Skip to content

Commit 89fd477

Browse files
committed
Merge branch 'US294992_EASM' of https://github.com/DebLanger/defender-docs-pr into US294992_EASM
2 parents 3f349fc + de0f84c commit 89fd477

File tree

3 files changed

+26
-17
lines changed

3 files changed

+26
-17
lines changed

exposure-management/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@
7070
href: initiatives.md
7171
- name: Security initiatives catalog
7272
href: initiatives-list.md
73+
items:
74+
- name: External attack surface management initiative
75+
href: external-attack-surface-management-initiative.md
7376
- name: Investigate security initiative metrics
7477
href: security-metrics.md
7578
- name: Review security recommendations

exposure-management/exposure-insights-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Security Exposure Management provides initiatives that currently include:
4444

4545
- **External Attack Surface Management Initiative**: Assess the risk associated with your organization's or vendor's external attack surface. This initiative offers insights into identified exposures on the selected vendor. By leveraging this initiative, organizations can understand their risk exposure, prioritize security efforts, and proactively manage their security posture.
4646

47-
For more information about the external attack surface management initiative, see [External attack surface management initiative](external-attack-surface-management-initiative.md).
47+
For more information about the external attack surface management initiative, see [External attack surface management initiative](external-attack-surface-management-initiative.md).
4848

4949
> [!IMPORTANT]
5050
> Initiatives that are in preview are marked accordingly. Preview initiatives are still in development, and are subject to change.

exposure-management/external-attack-surface-management-initiative.md

Lines changed: 22 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -10,32 +10,35 @@ ms.date: 05/19/2025
1010
---
1111

1212

13-
# Integrating Microsoft Defender External Attack Surface Management with Microsoft Security Exposure Management
13+
# External Attack Surface Management initative in Exposure Management
1414

15-
Learn how to integrate Microsoft Defender External Attack Surface Management (MDEASM) with Microsoft Security Exposure Management (MSEM) to enhance visibility and control over your organization's external exposures. By connecting MDEASM insights to MSEM using the External Attack Surface Management initiative, you can assess the risk associated with your organization's or vendor's external attack surface and and manage your security posture more effectively within the Exposure Management portal.
15+
Explore how to integrate Microsoft Defender External Attack Surface Management (MDEASM) with Microsoft Security Exposure Management (MSEM) to enhance visibility and control over your organization's external exposures. By connecting MDEASM insights to MSEM using the External Attack Surface Management initiative, you can assess the risk associated with your organization's or vendor's external attack surface and manage your security posture more effectively within the Exposure Management portal.
1616

1717
There are two ways to use this initiative:
1818
- **Pre-built footprint**: Provides high-level insights using a predefined set of external assets, without requiring a full MDEASM subscription.
1919
- **Full integration with MDEASM**: Connects directly to your MDEASM subscription for comprehensive exposure analysis and asset-level details.
2020

21-
## Using the EASM initative with pre-built footprint
21+
## Using the EASM initiative with pre-built footprint
2222

23-
This approach with the initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only, hence does not require an active MDEASM subscription.
23+
This approach with the initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only, hence doesn't require an active MDEASM subscription.
2424

2525
To configure your External Attack Surface initiative, you need to have **Global Administrator** role, or **Core security settings (manage)** permissions.
2626

2727
1. Go to the **Initiatives** page, select the **External Attack Surface Protection**, then choose **Open initiative page**.
2828
1. Go to the **Connect data source** to open the settings tab.
2929

30-
> [!NOTE]
31-
> If you have previously configured the initiative, you can select **Switch data source** to re-configure it with new data.
30+
> [!NOTE]
31+
> If you previously configured the initiative, you can select **Switch data source** to reconfigure it with new data.
3232
3333
3. Choose **Search for your organization's pre-built footprint**.
3434
4. Select the footprint you want to use from the list of available pre-built footprints and choose **Connect**.
3535

3636
:::image type="content" source="media/EASM/EASM-Pre-built-footprint.png" alt-text="Screenshot of side panel for EASM pre-built footprint selection" lightbox="media/EASM/EASM-Pre-built-footprint.png":::
3737

