You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Microsoft Defender for Cloud integration with Defender External attack surface management (EASM)
2
+
title: External attack surface management (EASM)
3
3
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
4
4
ms.topic: concept-article
5
-
ms.date: 05/20/2024
5
+
ms.date: 07/02/2024
6
6
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
7
7
---
8
8
9
-
# Integration with Defender EASM
9
+
# External attack surface management (EASM)
10
10
11
-
You can use Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (EASM) to improve your organization's security posture, and reduce the potential risk of being attacked.
12
-
13
-
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
14
-
15
-
Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
11
+
Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (EASM), allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface.
16
12
17
13
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
18
14
@@ -21,14 +17,17 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
21
17
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
22
18
- Gain visibility into third-party attack surfaces
23
19
24
-
EASM collects data for publicly exposed assets (“outside-in”). Defender for Cloud CSPM (“inside-out”) can use that data to assist with internet-exposure validation and discovery capabilities, to provide better visibility to customers.
20
+
With this information, security and IT teams are able to identify unknowns, prioritize risks, eliminate threats, and extend vulnerability and exposure control beyond the firewall. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
21
+
22
+
EASM collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
25
23
26
24
## Defender CSPM integration
27
25
28
-
While [Defender CSPM](concept-cloud-security-posture-management.md) includes some external attack surface management capabilities, it doesn't include the full EASM solution. Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
26
+
The intergartion with Defender EASM is included with the Defender CSPM plan and doesn't require a license from DEASM.
29
27
30
-
## Next steps
28
+
While [Defender CSPM](concept-cloud-security-posture-management.md) includes some external attack surface management capabilities, it doesn't include the full EASM solution. Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
31
29
32
-
- Learn about [cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
33
-
- Learn about [Defender EASM](../external-attack-surface-management/overview.md).
34
-
- Learn how to [deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).
30
+
## Related content
31
+
-[Cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
description: Learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud to proactively identify security risks.
4
+
ms.topic: how-to
5
+
ms.date: 07/02/2024
6
+
ms.author: dacurwin
7
+
author: dcurwin
8
+
ai-usage: ai-assisted
9
+
#customer intent: As a security professional, I want to learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud so that I can proactively identify security risks in my cloud environment and improve my security posture.
10
+
---
11
+
12
+
# Detect exposed IP addresses
13
+
14
+
Microsoft Defender for Cloud's integration with Defender External Attack Surface Management (EASM) allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface.
15
+
16
+
Security teams can utilize the cloud security explorer and the attack path analysis, to understand the potential attack paths that an attacker could use to reach their critical assets. The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments. while the attack path analysis provides a visual representation of the attack paths that an attacker could use to reach your critical assets.
17
+
18
+
## Prerequisites
19
+
20
+
- You need a Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
21
+
22
+
- You must [enable the Defender CSPM plan](tutorial-enable-cspm-plan.md).
23
+
24
+
## Detect exposed IP addresses with the cloud security explorer
25
+
26
+
Using the cloud security explorer, you can detect exposed IP addresses in your cloud environment. The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments.
27
+
28
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
29
+
30
+
1. Search for and select **Microsoft Defender for Cloud** > **Cloud security explorer**.
31
+
32
+
1. In the dropdown menu, search for and select **IP addresses**.
33
+
34
+
:::image type="content" source="media/detect-exposed-ip-addresses/search-ip-addresses.png" alt-text="Screenshot that shows where to navigate to in Defender for Cloud to search for and select the IP addresses option." lightbox="media/detect-exposed-ip-addresses/search-ip-addresses.png":::
35
+
36
+
1. Select **Done**.
37
+
38
+
1. Select **+**.
39
+
40
+
1. In the select condition dropdown menu, select **DEASM Findings**.
41
+
42
+
:::image type="content" source="media/detect-exposed-ip-addresses/deasm-findings.png" alt-text="Screenshot that shows where to locate the DEASM Findings option." lightbox="media/detect-exposed-ip-addresses/deasm-findings.png":::
43
+
44
+
1. Select the **+** button.
45
+
46
+
1. In the select condition dropdown menu, select **Routes traffic to**.
47
+
48
+
1. In the select resource type dropdown menu, select **Select all**.
49
+
50
+
:::image type="content" source="media/detect-exposed-ip-addresses/select-all.png" alt-text="Screenshot that shows where the select all option is located." lightbox="media/detect-exposed-ip-addresses/select-all.png":::
51
+
52
+
1. Select **Done**.
53
+
54
+
1. Select the **+** button.
55
+
56
+
1. In the select condition dropdown menu, select **Routes traffic to**.
57
+
58
+
1. In the select resource type dropdown menu, select **Virtual machine**.
59
+
60
+
1. Select **Done**.
61
+
62
+
1. Select **Search**.
63
+
64
+
:::image type="content" source="media/detect-exposed-ip-addresses/search.jpg" alt-text="Screenshot that shows the fully built query and where the search button is located." lightbox="media/detect-exposed-ip-addresses/search.jpg":::
65
+
66
+
1. Select a result to review the findings.
67
+
68
+
## Detect exposed IP addresses with attack path analysis
69
+
70
+
Using the attack path analysis, you can view a visualization of the attack paths that an attacker could use to reach your critical assets.
71
+
72
+
1. Sign in to the [Azure portal](https://portal.azure.com/).
73
+
74
+
1. Search for and select **Microsoft Defender for Cloud** > **Attack path analysis**.
75
+
76
+
1. Search for **Internet exposed**.
77
+
78
+
1. Review and select a result.
79
+
80
+
1.[Remediate the attack path](how-to-manage-attack-path.md#remediate-attack-paths).
81
+
82
+
## Next step
83
+
84
+
> [!div class="nextstepaction"]
85
+
> [Identify and remediate attack paths](how-to-manage-attack-path.md)
0 commit comments