Skip to content

Commit c9a9369

Browse files
authored
Merge pull request #267459 from danielledennis/main
Add landing page
2 parents 883ed85 + b11d541 commit c9a9369

File tree

7 files changed

+184
-74
lines changed

7 files changed

+184
-74
lines changed

articles/defender-for-cloud/concept-easm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,5 +26,5 @@ EASM collects data for publicly exposed assets (“outside-in”). Defender for
2626
## Next steps
2727

2828
- Learn about [cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
29-
- Learn about [Defender EASM](../external-attack-surface-management/index.md).
29+
- Learn about [Defender EASM](../external-attack-surface-management/overview.md).
3030
- Learn how to [deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).

articles/external-attack-surface-management/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
- name: Concepts
22
expanded: true
33
items:
4+
- name: Defender EASM documentation
5+
href: index.yml
46
- name: Overview
5-
href: index.md
7+
href: overview.md
68
- name: Understanding inventory assets
79
href: understanding-inventory-assets.md
810
- name: What is Discovery?

articles/external-attack-surface-management/deploying-the-defender-easm-azure-resource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Creating the Defender EASM Azure resource involves two steps:
2020

2121
## Prerequisites
2222

23-
Before you create a Defender EASM resource group, become familiar with how to access and use the [Azure portal](https://portal.azure.com/). Also read the [Defender EASM Overview article](index.md) for key context on the product. You need:
23+
Before you create a Defender EASM resource group, become familiar with how to access and use the [Azure portal](https://portal.azure.com/). Also read the [Defender EASM Overview article](overview.md) for key context on the product. You need:
2424

