Skip to content

Commit d4615f1

Browse files
committed
concept easm
1 parent 532492d commit d4615f1

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/defender-for-cloud/concept-easm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ description: Learn how to gain comprehensive visibility and insights over extern
44
titleSuffix: Defender EASM and External Attack Surface Management (EASM) and Defender for Cloud
55
ms.topic: conceptual
66
ms.custom: ignite-2022
7-
ms.date: 09/21/2022
7+
ms.date: 01/10/2023
88
---
99

1010
# What is an external attack surface?
1111

12-
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. An organization's attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it is to protect.
12+
An external attack surface is the entire area of an organization or system that is susceptible to an attack from an external source. An organization's attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
1313

1414
You can use Defender for Cloud's new integration with Microsoft Defender External Attack Surface Management (Defender EASM), to improve your organization's security posture and reduce the potential risk of being attacked. Defender EASM continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall.
1515

@@ -20,7 +20,7 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
2020
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand
2121
- Gain visibility into third-party attack surfaces
2222

23-
EASM collects data for publicly exposed assets (“outside-in”) which can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
23+
EASM collects data for publicly exposed assets (“outside-in”). That data can be used by MDC CSPM (“inside-out”) to assist with internet-exposure validation and discovery capabilities to provide better visibility to customers.
2424

2525
## Learn more
2626

0 commit comments

Comments
 (0)