You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: External attack surface management in Defender for Cloud
3
-
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
3
+
description: Learn about Defender for Cloud integration with Defender External attack surface management to enhance security and reduce the risk of attacks.
4
4
ms.topic: concept-article
5
5
ms.date: 07/03/2024
6
-
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
6
+
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management so that I can enhance my organization's security.
7
7
---
8
8
9
9
# External attack surface management in Defender for Cloud
10
10
11
-
Microsoft Defender for Cloud has the capability to perform external attack surface management (EASM), (outside-in) scans on multicloud environments. Defender for Cloud accomplishes this through its integration with Microsoft Defender EASM. The integration allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender EASM or any special configurations.
11
+
Microsoft Defender for Cloud has the capability to perform external attack surface management, (outside-in) scans on multicloud environments. Defender for Cloud accomplishes this through its integration with [Microsoft Defender External Attack Surface Management](../external-attack-surface-management/overview.md). The integration allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender External Attack Surface Management or any special configurations.
12
12
13
-
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
13
+
Defender External Attack Surface Management applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
14
14
15
15
- Discover digital assets, always-on inventory.
16
16
- Analyze and prioritize risks and threats.
@@ -19,13 +19,13 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
19
19
20
20
With this information, security and IT teams are able to identify unknowns, prioritize risks, eliminate threats, and extend vulnerability and exposure control beyond the firewall. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
21
21
22
-
EASM collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
22
+
External Attack Surface Management collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
23
23
24
-
Learn more about [Defender EASM](../external-attack-surface-management/overview.md).
24
+
Learn more about [Defender External Attack Surface Management](../external-attack-surface-management/overview.md).
25
25
26
-
## EASM capabilities in Defender CSPM
26
+
## External Attack Surface Management capabilities in Defender CSPM
27
27
28
-
The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes the data collected through the Defender EASM integration to provide the following capabilities within the Defender for Cloud portal:
28
+
The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes the data collected through the Defender External Attack Surface Management integration to provide the following capabilities within the Defender for Cloud portal:
29
29
30
30
- Discover of all the internet facing cloud resources through the use of an outside-in scan.
31
31
- Attack path analysis which finds all exploitable paths starting from internet exposed IPs.
@@ -36,4 +36,4 @@ The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes
36
36
## Related content
37
37
-[Detect internet exposed IP addresses](detect-exposed-ip-addresses.md)
38
38
-[Cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
39
-
-[Deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).
0 commit comments