Skip to content

Commit e1f4ce1

Browse files
authored
Merge pull request #233672 from danielledennis/main
Add Defender EASM to main index
2 parents 2436344 + e7a5603 commit e1f4ce1

22 files changed

+76
-53
lines changed

articles/external-attack-surface-management/asn-asset-filters.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender ASN domain asset filters
44
description: This article outlines the filter functionality available in Microsoft Defender External Attack Surface Management for ASN assets specifically, including operators and applicable field values.
55
author: danielledennis
66
ms.author: dandennis
7-
ms.service: security
7+
ms.service: defender-easm
88
ms.date: 12/14/2022
99
ms.topic: how-to
1010
---
@@ -16,11 +16,11 @@ These filters specifically apply to ASN assets. Use these filters when searching
1616

1717
## Free form filters
1818

19-
The following filters require that the user manually enters the value with which they want to search. This list is organized by the number of applicable operators for each filter, then alphabetically.
19+
The following filters require that the user manually enters the value with which they want to search. This list is organized according to the number of applicable operators for each filter, then alphabetically.
2020

2121
| Filter name | Description | Value format | Applicable operators |
2222
|------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|--------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
23-
| ASN | Autonomous System Number is a network identification for transporting data on the Internet between Internet routers. An ASN will have associated public IP blocks tied to it where hosts are located. | 12345 | `Equals` `Not Equals` `In` `Not In` `Empty` `Not Empty` |
23+
| ASN | Autonomous System Number is a network identification for transporting data on the Internet between Internet routers. An ASN associates any public IP blocks tied to it where hosts are located. | 12345 | `Equals` `Not Equals` `In` `Not In` `Empty` `Not Empty` |
2424
| Whois Admin Email | The email address of the listed administrator of a Whois record. | [email protected] | `Equals` `Not Equals` `Starts with` `Does not start with` `Matches` `Does Not Match` `In` `Not in` `Starts with in` `Does not start with in` `Matches in` `Does not match in` `Contains` `Does Not Contain` `Contains In` `Does Not Contain In` `Empty` `Not Empty` |
2525
| Whois Admin Name | The name of the listed administrator. | John Smith | |
2626
| Whois Admin Organization | The organization associated with the administrator. | Contoso Ltd. | |

articles/external-attack-surface-management/contact-asset-filters.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender EASM contact asset filters
44
description: This article outlines the filter functionality available in Microsoft Defender External Attack Surface Management for contact assets specifically, including operators and applicable field values.
55
author: danielledennis
66
ms.author: dandennis
7-
ms.service: security
7+
ms.service: defender-easm
88
ms.date: 12/14/2022
99
ms.topic: how-to
1010
---
@@ -16,7 +16,7 @@ These filters specifically apply to contact assets. Use these filters when searc
1616

1717
## Free form filters
1818

19-
The following filters require that the user manually enters the value with which they want to search. This list is organized by the number of applicable operators for each filter, then alphabetically. Note that many of these values are case-sensitive.
19+
The following filters require that the user manually enters the value with which they want to search. This list is organized by the number of applicable operators for each filter, then alphabetically. Many of these values are case-sensitive.
2020

2121
| Filter name | Description | Value format | Applicable operators |
2222
|--------------------|-------------------------------------------------|---------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|

articles/external-attack-surface-management/data-connections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ title: Defender EASM Data Connections
77
description: "The data connector sends Defender EASM asset data to two different platforms: Microsoft Log Analytics and Azure Data Explorer. Users need to be active customers to export Defender EASM data to either tool, and data connections are subject to the pricing model for each respective platform."
88
author: elaineriq # GitHub alias
99
ms.author: elgonzalez # Microsoft alias
10-
ms.service: security
10+
ms.service: defender-easm
1111
# ms.prod: # To use ms.prod, uncomment it and delete ms.service
1212
ms.topic: how-to
1313
ms.date: 03/20/2023

articles/external-attack-surface-management/deploying-the-defender-easm-azure-resource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Creating a Defender EASM Azure resource
33
description: This article explains how to create an Microsoft Defender External Attack Surface Management (Defender EASM) Azure resource using the Azure portal.
44
author: danielledennis
55
ms.author: dandennis
6-
ms.service: security
6+
ms.service: defender-easm
77
ms.date: 07/14/2022
88
ms.topic: quickstart
99
ms.custom: references_regions 

articles/external-attack-surface-management/discovering-your-attack-surface.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Discovering your attack surface
33
description: Microsoft has preemptively configured the attack surfaces of many organizations, mapping their initial attack surface by discovering infrastructure that’s connected to known assets.
44
author: danielledennis
55
ms.author: dandennis
6-
ms.service: security
6+
ms.service: defender-easm
77
ms.date: 07/14/2022
88
ms.topic: tutorial
99
---
@@ -16,23 +16,23 @@ Before completing this tutorial, see the [What is discovery?](what-is-discovery.
1616

1717
## Accessing your automated attack surface
1818

19-
Microsoft has preemptively configured the attack surfaces of many organizations, mapping their initial attack surface by discovering infrastructure that’s connected to known assets. It is recommended that all users search for their organization’s attack surface before creating a custom attack surface and running additional discoveries. This enables users to quickly access their inventory as Defender EASM refreshes the data, adding additional assets and recent context to your Attack Surface.
19+
Microsoft has preemptively configured the attack surfaces of many organizations, mapping their initial attack surface by discovering infrastructure that’s connected to known assets. It's recommended that all users search for their organization’s attack surface before creating a custom attack surface and running other discoveries. This process enables users to quickly access their inventory as Defender EASM refreshes the data, adding more assets and recent context to your Attack Surface.
2020

