You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/enterprise-exposure-map.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlanger
6
6
manager: rayne-wiselman
7
7
ms.topic: overview
8
8
ms.service: exposure-management
9
-
ms.date: 11/18/2024
9
+
ms.date: 09/09/2025
10
10
11
11
---
12
12
@@ -37,7 +37,7 @@ The exposure map gives you visibility into asset connections.
37
37
-**Hovering**: Hover over nodes and edges to get additional information.
38
38
-**Explore assets and their edges**. To explore assets and edge, select the plus sign. Or select the option to explore connected assets from the contextual menu.
39
39
-**Asset details**: To view details, select the asset icon.
40
-
-**Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md).
40
+
-**Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focuses on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
41
41
-**Search**: Helps you to discover items by node type. By selecting **all results**, search the particular type for specific results. You can also filter your search by devices, identity, or cloud assets from the initial screen.
42
42
-**Discovery source**: Use the layer option to show or hide the origin of the data directly on the attack surface map.
-[Read about attack paths](work-attack-paths-overview.md) before you start.
19
-
--[Review required permissions](prerequisites.md#permissions) for working with attack paths.
19
+
-[Review required permissions](prerequisites.md#permissions) for working with attack paths.
20
20
- The value of attack paths increases based on the data used as a source. If no data is available or the data doesn't reflect your organization's environment, attack paths might not appear. Attack paths might not be fully representative:
21
21
- If you don't have licenses defined for workloads integrated and represented in the attack path.
22
22
- If you don't fully define critical assets.
23
+
- You may see an empty Cloud Attack Path page, as attack paths focus on real, externally-driven and exploitable threats rather than exploratory scenarios. This helps reduce noise and prioritize imminent risks.
Copy file name to clipboardExpand all lines: exposure-management/whats-new.md
+13-1Lines changed: 13 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlanger
6
6
manager: rayne-wiselman
7
7
ms.topic: overview
8
8
ms.service: exposure-management
9
-
ms.date: 05/26/2025
9
+
ms.date: 09/09/2025
10
10
11
11
---
12
12
@@ -24,6 +24,18 @@ Learn more about MSEM by reading the blogs, [here](https://techcommunity.microso
24
24
>
25
25
> `https://aka.ms/msem/rss`
26
26
27
+
## September 2025
28
+
29
+
### Refined attack path experience
30
+
31
+
Cloud Attack Paths now reflect real, externally driven and exploitable risks that adversaries could use to compromise your organization, helping you cut through the noise and act faster. The paths now focus on external entry points and how attackers could progress through your environment reaching business-critical targets.
32
+
33
+
On-premises Attack Path now terminate automatically when they reach End Game assets (Domain Admins, Enterprise Admins, Administrators, or Domain Controllers). These assets provide full domain control if compromised. The visualization and prioritization of attack path risks for on-premises infrastructure provide consistent clarity, enabling security teams to focus on high-impact scenarios and reduce noise.
34
+
35
+
The changes bring greater clarity, focus, and prioritization empowering security teams to mitigate the most critical risks with confidence.
36
+
37
+
For more information, see [Overview of attack paths](work-attack-paths-overview.md) and [Review attack paths](review-attack-paths.md).
38
+
27
39
## May 2025
28
40
29
41
### Enhanced External Attack Surface Management integration with Exposure Management
Copy file name to clipboardExpand all lines: exposure-management/work-attack-paths-overview.md
+18-2Lines changed: 18 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,10 @@ title: Overview of attack paths in Microsoft Security Exposure Management
3
3
description: Learn how to mitigate security risks using attack paths in Microsoft Security Exposure Management.
4
4
ms.author: dlanger
5
5
author: dlanger
6
-
manager: rayne-wiselman
6
+
manager: ornat-spodek
7
7
ms.topic: overview
8
8
ms.service: exposure-management
9
-
ms.date: 11/18/2024
9
+
ms.date: 09/09/2025
10
10
11
11
---
12
12
@@ -16,6 +16,8 @@ Microsoft Security Exposure Management helps you to manage your company attack s
16
16
17
17
> [!NOTE]
18
18
> The value of attack paths increases based on the data used as a source. If no data is available or the data doesn't reflect your organization's environment, attack paths might not appear. Attack paths might not be fully representative if you don't have licenses defined for workloads integrated and represented in the attack path or if you haven't fully defined critical assets.
19
+
>
20
+
> You may see an empty Attack Path page, as the experience focuses on imminent threats rather than exploratory scenarios.
19
21
20
22
## Attack path dashboard
21
23
@@ -42,6 +44,20 @@ Here's how Exposure Management helps you to identify and resolve attack paths.
42
44
-**Protection**: Ensuring that choke points are secure protects your assets from threats.
43
45
-**Blast radius**: Allows users to visually explore the highest-risk paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
44
46
47
+
## Cloud and on-premises attack paths
48
+
49
+
### Cloud attack paths
50
+
51
+
Cloud Attack paths illustrate routes that adversaries could exploit to move laterally within your environment, starting from external exposure and progressing toward meaningful impact within your environment. They help security teams visualize and prioritize real-world risks across their attack surface, focusing on externally-driven, exploitable threats that adversaries could use to compromise your organization.
52
+
53
+
Cloud attack paths reflect real, externally driven and exploitable risks, helping you cut through the noise and act faster. The paths focus on external entry points and how attackers could progress through your environment reaching business-critical targets.
54
+
55
+
Attack Path expands cloud threat detection to cover a broad range of cloud resources, including storage accounts, containers, serverless environments, unprotected repositories, unmanaged APIs, and AI agents. Each attack path is built from a real, exploitable weakness such as exposed endpoints, misconfigured access settings, or leaked credentials, ensuring that identified threats reflect genuine risk scenarios. By analyzing cloud configuration data and performing active reachability scans, the system validates whether exposures are accessible from outside the environment, reducing false positives and emphasizing threats that are both real and actionable.
56
+
57
+
### On-premises attack paths
58
+
59
+
Attack paths now terminate automatically when they reach End Game assets (Domain Admins, Enterprise Admins, Administrators, or Domain Controllers). These assets provide full domain control if compromised. The visualization and prioritization of attack path risks for on-premises infrastructure provide consistent clarity, enabling security teams to focus on high-impact scenarios and reduce noise
0 commit comments