addresses/search-ip-addresses.png" alt-text="Screenshot that shows where to navigate to in Defender for Cloud to search for and select the IP addresses option." lightbox="media/detect-exposed-ip-addresses/search-ip-addresses.png":::
35+
36+
1. Select **Done**.
37+
38+
1. Select **+**.
39+
40+
1. In the select condition dropdown menu, select **DEASM Findings**.
41+
42+
:::image type="content" source="media/detect-exposed-ip-addresses/deasm-findings.png" alt-text="Screenshot that shows where to locate the DEASM Findings option." lightbox="media/detect-exposed-ip-addresses/deasm-findings.png":::
43+
44+
1. Select the **+** button.
45+
46+
1. In the select condition dropdown menu, select **Routes traffic to**.
47+
48+
1. In the select resource type dropdown menu, select **Select all**.
49+
50+
:::image type="content" source="media/detect-exposed-ip-addresses/select-all.png" alt-text="Screenshot that shows where the select all option is located." lightbox="media/detect-exposed-ip-addresses/select-all.png":::
51+
52+
1. Select **Done**.
53+
54+
1. Select the **+** button.
55+
56+
1. In the select condition dropdown menu, select **Routes traffic to**.
57+
58+
1. In the select resource type dropdown menu, select **Virtual machine**.
59+
60+
1. Select **Done**.
61+
62+
1. Select **Search**.
63+
64+
:::image type="content" source="media/detect-exposed-ip-addresses/search.jpg" alt-text="Screenshot that shows the fully built query and where the search button is located." lightbox="media/detect-exposed-ip-addresses/search.jpg":::
65+
66+
1. Select a result to review the findings.
67+
68+
## Detect exposed IP addresses with attack path analysis
69+
70+
Using the attack path analysis, you can view a visualization of the attack paths that an attacker could use to reach your critical assets.
71+
72+
1. Sign in to the [Azure portal](https://portal.azure.com/).
73+
74+
1. Search for and select **Microsoft Defender for Cloud** > **Attack path analysis**.
75+
76+
1. Search for **Internet exposed**.
77+
78+
1. Review and select a result.
79+
80+
1. [Remediate the attack path](how-to-manage-attack-path.md#remediate-attack-paths).
81+
82+
## Next step
83+
84+
> [!div class="nextstepaction"]
85+
> [Identify and remediate attack paths](how-to-manage-attack-path.md)
36.7 KB
Loading
217 KB
Loading
28.2 KB
Loading
60.2 KB
Loading

0 commit comments

Comments
 (0)