2525
- A valid Azure subscription or free Defender EASM trial account. If you don’t have an [Azure subscription](../guides/developer/azure-developer-guide.md#understanding-accounts-subscriptions-and-billing), create a free Azure account before you begin.
2626
- A Contributor role assigned for you to create a resource. To get this role assigned to your account, follow the steps in the [Assign roles](../role-based-access-control/role-assignments-steps.md) documentation. Or you can contact your administrator.
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
### YamlMime:Landing
2+
3+
title: Defender External Attack Surface Management
4+
summary: Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
5+
6+
metadata:
7+
title: Defender External Attack Surface Management
8+
description: Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
9+
10+
ms.service: defender-easm
11+
ms.topic: landing-page
12+
author: danielledennis
13+
ms.author: dandennis
14+
ms.date: 02/27/2024
15+
keywords: external-attack-surface-management
16+
17+
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | whats-new
18+
19+
landingContent:
20+
# Cards and links should be based on top customer tasks or top subjects
21+
# Start card title with a verb
22+
# Card
23+
- title: About Defender EASM
24+
linkLists:
25+
- linkListType: overview
26+
links:
27+
- text: Overview
28+
url: overview.md
29+
- text: Understanding inventory assets
30+
url: understanding-inventory-assets.md
31+
- text: What is discovery?
32+
url: what-is-discovery.md
33+
34+
# Card
35+
- title: Get started
36+
linkLists:
37+
- linkListType: quickstart
38+
links:
39+
- text: Create a Defender EASM Azure resource
40+
url: deploying-the-defender-easm-azure-resource.md
41+
- linkListType: how-to-guide
42+
links:
43+
- text: Use and manage discovery
44+
url: using-and-managing-discovery.md
45+
- linkListType: tutorial
46+
links:
47+
- text: Discovering your attack surface
48+
url: discovering-your-attack-surface.md
49+
50+
# Card
51+
- title: Understand concepts
52+
linkLists:
53+
- linkListType: concept
54+
links:
55+
- text: Understanding asset details
56+
url: understanding-asset-details.md
57+
- text: Understanding dashboards
58+
url: understanding-dashboards.md
59+
- text: Understand billable assets
60+
url: understanding-billable-assets.md
61+
62+
# Card
63+
- title: How-to guide
64+
linkLists:
65+
- linkListType: how-to-guide
66+
links:
67+
- text: Using and managing discovery
68+
url: using-and-managing-discovery.md
69+
- text: Modifying inventory assets
70+
url: modifying-inventory-assets.md
71+
- text: Leveraging data connections
72+
url: data-connections.md
73+
74+
# Card
75+
- title: Inventory filters
76+
linkLists:
77+
- linkListType: learn
78+
links:
79+
- text: Inventory filters overview
80+
81+
url: inventory-filters.md
82+
- text: Domain asset filters
83+
url: domain-asset-filters.md
84+
- text: Host asset filters
85+
url: host-asset-filters.md
86+
- text: Page asset filters
87+
url: page-asset-filters.md
88+
- text: Contact asset filters
89+
url: contact-asset-filters.md
90+
- text: SSL certificate asset filters
91+
url: ssl-certificate-asset-filters.md
92+
- text: IP address asset filters
93+
url: ip-address-asset-filters.md
94+
- text: IP block asset filters
95+
url: ip-block-asset-filters.md
96+
- text: ASN asset filters
97+
url: asn-asset-filters.md
98+
99+
100+
101+
# Card
102+
- title: Integrations
103+
linkLists:
104+
- linkListType: learn
105+
links:
106+
- text: Leveraging data connections
107+
url: data-connections.md
108+
- text: Microsoft Security Copilot (preview) and Defender EASM
109+
url: easm-copilot.md
Lines changed: 68 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -1,69 +1,68 @@
1-
---
2-
title: Overview
3-
description: Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure.
4-
author: danielledennis
5-
ms.author: dandennis
6-
ms.service: defender-easm
7-
ms.date: 07/14/2022
8-
ms.topic: conceptual
9-
---
10-
11-
# Defender EASM Overview
12-
13-
*Microsoft Defender External Attack Surface Management (Defender EASM)* continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by leveraging vulnerability and infrastructure data to showcase the key areas of concern for your organization.
14-
15-
![Screenshot of Overview Dashboard](media/Overview-1.png)
16-
17-
## Discovery and inventory
18-
19-
Microsoft's proprietary discovery technology recursively searches for infrastructure with observed connections to known legitimate assets to make inferences about that infrastructure's relationship to the organization and uncover previously unknown and unmonitored properties. These known legitimate assets are called discovery “seeds”; Defender EASM first discovers strong connections to these selected entities, recursing to unveil more connections and ultimately compile your Attack Surface.
20-
21-
Defender EASM includes the discovery of the following kinds of assets:
22-
23-
- Domains
24-
- Hostnames
25-
- Web Pages
26-
- IP Blocks
27-
- IP Addresses
28-
- ASNs
29-
- SSL Certificates
30-
- WHOIS Contacts
31-
32-
![Screenshot of Discovery View](media/Overview-2.png)
33-
34-
Discovered assets are indexed and classified in your Defender EASM Inventory, providing a dynamic record of all web infrastructure under the organization's management. Assets are categorized as recent (currently active) or historic, and can include web applications, third party dependencies, and other asset connections.
35-
36-
## Dashboards
37-
38-
Defender EASM provides a series of dashboards that help users quickly understand their online infrastructure and any key risks to their organization. These dashboards are designed to provide insight on specific areas of risk, including vulnerabilities, compliance, and security hygiene. These insights help customers quickly address the components of their attack surface that pose the greatest risk to their organization.
39-
40-
![Screenshot of Dashboard View](media/Overview-3.png)
41-
42-
## Managing assets
43-
44-
Customers can filter their inventory to surface the specific insights they care about most. Filtering offers a level of flexibility and customization that enables users to access a specific subset of assets. This allows you to leverage Defender EASM data according to your specific use case, whether searching for assets that connect to deprecating infrastructure or identifying new cloud resources.
45-
46-
![Screenshot of Inventory View](media/Overview-4.png)
47-
48-
## User permissions
49-
50-
Users that have been assigned either Owner or Contributor roles can create, delete, and edit Defender EASM resources and the inventory assets within it. These roles can utilize all capabilities offered in the platform. Users that have been assigned the Reader role are able to view Defender EASM data, but are unable to create, delete or edit inventory assets or the resource itself.
51-
52-
53-
