Skip to content

Commit 52f172c

Browse files
committed
more changes for Tal
1 parent a18edca commit 52f172c

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -424,7 +424,7 @@
424424
- name: Build queries with cloud security explorer
425425
displayName: queries, security explorer, explorer, templates, query
426426
href: how-to-manage-cloud-security-explorer.md
427-
- name: Detect exposed IP addresses
427+
- name: Detect internet exposed IP addresses
428428
displayName: exposed, ip, addresses, easm
429429
href: detect-exposed-ip-addresses.md
430430
- name: Built-in security protections

articles/defender-for-cloud/detect-exposed-ip-addresses.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Detect exposed IP addresses
2+
title: Detect internet exposed IP addresses
33
description: Learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud to proactively identify security risks.
44
ms.topic: how-to
5-
ms.date: 07/02/2024
5+
ms.date: 07/03/2024
66
ms.author: dacurwin
77
author: dcurwin
88
ai-usage: ai-assisted
99
#customer intent: As a security professional, I want to learn how to detect exposed IP addresses with cloud security explorer in Microsoft Defender for Cloud so that I can proactively identify security risks in my cloud environment and improve my security posture.
1010
---
1111

12-
# Detect exposed IP addresses
12+
# Detect internet exposed IP addresses
1313

14-
Microsoft Defender for Cloud's integration with Defender External Attack Surface Management (EASM) allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface.
14+
Microsoft Defender for Cloud's integration with Defender External Attack Surface Management (EASM) allows organizations to improve their security posture and reduce the potential risk of attacks by exploring their external attack surface through an outside-in scan of the resources in their environment.
1515

1616
Security teams can use the cloud security explorer to build queries and proactively hunt for security risks in their environments. Additionally, they can use the attack path analysis to visualize the potential attack paths that an attacker could use to reach their critical assets.
1717

@@ -23,9 +23,9 @@ The cloud security explorer allows you to build queries that can proactively hun
2323

2424
- You must [enable the Defender CSPM plan](tutorial-enable-cspm-plan.md).
2525

26-
## Detect exposed IP addresses with the cloud security explorer
26+
## Detect internet exposed IP addresses with the cloud security explorer
2727

28-
Using the cloud security explorer, you can detect exposed IP addresses in your cloud environment. The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments.
28+
The cloud security explorer allows you to build queries, such as an outside-in scan, that can proactively hunt for security risks in your environments, including IP addresses that are exposed to the internet.
2929

3030
1. Sign in to the [Azure portal](https://portal.azure.com/).
3131

0 commit comments

Comments
 (0)