Skip to content

Commit 607b4a8

Browse files
authored
Merge pull request #223546 from danielledennis/main
Edit Discovery Seed List
2 parents 68e0d7d + c5deaa9 commit 607b4a8

File tree

2 files changed

+10
-12
lines changed

2 files changed

+10
-12
lines changed

articles/external-attack-surface-management/using-and-managing-discovery.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Custom discoveries are organized into Discovery Groups. They are independent see
6262

6363
![Screenshot of pre-baked attack surface selection page.](media/Discovery_7.png)
6464

65-
Alternatively, users can manually input their seeds. Defender EASM accepts domains, IP blocks, hosts, email contacts, ASNs, certificate common names, and WhoIs organizations as seed values. You can also specify entities to exclude from asset discovery to ensure they are not added to your inventory if detected. For example, this is useful for organizations that have subsidiaries that will likely be connected to their central infrastructure, but do not belong to your organization.
65+
Alternatively, users can manually input their seeds. Defender EASM accepts organization names, domains, IP blocks, hosts, email contacts, ASNs, and WhoIs organizations as seed values. You can also specify entities to exclude from asset discovery to ensure they are not added to your inventory if detected. For example, this is useful for organizations that have subsidiaries that will likely be connected to their central infrastructure, but do not belong to your organization.
6666

6767
Once your seeds have been selected, select **Review + Create**.
6868

@@ -90,7 +90,7 @@ Run history is organized by the seed assets scanned during the discovery run. To
9090

9191
### Viewing seeds and exclusions
9292

93-
The Discovery page defaults to a list view of Discovery Groups, but users can also view lists of all seeds and excluded entities from this page. Simply click the either tab to view a list of all the seeds or exclusions that power your discovery groups.
93+
The Discovery page defaults to a list view of Discovery Groups, but users can also view lists of all seeds and excluded entities from this page. Simply click either tab to view a list of all the seeds or exclusions that power your discovery groups.
9494

9595
### Seeds
9696

@@ -106,4 +106,4 @@ Similarly, you can click the “Exclusions” tab to see a list of entities that
106106

107107
- [Discovering your attack surface](discovering-your-attack-surface.md)
108108
- [Understanding asset details](understanding-asset-details.md)
109-
- [Understanding dashboards](understanding-dashboards.md)
109+
- [Understanding dashboards](understanding-dashboards.md)

articles/external-attack-surface-management/what-is-discovery.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,13 @@ Through this process, Microsoft enables organizations to proactively monitor the
2222

2323
To create a comprehensive mapping of your organization’s attack surface, the system first intakes known assets (i.e. “seeds”) that are recursively scanned to discover additional entities through their connections to a seed. An initial seed may be any of the following kinds of web infrastructure indexed by Microsoft:
2424

25-
- Pages
26-
- Host Name
27-
- Domain
28-
- Contact Email Address
29-
- IP Block
30-
- IP Address
31-
- ASN
32-
33-
![Screenshot of Seed list view on discovery screen](media/Discovery-2.png)
25+
- Organization Names
26+
- Domains
27+
- IP Blocks
28+
- Hosts
29+
- Email Contacts
30+
- ASNs
31+
- Whois organizations
3432

3533
Starting with a seed, the system then discovers associations to other online infrastructure to discover other assets owned by your organization; this process ultimately creates your attack surface inventory. The discovery process uses the seeds as the central nodes and spiders outward towards the periphery of your attack surface by identifying all the infrastructure directly connected to the seed, and then identifying all the things related to each of the things in the first set of connections, etc. This process continues until we reach the edge of what your organization is responsible for managing.
3634

0 commit comments

Comments
 (0)