Skip to content

Commit d4292b2

Browse files
committed
modify headings per platform manual
1 parent acac260 commit d4292b2

File tree

4 files changed

+12
-12
lines changed

4 files changed

+12
-12
lines changed

articles/external-attack-surface-management/easm-copilot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The EASM Security Copilot integration can help you:
5656

5757
Use Security Copilot to curate your attack surface by using labels, external IDs, and state modifications for a set of assets. This process speeds up curation, so you can organize your inventory faster and more efficiently.
5858

59-
## Enable Microsoft Security Copilot integration in Defender EASM
59+
## Enable Microsoft Security Copilot integration
6060

6161
To set up Microsoft Security Copilot integration in Defender EASM, complete the steps described in the next sections.
6262

@@ -67,7 +67,7 @@ To enable integration, you need to have these prerequisites:
6767
- Access to Microsoft Security Copilot
6868
- Permissions to activate new connections
6969

70-
### Microsoft Security Copilot connection
70+
### Connect Microsoft Security Copilot to Defender EASM
7171

7272
1. Access [Microsoft Security Copilot](https://securitycopilot.microsoft.com/) and ensure that you're authenticated.
7373
1. Select the plugin icon on the upper-right side of the prompt input bar.

articles/external-attack-surface-management/overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft Defender External Attack Surface Management
2+
title: Defender EASM Overview
33
description: Learn how Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to give you an external view of your online infrastructure.
44
author: danielledennis
55
ms.author: dandennis
@@ -8,7 +8,7 @@ ms.date: 02/27/2024
88
ms.topic: conceptual
99
---
1010

11-
# Microsoft Defender External Attack Surface Management
11+
# Microsoft Defender External Attack Surface Management overview
1212

1313
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to give you an external view of your online infrastructure.
1414

@@ -64,5 +64,5 @@ If an organization is no longer a customer of Microsoft, the Microsoft complianc
6464
## Related content
6565

6666
- [Deploy the Defender EASM Azure resource](deploying-the-defender-easm-azure-resource.md)
67-
- [Inventory assets](understanding-inventory-assets.md)
68-
- [Defender EASM discovery](what-is-discovery.md)
67+
- [Understanding inventory assets](understanding-inventory-assets.md)
68+
- [What is discovery?](what-is-discovery.md)

articles/external-attack-surface-management/understanding-inventory-assets.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Inventory Assets
2+
title: Understanding Inventory Assets
33
description: Learn how Microsoft Defender External Attack Surface Management (Defender EASM) uses proprietary discovery technology to recursively searches for infrastructure with observed connections to known legitimate assets.
44
author: danielledennis
55
ms.author: dandennis
@@ -8,7 +8,7 @@ ms.date: 07/14/2022
88
ms.topic: conceptual
99
---
1010

11-
# Inventory assets
11+
# Understanding inventory assets
1212

1313
Microsoft Defender External Attack Surface Management (Defender EASM) uses Microsoft proprietary discovery technology to recursively search for infrastructure through observed connections to known legitimate assets (*discovery seeds*). It makes inferences about that infrastructure's relationship to the organization to uncover previously unknown and unmonitored properties.
1414

@@ -50,5 +50,5 @@ Your attack surface constantly changes. Defender EASM continuously analyzes and
5050
## Related content
5151

5252
- [Modify inventory assets](labeling-inventory-assets.md)
53-
- [Asset details](understanding-asset-details.md)
53+
- [Understanding asset details](understanding-asset-details.md)
5454
- [Use and manage discovery](using-and-managing-discovery.md)

articles/external-attack-surface-management/what-is-discovery.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Defender EASM discovery
2+
title: What Is Discovery?
33
description: Learn how Microsoft Defender External Attack Surface Management (Defender EASM) uses proprietary discovery technology to continuously define your organization’s unique internet-exposed attack surface.
44
author: danielledennis
55
ms.author: dandennis
@@ -8,7 +8,7 @@ ms.date: 07/14/2022
88
ms.topic: conceptual
99
---
1010

11-
# Defender EASM discovery
11+
# What is discovery?
1212

1313
Microsoft Defender External Attack Surface Management (Defender EASM) uses Microsoft proprietary discovery technology to continuously define your organization’s unique internet-exposed attack surface. The Defender EASM discovery feature scans known assets that are owned by your organization to uncover previously unknown and unmonitored properties. Discovered assets are indexed in your organization's inventory. Defender EASM gives you a dynamic system of record for web applications, third-party dependencies, and web infrastructure under your organization’s management in a single view.
1414

@@ -80,4 +80,4 @@ When you review assets, we recommend that you start with assets labeled **Requir
8080

8181
- [Deploy the Defender EASM Azure resource](deploying-the-defender-easm-azure-resource.md)
8282
- [Use and manage discovery](using-and-managing-discovery.md)
83-
- [Asset details](understanding-asset-details.md)
83+
- [Understanding asset details](understanding-asset-details.md)

0 commit comments

Comments
 (0)