You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/exposure-insights-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ Security Exposure Management provides initiatives that currently include:
44
44
45
45
-**External Attack Surface Management Initiative**: Assess the risk associated with your organization's or vendor's external attack surface. This initiative offers insights into identified exposures on the selected vendor. By leveraging this initiative, organizations can understand their risk exposure, prioritize security efforts, and proactively manage their security posture.
46
46
47
-
For more information about the external attack surface management initiative, see [External attack surface management initiative](external-attack-surface-management-initiative.md).
47
+
For more information about the external attack surface management initiative, see [External attack surface management initiative](external-attack-surface-management-initiative.md).
48
48
49
49
> [!IMPORTANT]
50
50
> Initiatives that are in preview are marked accordingly. Preview initiatives are still in development, and are subject to change.
Copy file name to clipboardExpand all lines: exposure-management/external-attack-surface-management-initiative.md
+22-16Lines changed: 22 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,32 +10,35 @@ ms.date: 05/19/2025
10
10
---
11
11
12
12
13
-
# Integrating Microsoft Defender External Attack Surface Management with Microsoft Security Exposure Management
13
+
# External Attack Surface Management initative in Exposure Management
14
14
15
-
Learn how to integrate Microsoft Defender External Attack Surface Management (MDEASM) with Microsoft Security Exposure Management (MSEM) to enhance visibility and control over your organization's external exposures. By connecting MDEASM insights to MSEM using the External Attack Surface Management initiative, you can assess the risk associated with your organization's or vendor's external attack surface and and manage your security posture more effectively within the Exposure Management portal.
15
+
Explore how to integrate Microsoft Defender External Attack Surface Management (MDEASM) with Microsoft Security Exposure Management (MSEM) to enhance visibility and control over your organization's external exposures. By connecting MDEASM insights to MSEM using the External Attack Surface Management initiative, you can assess the risk associated with your organization's or vendor's external attack surface and manage your security posture more effectively within the Exposure Management portal.
16
16
17
17
There are two ways to use this initiative:
18
18
-**Pre-built footprint**: Provides high-level insights using a predefined set of external assets, without requiring a full MDEASM subscription.
19
19
-**Full integration with MDEASM**: Connects directly to your MDEASM subscription for comprehensive exposure analysis and asset-level details.
20
20
21
-
## Using the EASM initative with pre-built footprint
21
+
## Using the EASM initiative with pre-built footprint
22
22
23
-
This approach with the initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only, hence does not require an active MDEASM subscription.
23
+
This approach with the initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only, hence doesn't require an active MDEASM subscription.
24
24
25
25
To configure your External Attack Surface initiative, you need to have **Global Administrator** role, or **Core security settings (manage)** permissions.
26
26
27
27
1. Go to the **Initiatives** page, select the **External Attack Surface Protection**, then choose **Open initiative page**.
28
28
1. Go to the **Connect data source** to open the settings tab.
29
29
30
-
> [!NOTE]
31
-
> If you have previously configured the initiative, you can select **Switch data source** to re-configure it with new data.
30
+
> [!NOTE]
31
+
> If you previously configured the initiative, you can select **Switch data source** to reconfigure it with new data.
32
32
33
33
3. Choose **Search for your organization's pre-built footprint**.
34
34
4. Select the footprint you want to use from the list of available pre-built footprints and choose **Connect**.
35
35
36
36
:::image type="content" source="media/EASM/EASM-Pre-built-footprint.png" alt-text="Screenshot of side panel for EASM pre-built footprint selection" lightbox="media/EASM/EASM-Pre-built-footprint.png":::
37
37
38
-
5. After 48 hours, the initiative will be populated with data from the selected footprint.
38
+
5. In up to 1 hour, the initiative will be populated with high-level metrics and scores from the selected footprint.
39
+
40
+
> [!NOTE]
41
+
> This approach does not provide asset level information and detailed exposure information.
39
42
40
43
## Using the EASM initiative with full MSEADM integration
41
44
@@ -49,7 +52,7 @@ If you haven’t already deployed an MDEASM resource, follow these steps:
49
52
1. Deploy an EASM resource:
50
53
1. Log into https://portal.azure.com.
51
54
2. Create a Resource Group with the appropriate subscription and region.
52
-
3. Deploy a MDEASM Resource within that group, see, [Create a Defender EASM Azure resource](https://learn.microsoft.com/en-us/azure/external-attack-surface-management/deploying-the-defender-easm-azure-resource).
55
+
3. Deploy an MDEASM Resource within that group, see, [Create a Defender EASM Azure resource](/azure/external-attack-surface-management/deploying-the-defender-easm-azure-resource).
53
56
54
57
1. Discover the attack surface
55
58
You can discover your attack surface in two ways:
@@ -62,7 +65,7 @@ If you haven’t already deployed an MDEASM resource, follow these steps:
62
65
- Emails
63
66
- WHOIS organization data
64
67
65
-
For more information, see, [Disovering your attack surface](https://learn.microsoft.com/en-us/azure/external-attack-surface-management/discovering-your-attack-surface)
68
+
For more information, see[Discovering your attack surface](/azure/external-attack-surface-management/discovering-your-attack-surface)
66
69
67
70
> [!TIP]
68
71
>
@@ -73,21 +76,24 @@ If you haven’t already deployed an MDEASM resource, follow these steps:
73
76
1. Go to the **Initiatives** page, select the **External Attack Surface Protection**, then choose **Open initiative page**.
74
77
1. Go to the **Connect data source** to open the settings tab.
75
78
76
-
> [!NOTE]
77
-
> If you have previously configured the initiative, you can select **Switch data source** to re-configure it with new data.
79
+
> [!NOTE]
80
+
> If you previously configured the initiative, you can select **Switch data source** to reconfigure it with new data.
81
+
82
+
1. Choose **Connect your MDEASM workspace**.
83
+
1. To enable the intitiative to pull data from your Defender EASM resource, enter the values from your resource's **Essentials** section on the **Overview** pane found in Azure.
78
84
79
-
1. Choose **Connect to your MDEASM workspace**.
80
-
1. Provide the following details from your Azure MDEASM resource:
81
85
-**Resource Name**
82
86
-**Subscription ID**
83
87
-**Resource Group Name**
84
88
-**Region**
85
89
86
-
:::image type="content" source="media/EASM/EASM-full_integration.png" alt-text="Screenshot of side panel for EASM initiative":::
90
+
:::image type="content" source="media/EASM/EASM-full_integration.png" alt-text="Screenshot of side panel for EASM initiative":::
91
+
92
+
1. Select **Connect**. After validation, data will begin flowing into the graph, and metrics will calculate within 32 hours.
87
93
88
-
1. Click **Connect**. After validation, data will begin flowing into the graph, and metrics will calculate within 48 hours.
94
+
You can review your security initiative data through security metrics that reflect various exposure types as assessed by the External Attack Surface assessment engine. Select a metric to view additional information such as the exposed assets and their types.
89
95
90
-
You can review your security initiative data through security metrics that reflect various exposure types as assessed by the External Attack Surface assessment engine. You can select a metric to view additional information such as the exposed assets and their types. You can also explore the data integrated from EASM using the Attack Surface Map to uncover insights related to your attack surface. You can search for various assets such as IP addresses, domains, hosts, and more, and review the findings on these assets.
96
+
Also explore the data integrated from EASM using the attack surface map to uncover insights related to your attack surface. You can search for various assets such as IP addresses, domains, hosts, and more, and review the findings on these assets.
0 commit comments