Skip to content

Commit 46a3a63

Browse files
committed
acrolinx
1 parent 2157276 commit 46a3a63

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/defender-for-cloud/detect-exposed-ip-addresses.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,9 @@ ai-usage: ai-assisted
1313

1414
Microsoft Defender for Cloud's integration with Defender External Attack Surface Management (EASM) allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface.
1515

16-
Security teams can utilize the cloud security explorer and the attack path analysis, to understand the potential attack paths that an attacker could use to reach their critical assets. The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments. while the attack path analysis provides a visual representation of the attack paths that an attacker could use to reach your critical assets.
16+
Security teams can use the cloud security explorer to build queries and proactively hunt for security risks in their environments. Additionally, they can use the attack path analysis to visualize the potential attack paths that an attacker could use to reach their critical assets.
17+
18+
The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments. While the attack path analysis provides a visual representation of the attack paths that an attacker could use to reach your critical assets.
1719

1820
## Prerequisites
1921

0 commit comments

Comments
 (0)