Skip to content

Commit 7032b31

Browse files
authored
Merge branch 'main' into diannegali-activaterbacupdate
2 parents ef42f03 + e985a7d commit 7032b31

File tree

2 files changed

+39
-2
lines changed

2 files changed

+39
-2
lines changed

exposure-management/TOC.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,9 @@
6666
href: exposure-insights-overview.md
6767
- name: Review security initiatives
6868
href: initiatives.md
69-
- name: Investigate security metrics
7069
- name: Security initiatives catalog
7170
href: initiatives-list.md
72-
- name: Investigate initiative metrics
71+
- name: Investigate security initiative metrics
7372
href: security-metrics.md
7473
- name: Review security recommendations
7574
href: security-recommendations.md

exposure-management/microsoft-security-exposure-management.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,44 @@ Currently, Security Exposure Management consolidates security posture informatio
7777
In addition to Microsoft services, Security Exposure Management allows you to connect to external data sources to further enrich and extend your security posture management.
7878
For more information on data connectors, see [Data connectors overview](overview-data-connectors.md).
7979

80+
## How do I buy Microsoft Security Exposure Management?
81+
82+
Exposure Management is available in the Microsoft Defender portal at [https://security.microsoft.com](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecurity.microsoft.com%2F&data=05|02|[email protected]|535bfb9f198d4313d96108dd05e1a9d4|72f988bf86f141af91ab2d7cd011db47|1|0|638673189066169502|Unknown|TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D|0|||&sdata=vOA7%2FeI4WU4tRMWSPiHTs4jrZX8%2B%2FN70wheiTBFPSDk%3D&reserved=0)
83+
84+
Access to the exposure management blade and features in the Microsoft Defender portal is available with any of these licenses:
85+
86+
- Microsoft 365 E5 o*r A5*
87+
- Microsoft 365 E3
88+
- Microsoft 365 E3 with the Microsoft Enterprise Mobility + Security E5 add-on
89+
- Microsoft 365 A3 with the Microsoft 365 A5 security add-on
90+
- Microsoft Enterprise Mobility + Security E5 or A5
91+
- Microsoft Defender for Endpoint (Plan 1 and 2)
92+
- Microsoft Defender for Identity
93+
- Microsoft Defender for Cloud Apps
94+
- Microsoft Defender for Office 365 (Plans 1 and 2)
95+
- Microsoft Defender Vulnerability Management
96+
97+
Integration of data from the above tools and other Microsoft Security tools like Microsoft Defender for Cloud, Microsoft Defender Cloud Security Posture Management and Microsoft Defender External Attack Surface Management is available with those licenses.
98+
99+
Integration of non-Microsoft security tools will be a consumption-based cost based on number of assets in the connected security tool. The external connectors are in public preview with plan to be generally available (GA) end of Q1 2025. Pricing will be announced before billing of external connectors starts at GA.
100+
101+
### Data freshness, retention, and related functionality
102+
103+
We currently ingest and process supported data from first-party Microsoft products, making it available within the enterprise exposure graph and applicable Microsoft Security Exposure Management experiences built on top of graph data within 72 hours of its production at the source product.
104+
105+
Microsoft product data is retained for no less than 14 days in the enterprise exposure graph and/or Microsoft Security Exposure Management. Only the latest data snapshot received from Microsoft products is retained; we do not store historical data.
106+
107+
Some enterprise exposure graph and/or Microsoft Security Exposure Management experiences data is available for querying via Advanced Hunting and is subject to [Advanced Hunting service limitations](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fdefender-xdr%2Fadvanced-hunting-limits&data=05|02|[email protected]|2eeaacf0c0f2494a51a308dd06ea1a99|72f988bf86f141af91ab2d7cd011db47|1|0|638674324732464247|Unknown|TWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D|0|||&sdata=cPz7p6NX%2BvUWkVwR4Wx0%2F5pJ0wbP6h8ZXsFSa4JrLxA%3D&reserved=0).
108+
109+
We reserve the right to modify some or all of these parameters in the future, including:
110+
111+
- Data ingestion frequency and freshness: We may increase the current 72-hour latency (decrease the frequency of data ingestion) for some or all Microsoft data sources.
112+
- Data retention period: We may decrease the current 14-day data retention period.
113+
- Service features and functionality: We may alter, limit, or discontinue specific features, capabilities, or functionalities of the service built on top of the enterprise exposure graph and/or Microsoft Security Exposure Management data.
114+
- Data query limits: We may impose limitations on the number, frequency, or type of data queries that can be performed against enterprise exposure graph or Microsoft Security Exposure Management data.
115+
116+
We will make reasonable efforts to provide advance notice of any significant changes to the service. However, you acknowledge and agree that you are solely responsible for monitoring any such notifications.
117+
80118
## Next steps
81119

82120
Review [prerequisites](prerequisites.md) to get started with Security Exposure Management.

0 commit comments

Comments
 (0)