38-
5. After 48 hours, the initiative will be populated with data from the selected footprint.
38+
5. In up to 1 hour, the initiative will be populated with high-level metrics and scores from the selected footprint.
39+
40+
> [!NOTE]
41+
> This approach does not provide asset level information and detailed exposure information.
3942
4043
## Using the EASM initiative with full MSEADM integration
4144

@@ -49,7 +52,7 @@ If you haven’t already deployed an MDEASM resource, follow these steps:
4952
1. Deploy an EASM resource:
5053
1. Log into https://portal.azure.com.
5154
2. Create a Resource Group with the appropriate subscription and region.
52-
3. Deploy a MDEASM Resource within that group, see, [Create a Defender EASM Azure resource](https://learn.microsoft.com/en-us/azure/external-attack-surface-management/deploying-the-defender-easm-azure-resource).
55+
3. Deploy an MDEASM Resource within that group, see, [Create a Defender EASM Azure resource](/azure/external-attack-surface-management/deploying-the-defender-easm-azure-resource).
5356

5457
1. Discover the attack surface
5558
You can discover your attack surface in two ways:
@@ -62,7 +65,7 @@ If you haven’t already deployed an MDEASM resource, follow these steps:
6265
- Emails
6366
- WHOIS organization data
6467

65-
For more information, see, [Disovering your attack surface](https://learn.microsoft.com/en-us/azure/external-attack-surface-management/discovering-your-attack-surface)
68+
For more information, see [Discovering your attack surface](/azure/external-attack-surface-management/discovering-your-attack-surface)
6669

6770
> [!TIP]
6871
>
@@ -73,21 +76,24 @@ If you haven’t already deployed an MDEASM resource, follow these steps:
7376
1. Go to the **Initiatives** page, select the **External Attack Surface Protection**, then choose **Open initiative page**.
7477
1. Go to the **Connect data source** to open the settings tab.
7578

76-
> [!NOTE]
77-
> If you have previously configured the initiative, you can select **Switch data source** to re-configure it with new data.
79+
> [!NOTE]
80+
> If you previously configured the initiative, you can select **Switch data source** to reconfigure it with new data.
81+
82+
1. Choose **Connect your MDEASM workspace**.
83+
1. To enable the intitiative to pull data from your Defender EASM resource, enter the values from your resource's **Essentials** section on the **Overview** pane found in Azure.
7884

79-
1. Choose **Connect to your MDEASM workspace**.
80-
1. Provide the following details from your Azure MDEASM resource:
8185
- **Resource Name**
8286
- **Subscription ID**
8387
- **Resource Group Name**
8488
- **Region**
8589

86-
:::image type="content" source="media/EASM/EASM-full_integration.png" alt-text="Screenshot of side panel for EASM initiative":::
90+
:::image type="content" source="media/EASM/EASM-full_integration.png" alt-text="Screenshot of side panel for EASM initiative":::
91+
92+
1. Select **Connect**. After validation, data will begin flowing into the graph, and metrics will calculate within 32 hours.
8793

88-
1. Click **Connect**. After validation, data will begin flowing into the graph, and metrics will calculate within 48 hours.
94+
You can review your security initiative data through security metrics that reflect various exposure types as assessed by the External Attack Surface assessment engine. Select a metric to view additional information such as the exposed assets and their types.
8995

90-
You can review your security initiative data through security metrics that reflect various exposure types as assessed by the External Attack Surface assessment engine. You can select a metric to view additional information such as the exposed assets and their types. You can also explore the data integrated from EASM using the Attack Surface Map to uncover insights related to your attack surface. You can search for various assets such as IP addresses, domains, hosts, and more, and review the findings on these assets.
96+
Also explore the data integrated from EASM using the attack surface map to uncover insights related to your attack surface. You can search for various assets such as IP addresses, domains, hosts, and more, and review the findings on these assets.
9197

9298
## Next steps
9399

0 commit comments

Comments
 (0)