|
| 1 | +--- |
| 2 | +title: External Attack Surface Management Initiative |
| 3 | +description: Learn how to get MDEASM insights into your corporate attack surface with the initiative in Microsoft Security Exposure Management. |
| 4 | +ms.author: dlanger |
| 5 | +author: dlanger |
| 6 | +manager: ornat-spodek |
| 7 | +ms.topic: how-to |
| 8 | +ms.service: exposure-management |
| 9 | +ms.date: 05/27/2025 |
| 10 | +--- |
| 11 | + |
| 12 | + |
| 13 | +# External Attack Surface Management initiative in Exposure Management |
| 14 | + |
| 15 | +Explore how to integrate Microsoft Defender External Attack Surface Management (MDEASM) with Microsoft Security Exposure Management (MSEM) to enhance visibility and control over your organization's external exposures. By connecting MDEASM insights to MSEM using the External Attack Surface Management initiative, you can assess the risk associated with your organization's or vendor's external attack surface and manage your security posture more effectively within the Exposure Management portal. |
| 16 | + |
| 17 | +There are two ways to use this initiative: |
| 18 | +- **Pre-built footprint**: Provides high-level insights using a predefined set of external assets, without requiring a full MDEASM subscription. |
| 19 | +- **Full integration with MDEASM**: Connects directly to your MDEASM subscription for comprehensive exposure analysis and asset-level details. |
| 20 | + |
| 21 | +## Using the EASM initiative with pre-built footprint |
| 22 | + |
| 23 | +This approach with the initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only and doesn't require an active MDEASM subscription. |
| 24 | + |
| 25 | +**Prerequisites**: To configure your External Attack Surface initiative, you need to have **Global Administrator** role, or **Core security settings (manage)** permissions. |
| 26 | + |
| 27 | +1. Go to the **Initiatives** page, select the **External Attack Surface Protection**, then choose **Open initiative page**. |
| 28 | +1. Go to the **Connect data source** to open the settings tab. |
| 29 | + |
| 30 | + > [!NOTE] |
| 31 | + > If you previously configured the initiative, you can select **Switch data source** to reconfigure it with new data. |
| 32 | +
|
| 33 | +3. Choose **Search for your organization's pre-built footprint**. |
| 34 | +4. Select the footprint you want to use from the list of available pre-built footprints and choose **Connect**. |
| 35 | + |
| 36 | +:::image type="content" source="media/EASM/EASM-Pre-built-footprint.png" alt-text="Screenshot of side panel for EASM pre-built footprint selection" lightbox="media/EASM/EASM-Pre-built-footprint.png"::: |
| 37 | + |
| 38 | +5. In up to 1 hour, the initiative is populated with high-level metrics and scores from the selected footprint. |
| 39 | + |
| 40 | + > [!NOTE] |
| 41 | + > This approach doesn't provide asset level information and detailed exposure information. |
| 42 | +
|
| 43 | +## Using the EASM initiative with full MDEASM integration |
| 44 | + |
| 45 | +**Prerequisites**: |
| 46 | +This approach requires a full MDEASM subscription (trial or paid) and provides comprehensive exposure analysis and asset-level details. |
| 47 | +To configure your External Attack Surface initiative, you need to have **Global Administrator** role, or **Core security settings (manage)** permissions. |
| 48 | + |
| 49 | +> [!NOTE] |
| 50 | +> External attack surface assets do not support scoping, so all users with access can see all collected data. |
| 51 | +
|
| 52 | +### Environment setup: |
| 53 | + |
| 54 | +To deploy an MDEASM resource, follow these steps: |
| 55 | + |
| 56 | +1. Log into [https://portal.azure.com](https://portal.azure.com). |
| 57 | +2. Create a Resource Group with the appropriate subscription and region. |
| 58 | +3. Deploy an MDEASM Resource within that group, see, [Create a Defender EASM Azure resource](/azure/external-attack-surface-management/deploying-the-defender-easm-azure-resource). Each new resource will automatically get a free 30 day trial. |
| 59 | + |
| 60 | +**Discover the attack surface** |
| 61 | + |
| 62 | +You can discover your attack surface in two ways: |
| 63 | + |
| 64 | +1. Use the **Get Started** option to search for your organization and build a preconfigured attack surface. |
| 65 | +1. Or, create a custom discovery group by providing: |
| 66 | + |
| 67 | +- Domains |
| 68 | +- IP Blocks or Addresses (use example IPs such as 203.0.113.0 if needed) |
| 69 | +- Hosts |
| 70 | +- ASNs |
| 71 | +- Emails |
| 72 | +- WHOIS organization data |
| 73 | + |
| 74 | +For more information, see [Discovering your attack surface](/azure/external-attack-surface-management/discovering-your-attack-surface) |
| 75 | + |
| 76 | +> [!TIP] |
| 77 | +> The easiest path is to provide a host, domain, and any known external IP addresses. |
| 78 | +
|
| 79 | +### Configure the initiative |
| 80 | + |
| 81 | +1. Go to the **Initiatives** page, select the **External Attack Surface Protection**, then choose **Open initiative page**. |
| 82 | +1. Go to the **Connect data source** to open the settings tab. |
| 83 | + |
| 84 | + > [!NOTE] |
| 85 | + > If you previously configured the initiative, you can select **Switch data source** to reconfigure it with new data. |
| 86 | +
|
| 87 | +1. Choose **Connect your MDEASM workspace**. |
| 88 | +1. To enable the initiative to pull data from your Defender EASM resource, enter the values from your resource's **Essentials** section on the **Overview** pane found in Azure. |
| 89 | + |
| 90 | + - **Resource Name** |
| 91 | + - **Subscription ID** |
| 92 | + - **Resource Group Name** |
| 93 | + - **Region** |
| 94 | + |
| 95 | + :::image type="content" source="media/EASM/EASM-full_integration.png" alt-text="Screenshot of side panel for EASM initiative"::: |
| 96 | + |
| 97 | +1. Select **Connect**. After validation, data will begin flowing into the graph, and metrics will calculate within 32 hours. |
| 98 | + |
| 99 | +You can review your security initiative data through security metrics that reflect various exposure types as assessed by the External Attack Surface assessment engine. Select a metric to view additional information such as the exposed assets and their types. |
| 100 | + |
| 101 | +Also explore the data integrated from EASM using the attack surface map to uncover insights related to your attack surface. You can search for various assets such as IP addresses, domains, hosts, and more, and review the findings on these assets. |
| 102 | + |
| 103 | +## Next steps |
| 104 | + |
| 105 | +- [Investigate security initiative metrics](security-metrics.md) |
0 commit comments