Skip to content

Commit 8f32ab9

Browse files
committed
new links
1 parent a0c58e8 commit 8f32ab9

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

exposure-management/initiatives-list.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ Monitor the coverage and configuration of physical and virtual workstations, ser
3939

4040
IoT devices are often connected to endpoints, to one another or to the internet, which means they're potential targets for cyber attacks. It's imperative for businesses to monitor the security of their IoT devices, including their spread, configuration, connectivity, exposure, and behavior. This initiative provides overall visibility into the risk introduced by IoT devices in the enterprise and the resilience the organization has to mitigate it.
4141

42+
[Learn more here.](/defender-for-iot/review-security-initiatives)
43+
4244
## External Attack Surface Protection
4345

4446
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by leveraging vulnerability and infrastructure data to showcase the key areas of concern for your organization. This initiative requires no license and is complementary.
@@ -53,6 +55,8 @@ Identity security is the practice of protecting the digital identities of indivi
5355

5456
Monitors and safeguards Operational Technology (OT) environments within the organization by employing network layer monitoring. This initiative identifies devices across physical sites, pinpoints their risks, and ensures comprehensive protection and security management of OT systems.
5557

58+
[Learn more here.](/defender-for-iot/review-security-initiatives)
59+
5660
## Ransomware Protection
5761

5862
Ransomware attacks have become increasingly common in recent years, and they can have a devastating impact on organizations. Organizations can and should be proactive in managing a good security posture against ransomware. One of the first steps is to ensure that recommended controls are in place and are utilized and configured properly, hence reducing the risk of a successful ransomware attack making way into corporate networks and assets.

0 commit comments

Comments
 (0)