You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/whats-new.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,13 @@ Learn more about MSEM by reading the [Microsoft Security and Compliance blog](ht
26
26
27
27
## November 2025
28
28
29
-
### Integration of Microsoft Defender for Cloud’s CSPM capabilities and Microsoft Defender Vulnerability Management and into Exposure Management**
29
+
### Integration of Microsoft Defender for Cloud’s CSPM capabilities and Microsoft Defender Vulnerability Management and into Exposure Management
30
30
31
-
This major milestone brings comprehensive Microsoft Defender for Cloud’s posture capabilities (secure score, recommendations and attck paths) and vulnerability management integration to Microsoft Security Exposure Management, which significantly expanding the scope and capabilities of the platform.
31
+
This major milestone brings comprehensive Microsoft Defender for Cloud’s posture capabilities (secure score, recommendations, and attack paths) and vulnerability management integration to Microsoft Security Exposure Management, which significantly expands the scope and capabilities of the platform.
32
32
33
33
#### New unified recommendations catalog
34
34
35
-
**One place, full coverage** – You can now explore all Microsoft security recommendations in a single, streamlined experience that consolidates recommendations from:
35
+
**One place, full coverage** – You can now explore all Microsoft security recommendations in a single, streamlined experience that consolidates recommendations from:
36
36
37
37
- Microsoft secure score
38
38
@@ -42,25 +42,25 @@ This major milestone brings comprehensive Microsoft Defender for Cloud’s postu
42
42
43
43
- Microsoft Defender for Vulnerability Management
44
44
45
-
**Organized by attack surfaces** – The catalog is divided into tabs based on attack surfaces:
45
+
**Organized by attack surfaces** – The catalog is divided into tabs based on attack surfaces:
46
46
47
-
-**Devices** - Including separate views for Misconfigurations and Vulnerabilities
47
+
-**Devices** - Including separate views for **Misconfigurations** and **Vulnerabilities**
**Enhanced capabilities** – Each tab incorporates unified fields and functionalities from previous experiences, providing consistent and efficient ways to discover, evaluate, and prioritize security recommendations.
57
+
**Enhanced capabilities** – Each tab incorporates unified fields and functionalities from previous experiences, providing consistent and efficient ways to discover, evaluate, and prioritize security recommendations.
58
58
59
59
#### Devices misconfigurations and vulnerabilities
60
60
61
-
**Separated workflows** – For the first time, misconfigurations recommendations are separated from vulnerabilities, recognizing they represent distinct workflows handled by different personas:
61
+
**Separated workflows** – For the first time, misconfigurations recommendations are separated from vulnerabilities, recognizing they represent distinct workflows handled by different personas.
62
62
63
-
-**Devices Misconfigurations**: Configuration issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to Devices Secure Score
63
+
-**Devices Misconfigurations**: Configuration issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to Devices Secure Score
64
64
65
65
-**Devices Vulnerabilities**: Software vulnerabilities from Vulnerability Management with the same exposure score and prioritization logic customers know, preserving familiar structure and workflows
66
66
@@ -70,13 +70,13 @@ This major milestone brings comprehensive Microsoft Defender for Cloud’s postu
70
70
71
71
- Risk factors per asset for broader exposure context
72
72
73
-
- New risk-based scoring that weighs recommendations based on severity, asset context, and potential impact
73
+
- New risk-based scoring that weighs recommendations based on severity, asset context, and potential impact
74
74
75
-
- Enhanced recommendation data from Azure Security Center enriched with Exposure Management capabilities
75
+
- Enhanced recommendation data from Azure Security Center enriched with Exposure Management capabilities
76
76
77
-
#### New Secure Score integration
77
+
#### New secure score integration
78
78
79
-
-**Side-by-side scoring** – Both Microsoft Secure Score and the newly introduced Cloud Secure Score are now available in Security Exposure Management, viewable side by side for comprehensive posture tracking.
79
+
-**Side-by-side scoring** – Both Microsoft secure score and the newly introduced Cloud secure score are now available in Security Exposure Management, viewable side by side for comprehensive posture tracking.
80
80
81
81
#### Enhanced Attack Path analysis
82
82
@@ -126,7 +126,7 @@ Key features include:
126
126
- Azure Storage Account Key
127
127
-**Enhanced visibility**: Critical assets are surfaced across Microsoft Defender XDR experiences for improved security posture management
128
128
129
-
This integration provides the first offering to combine the experience between Purview and Microsoft Defender Portal for classifying critical assets and gathering important pre-breach insights.
129
+
This integration provides the first offering to combine the experience between Purview and Microsoft Defender Portal for classifying critical assets and gathering important prebreach insights.
130
130
131
131
For more information, see [Predefined classifications](predefined-classification-rules-and-levels.md).
132
132
### Blast radius analysis
@@ -169,7 +169,7 @@ For more information, see [Predefined classification](predefined-classification-
169
169
170
170
Cloud Attack Paths now reflect real, externally driven and exploitable risks that adversaries could use to compromise your organization, helping you cut through the noise and act faster. The paths now focus on external entry points and how attackers could progress through your environment reaching business-critical targets.
171
171
172
-
On-premises Attack Path now terminate automatically when they reach End Game assets (Domain Admins, Enterprise Admins, Administrators, or Domain Controllers). These assets provide full domain control if compromised. The visualization and prioritization of attack path risks for on-premises infrastructure provide consistent clarity, enabling security teams to focus on high-impact scenarios and reduce noise.
172
+
On-premises Attack Path now terminates automatically when they reach End Game assets (Domain Admins, Enterprise Admins, Administrators, or Domain Controllers). These assets provide full domain control if compromised. The visualization and prioritization of attack path risks for on-premises infrastructure provide consistent clarity, enabling security teams to focus on high-impact scenarios and reduce noise.
173
173
174
174
The changes bring greater clarity, focus, and prioritization empowering security teams to mitigate the most critical risks with confidence.
175
175
@@ -189,7 +189,7 @@ For more information, see [External attack surface management initiative](extern
189
189
190
190
The device groups scoping within Exposure Management has been expanded. This update enhances the existing capability to filter the list of affected devices based on your assigned scope by extending it to security metrics and exposed entities in recommendations. With this enhancement, initiative scores, metric progress, security events, and historical insights will now be calculated and displayed according to your specific user scope. As a result, the data presented, including on the Overview page, will be tailored to align with your designated scope.
191
191
192
-
We will also support the device groups filter, which is already available in Microsoft Defender Vulnerability Management experiences. This filter enables end users to refine their view within their access scope, allowing them to focus on specific devices as needed. Once the filter is adjusted based on the user’s selection, all related data will be refreshed accordingly.
192
+
We'll also support the device groups filter, which is already available in Microsoft Defender Vulnerability Management experiences. This filter enables end users to refine their view within their access scope, allowing them to focus on specific devices as needed. Once the filter is adjusted based on the user’s selection, all related data will be refreshed accordingly.
193
193
194
194
> [!NOTE]
195
195
> The device groups scoping capability applies only to data associated with Endpoint devices.
0 commit comments