Skip to content

Commit 4ae067e

Browse files
committed
update images
1 parent 61f9946 commit 4ae067e

8 files changed

+7
-6
lines changed
-41.9 KB
Loading
139 KB
Loading
518 KB
Loading
545 KB
Loading
121 KB
Loading
518 KB
Loading
110 KB
Loading

exposure-management/value-data-connectors.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -51,27 +51,28 @@ Benefits of using the external data connectors include:
5151

5252
In the Device Inventory, you'll see the discovery sources for each device, which are the products from which we got any report on this device. These might include Microsoft Security products like MDE, MDC, and MDI, and also external data sources like Qualys or ServiceNow CMDB. You can filter on one or more discovery sources within the inventory to view devices that were discovered specifically by those sources.
5353

54-
[Screenshot]
54+
:::image type="content" source="media/value-data-connectors/DI data connectors.png" alt-text="Screenshot of device inventory with discovery source highlighted" lightbox="media/value-data-connectors/DI data connectors.png":::
55+
":::
5556

5657
### Critical Asset Management
5758

5859
Identifying critical assets is key in helping ensure that the most important assets in your organization are protected against risk of data breaches and operational disruptions.
5960

6061
Enrichment information on criticality of assets is retrieved from the data connectors, based on the criticality assessments calculated in those external products. As this data is ingested, Critical Asset Management contains built-in rules to transform the criticality value retrieved from the third-party product to the Exposure Management criticality value for each asset. You can view these classifications and enable or disable them in the Critical Asset Management experience.
6162

62-
[Screenshot]
63+
:::image type="content" source="media/value-data-connectors/critical asset management data connectors.png" alt-text="Screenshot of data connector info in critical asset management" lightbox="media/value-data-connectors/critical asset management data connectors.png":::
6364

6465
### Exposure graph
6566

6667
To explore your assets and enrichment data retrieved from external data products, you can also view this information in the Exposure Graph. Within the Attack Surface map, you can view the nodes representing assets discovered by your connectors, with built-in icons showing the discovery sources for each asset.
6768

68-
[Screenshot]
69-
70-
(Show the 'Discovery sources' layer)
69+
:::image type="content" source="media/value-data-connectors/exposure graph data connectors main.png" alt-text="Screenshot of data connectors in exposure graph" lightbox="media/value-data-connectors/exposure graph data connectors main.png":::
7170

7271
By opening the side pane for the asset, you can also view the detailed data retrieved from the connector for each asset.
7372

74-
[Screenshot]
73+
:::image type="content" source="media/value-data-connectors/exposure graph data connectors.png" alt-text="Screenshot of data connectors in exposure graph" lightbox="media/value-data-connectors/exposure graph data connectors.png":::
74+
75+
:::image type="content" source="media/value-data-connectors/exposure graph data connectors all data.png" alt-text="Screenshot of data connectors in exposure graph side pane" lightbox="media/value-data-connectors/exposure graph data connectors all data.png":::
7576

7677
### Advanced Hunting
7778

0 commit comments

Comments
 (0)