Skip to content

Commit 5fab8f7

Browse files
Update what-is-discovery.md
Minor changes to discovery seed list
1 parent c7e9438 commit 5fab8f7

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

articles/external-attack-surface-management/what-is-discovery.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,13 @@ Through this process, Microsoft enables organizations to proactively monitor the
2222

2323
To create a comprehensive mapping of your organization’s attack surface, the system first intakes known assets (i.e. “seeds”) that are recursively scanned to discover additional entities through their connections to a seed. An initial seed may be any of the following kinds of web infrastructure indexed by Microsoft:
2424

25-
- Pages
26-
- Host Name
27-
- Domain
28-
- Contact Email Address
29-
- IP Block
30-
- IP Address
31-
- ASN
32-
33-
![Screenshot of Seed list view on discovery screen](media/Discovery-2.png)
25+
- Organization Names
26+
- Domains
27+
- IP Blocks
28+
- Hosts
29+
- Email Contacts
30+
- ASNs
31+
- Whois organizations
3432

3533
Starting with a seed, the system then discovers associations to other online infrastructure to discover other assets owned by your organization; this process ultimately creates your attack surface inventory. The discovery process uses the seeds as the central nodes and spiders outward towards the periphery of your attack surface by identifying all the infrastructure directly connected to the seed, and then identifying all the things related to each of the things in the first set of connections, etc. This process continues until we reach the edge of what your organization is responsible for managing.
3634

0 commit comments

Comments
 (0)