2121
1. When first accessing your Defender EASM instance, select “Getting Started” in the “General” section to search for your organization in the list of automated attack surfaces.
2222

2323
2. Then select your organization from the list and click “Build my Attack Surface”.
2424

2525
![Screenshot of pre-configured attack surface option](media/Tutorial-1.png)
2626

27-
At this point, the discovery will be running in the background. If you selected a pre-configured Attack Surface from the list of available organizations, you will be redirected to the Dashboard Overview screen where you can view insights into your organization’s infrastructure in Preview Mode. Please review these dashboard insights to become familiar with your Attack Surface as you wait for additional assets to be discovered and populated in your inventory. Please read the [Understanding dashboards](understanding-dashboards.md) article for more information on how to derive insights from these dashboards.
27+
At this point, the discovery runs in the background. If you selected a pre-configured Attack Surface from the list of available organizations, you will be redirected to the Dashboard Overview screen where you can view insights into your organization’s infrastructure in Preview Mode. Review these dashboard insights to become familiar with your Attack Surface as you wait for additional assets to be discovered and populated in your inventory. Read the [Understanding dashboards](understanding-dashboards.md) article for more information on how to derive insights from these dashboards.
2828

2929
If you notice any missing assets or have other entities to manage that may not be discovered through infrastructure clearly linked to your organization, you can elect to run customized discoveries to detect these outlier assets.
3030

3131
## Customizing discovery
3232
Custom discoveries are ideal for organizations that require deeper visibility into infrastructure that may not be immediately linked to their primary seed assets. By submitting a larger list of known assets to operate as discovery seeds, the discovery engine will return a wider pool of assets. Custom discovery can also help organizations find disparate infrastructure that may relate to independent business units and acquired companies.
3333

3434
## Discovery groups
35-
Custom discoveries are organized into Discovery Groups. They are independent seed clusters that comprise a single discovery run and operate on their own recurrence schedules. Users can elect to organize their Discovery Groups to delineate assets in whatever way best benefits their company and workflows. Common options include organizing by responsible team/business unit, brands or subsidiaries.
35+
Custom discoveries are organized into Discovery Groups. They're independent seed clusters that comprise a single discovery run and operate on their own recurrence schedules. Users can elect to organize their Discovery Groups to delineate assets in whatever way best benefits their company and workflows. Common options include organizing by responsible team/business unit, brands or subsidiaries.
3636

3737
## Creating a discovery group
3838

@@ -60,15 +60,15 @@ Custom discoveries are organized into Discovery Groups. They are independent see
6060

6161
![Screenshot of pre-baked attack surface selection page,](media/Tutorial-7.png)
6262

63-
Alternatively, users can manually input their seeds. Defender EASM accepts domains, IP blocks, hosts, email contacts, ASNs, and WhoIs organizations as seed values. You can also specify entities to exclude from asset discovery to ensure they are not added to your inventory if detected. For example, this is useful for organizations that have subsidiaries that will likely be connected to their central infrastructure, but do not belong to your organization.
63+
Alternatively, users can manually input their seeds. Defender EASM accepts domains, IP blocks, hosts, email contacts, ASNs, and WhoIs organizations as seed values. You can also specify entities to exclude from asset discovery to ensure they aren't added to your inventory if detected. For example, this is useful for organizations that have subsidiaries that will likely be connected to their central infrastructure, but don't belong to your organization.
6464

6565
Once your seeds have been selected, select **Review + Create**.
6666

6767
5. Review your group information and seed list, then select **Create & Run**.
6868

6969
![Screenshot of review + create screen](media/Tutorial-8.png)
7070

71-
You will then be taken back to the main Discovery page that displays your Discovery Groups. Once your discovery run is complete, you will see new assets added to your Confirmed Inventory.
71+
You are then taken back to the main Discovery page that displays your Discovery Groups. Once your discovery run is complete, you can see new assets added to your Approved Inventory.
7272

7373
## Next steps
7474
- [Understanding asset details](understanding-asset-details.md)

articles/external-attack-surface-management/domain-asset-filters.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender EASM domain asset filters
44
description: This article outlines the filter functionality available in Microsoft Defender External Attack Surface Management for domain assets specifically, including operators and applicable field values.
55
author: danielledennis
66
ms.author: dandennis
7-
ms.service: security
7+
ms.service: defender-easm
88
ms.date: 12/14/2022
99
ms.topic: how-to
1010
---
@@ -15,7 +15,7 @@ These filters specifically apply to domain assets. Use these filters when search
1515

1616
## Defined value filters
1717

18-
The following filters provide a drop-down list of options to select. The available values are pre-defined.
18+
The following filters provide a drop-down list of options to select. The available values are predefined.
1919

2020
| Filter name | Description | Value format example | Applicable operators |
2121
|------------------------|----------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------|-----------------------------------|
@@ -26,7 +26,7 @@ The following filters provide a drop-down list of options to select. The availab
2626

2727
## Free form filters
2828

29-
The following filters require that the user manually enters the value with which they want to search. This list is organized by the number of applicable operators for each filter, then alphabetically. Please note that many of these values are case-sensitive.
29+
The following filters require that the user manually enters the value with which they want to search. This list is organized according to the number of applicable operators for each filter, then alphabetically. Note that many values are case-sensitive.
3030

3131
| Filter name | Description | Value format example | Applicable operators |
3232
|------------------------------------|----------------------------------------------------------------------------------------------|----------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|

0 commit comments

Comments
 (0)