Skip to content

Commit d99683e

Browse files
committed
fixes to article with Tal
1 parent 665732d commit d99683e

File tree

4 files changed

+11
-15
lines changed

4 files changed

+11
-15
lines changed

articles/defender-for-cloud/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@
207207
- name: Investigating risks with security explorer/attack paths
208208
displayName: cloud security graph, attack path analysis, cloud security explorer, attack, path, graph, security, explorer
209209
href: concept-attack-path.md
210-
- name: Integration with Defender EASM
210+
- name: External attack surface management in Defender for Cloud
211211
displayName: EASM, attack surface management, integration
212212
href: concept-easm.md
213213
- name: Critical assets protection
Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Integration with Defender EASM
2+
title: External attack surface management in Defender for Cloud
33
description: Learn about Defender for Cloud integration with Defender External attack surface management (EASM) to enhance security and reduce the risk of attacks.
44
ms.topic: concept-article
55
ms.date: 07/03/2024
66
#customer intent: As a reader, I want to learn about the integration between Defender for Cloud and Defender External attack surface management (EASM) so that I can enhance my organization's security.
77
---
88

9-
# Integration with Defender EASM
9+
# Integration with Defender External Attack Surface Management (EASM)
1010

11-
Microsoft Defender for Cloud's integration with Microsoft Defender External Attack Surface Management (DEASM), allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender for Cloud Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender EASM or any special configurations.
11+
Microsoft Defender for Cloud has the capability to perform external attack surface management (EASM), (outside-in) scans on multicloud environments. Defender for Cloud accomplishes this through its integration with Microsoft Defender EASM. The integration allows organizations to improve their security posture while reducing the potential risk of being attacked by exploring their external attack surface. The integration is included with the Defender Cloud Security Posture Management (CSPM) plan by default and doesn't require a license from Defender EASM or any special configurations.
1212

1313
Defender EASM applies Microsoft’s crawling technology to discover assets that are related to your known online infrastructure, and actively scans these assets to discover new connections over time. Attack Surface Insights are generated by applying vulnerability and infrastructure data to showcase the key areas of concern for your organization, such as:
1414

@@ -17,25 +17,23 @@ Defender EASM applies Microsoft’s crawling technology to discover assets that
1717
- Pinpoint attacker-exposed weaknesses, anywhere and on-demand.
1818
- Gain visibility into third-party attack surfaces.
1919

20-
:::image type="content" source="media/concept-easm/cloud-security-explorer.png" alt-text="Screenshot of the cloud security explorer page in the Defender for Cloud portal." lightbox="media/concept-easm/cloud-security-explorer.png":::
21-
2220
With this information, security and IT teams are able to identify unknowns, prioritize risks, eliminate threats, and extend vulnerability and exposure control beyond the firewall. The attack surface is made up of all the points of access that an unauthorized person could use to enter their system. The larger your attack surface is, the harder it's to protect.
2321

2422
EASM collects data on publicly exposed assets (“outside-in”) which Defender for Cloud's Cloud Security Posture Management (CSPM) (“inside-out”) plan uses to assist with internet-exposure validation and discovery capabilities.
2523

2624
Learn more about [Defender EASM](../external-attack-surface-management/overview.md).
2725

28-
## Defender CSPM integration
26+
## EASM capabilities in Defender CSPM
2927

30-
[Defender CSPM](concept-cloud-security-posture-management.md) includes the capabilities from Defender EASM such as:
28+
The [Defender CSPM](concept-cloud-security-posture-management.md) plan utilizes the data collected through the Defender EASM integration to provide the following capabilities within the Defender for Cloud portal:
3129

3230
- Discover of all the internet facing cloud resources through the use of an outside-in scan.
3331
- Attack path analysis which finds all exploitable paths starting from internet exposed IPs.
3432
- Custom queries that correlate all internet exposed IPs with the rest of Defender for Cloud data in the cloud security explorer.
3533

36-
Instead, it provides detection of internet accessible assets via Defender for Cloud recommendations and attack paths.
34+
:::image type="content" source="media/concept-easm/cloud-security-explorer.png" alt-text="Screenshot of the cloud security explorer page in the Defender for Cloud portal." lightbox="media/concept-easm/cloud-security-explorer.png":::
3735

3836
## Related content
39-
- [Detect exposed IP addresses](detect-exposed-ip-addresses.md)
37+
- [Detect internet exposed IP addresses](detect-exposed-ip-addresses.md)
4038
- [Cloud security explorer and attack paths](concept-attack-path.md) in Defender for Cloud.
4139
- [Deploy Defender for EASM](../external-attack-surface-management/deploying-the-defender-easm-azure-resource.md).

articles/defender-for-cloud/detect-exposed-ip-addresses.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,15 @@ ai-usage: ai-assisted
1111

1212
# Detect internet exposed IP addresses
1313

14-
Microsoft Defender for Cloud's integration with Defender External Attack Surface Management (EASM) allows organizations to improve their security posture and reduce the potential risk of attacks by exploring their external attack surface through an outside-in scan of the resources in their environment.
14+
Microsoft Defender for Cloud's provides organizations the capability to perform External Attack Surface Management (EASM) (outside-in) scans to improve their security posture through its integration with Defender EASM. Defender for Cloud's EASM scans uses the information provided by the Defender EASM integration to provide actionable recommendations and visualizations of attack paths to reduce the risk of bad actors exploiting internet exposed IP addresses.
1515

16-
Security teams can use the cloud security explorer to build queries and proactively hunt for security risks in their environments. Additionally, they can use the attack path analysis to visualize the potential attack paths that an attacker could use to reach their critical assets.
17-
18-
The cloud security explorer allows you to build queries that can proactively hunt for security risks in your environments. While the attack path analysis provides a visual representation of the attack paths that an attacker could use to reach your critical assets.
16+
Through the use Defender for Cloud's cloud security explorer, security teams can build queries and proactively hunt for security risks. Security teams can also use the attack path analysis to visualize the potential attack paths that an attacker could use to reach their critical assets.
1917

2018
## Prerequisites
2119

2220
- You need a Microsoft Azure subscription. If you don't have an Azure subscription, you can [sign up for a free subscription](https://azure.microsoft.com/pricing/free-trial/).
2321

24-
- You must [enable the Defender CSPM plan](tutorial-enable-cspm-plan.md).
22+
- You must [enable the Defender Cloud Security Posture Management (CSPM) plan](tutorial-enable-cspm-plan.md).
2523

2624
## Detect internet exposed IP addresses with the cloud security explorer
2725

-4.34 KB
Loading

0 commit comments

Comments
 (0)