## Data residency, availability and privacy
54-
55-
Microsoft Defender External Attack Surface Management contains both global data and customer-specific data. The underlying internet data is global Microsoft data; labels applied by customers are considered customer data. All customer data is stored in the region of the customer’s choosing.
56-
57-
For security purposes, Microsoft collects users' IP addresses when they log in. This data is stored for up to 30 days but may be stored longer if needed to investigate potential fraudulent or malicious use of the product.
58-
59-
In the case of a region down scenario, only the customers in the affected region will experience downtime.
60-
61-
The Microsoft compliance framework requires that all customer data be deleted within 180 days of that organization no longer being a customer of Microsoft.  This also includes storage of customer data in offline locations, such as database backups. Once a resource is deleted, it cannot be restored by our teams.  The customer data will be retained in our data stores for 75 days, however the actual resource cannot be restored.  After the 75 day period, customer data will be permanently deleted.  
62-
63-
64-
## Next Steps
65-
66-
- [Deploying the EASM Azure resource](deploying-the-defender-easm-azure-resource.md)
67-
- [Understanding inventory assets](understanding-inventory-assets.md)
68-
- [What is discovery?](what-is-discovery.md)
69-
1+
---
2+
title: Overview
3+
description: Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure.
4+
author: danielledennis
5+
ms.author: dandennis
6+
ms.service: defender-easm
7+
ms.date: 02/27/2024
8+
ms.topic: conceptual
9+
---
10+
11+
# Defender EASM Overview
12+
13+
*Microsoft Defender External Attack Surface Management (Defender EASM)* continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by leveraging vulnerability and infrastructure data to showcase the key areas of concern for your organization.
14+
15+
![Screenshot of Overview Dashboard](media/Overview-1.png)
16+
17+
## Discovery and inventory
18+
19+
Microsoft's proprietary discovery technology recursively searches for infrastructure with observed connections to known legitimate assets to make inferences about that infrastructure's relationship to the organization and uncover previously unknown and unmonitored properties. These known legitimate assets are called discovery 'seeds'; Defender EASM first discovers strong connections to these selected entities, recursing to unveil more connections and ultimately compile your Attack Surface.
20+
21+
Defender EASM includes the discovery of the following kinds of assets:
22+
23+
- Domains
24+
- Hostnames
25+
- Web Pages
26+
- IP Blocks
27+
- IP Addresses
28+
- ASNs
29+
- SSL Certificates
30+
- WHOIS Contacts
31+
32+
![Screenshot of Discovery View](media/Overview-2.png)
33+
34+
Discovered assets are indexed and classified in your Defender EASM Inventory, providing a dynamic record of all web infrastructure under the organization's management. Assets are categorized as recent (currently active) or historic, and can include web applications, third party dependencies, and other asset connections.
35+
36+
## Dashboards
37+
38+
Defender EASM provides a series of dashboards that help users quickly understand their online infrastructure and any key risks to their organization. These dashboards are designed to provide insight on specific areas of risk, including vulnerabilities, compliance, and security hygiene. These insights help customers quickly address the components of their attack surface that pose the greatest risk to their organization.
39+
40+
![Screenshot of Dashboard View](media/Overview-3.png)
41+
42+
## Managing assets
43+
44+
Customers can filter their inventory to surface the specific insights they care about most. Filtering offers a level of flexibility and customization that enables users to access a specific subset of assets. This allows you to leverage Defender EASM data according to your specific use case, whether searching for assets that connect to deprecating infrastructure or identifying new cloud resources.
45+
46+
![Screenshot of Inventory View](media/Overview-4.png)
47+
48+
## User permissions
49+
50+
Users that are assigned either Owner or Contributor roles can create, delete, and edit Defender EASM resources and the inventory assets within it. These roles can utilize all capabilities offered in the platform. Users that are assigned the Reader role are able to view Defender EASM data, but are unable to create, delete or edit inventory assets or the resource itself.
51+
52+
53+
## Data residency, availability and privacy
54+
55+
Microsoft Defender External Attack Surface Management contains both global data and customer-specific data. The underlying internet data is global Microsoft data; labels applied by customers are considered customer data. All customer data is stored in the region of the customer’s choosing.
56+
57+
For security purposes, Microsoft collects users' IP addresses when they log in. This data is stored for up to 30 days but may be stored longer if needed to investigate potential fraudulent or malicious use of the product.
58+
59+
In the case of a region down scenario, only the customers in the affected region experience downtime.
60+
61+
The Microsoft compliance framework requires that all customer data be deleted within 180 days of that organization no longer being a customer of Microsoft. This also includes storage of customer data in offline locations, such as database backups. Once a resource is deleted, it can't be restored by our teams. The customer data is retained in our data stores for 75 days, however the actual resource can't be restored.  After the 75 day period, customer data will be permanently deleted.  
62+
63+
64+
## Next Steps
65+
66+
- [Deploying the EASM Azure resource](deploying-the-defender-easm-azure-resource.md)
67+
- [Understanding inventory assets](understanding-inventory-assets.md)
68+
- [What is discovery?](what-is-discovery.md)

articles/external-attack-surface-management/understanding-billable-assets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,4 +93,4 @@ Prospective customers accessing Defender EASM with a 30-day trial can also see t
9393

9494
## Next steps
9595

96-
- [Microsoft Defender External Attack Surface Management (Defender EASM) overview](index.md)
96+
- [Microsoft Defender External Attack Surface Management (Defender EASM) overview](overview.md)

articles/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1423,7 +1423,7 @@ productDirectory:
14231423
azureCategories:
14241424
- security
14251425
- management-and-governance
1426-
url: external-attack-surface-management/index.md
1426+
url: external-attack-surface-management/overview.md
14271427
# Card
14281428
- title: Key Vault
14291429
summary: Safeguard and maintain control of keys and other secrets

0 commit comments

Comments
 (0)