Skip to content

Commit b13658a

Browse files
authored
Merge pull request #4710 from DebLanger/US477096_AP
Update attack path documentation for refined experience in MSEM
2 parents b79ea96 + b98ac94 commit b13658a

File tree

4 files changed

+36
-7
lines changed

4 files changed

+36
-7
lines changed

exposure-management/enterprise-exposure-map.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 11/18/2024
9+
ms.date: 09/09/2025
1010

1111
---
1212

@@ -37,7 +37,7 @@ The exposure map gives you visibility into asset connections.
3737
- **Hovering**: Hover over nodes and edges to get additional information.
3838
- **Explore assets and their edges**. To explore assets and edge, select the plus sign. Or select the option to explore connected assets from the contextual menu.
3939
- **Asset details**: To view details, select the asset icon.
40-
- **Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md).
40+
- **Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focuses on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
4141
- **Search**: Helps you to discover items by node type. By selecting **all results**, search the particular type for specific results. You can also filter your search by devices, identity, or cloud assets from the initial screen.
4242
- **Discovery source**: Use the layer option to show or hide the origin of the data directly on the attack surface map.
4343

exposure-management/review-attack-paths.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 11/04/2024
9+
ms.date: 09/09/2025
1010
---
1111

1212
# Review attack paths
@@ -16,10 +16,11 @@ Attack paths in [Microsoft Security Exposure Management](microsoft-security-expo
1616
## Prerequisites
1717

1818
- [Read about attack paths](work-attack-paths-overview.md) before you start.
19-
-- [Review required permissions](prerequisites.md#permissions) for working with attack paths.
19+
- [Review required permissions](prerequisites.md#permissions) for working with attack paths.
2020
- The value of attack paths increases based on the data used as a source. If no data is available or the data doesn't reflect your organization's environment, attack paths might not appear. Attack paths might not be fully representative:
2121
- If you don't have licenses defined for workloads integrated and represented in the attack path.
2222
- If you don't fully define critical assets.
23+
- You may see an empty Cloud Attack Path page, as attack paths focus on real, externally-driven and exploitable threats rather than exploratory scenarios. This helps reduce noise and prioritize imminent risks.
2324

2425
### Attack path dashboard
2526

exposure-management/whats-new.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: rayne-wiselman
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 05/26/2025
9+
ms.date: 09/09/2025
1010

1111
---
1212

@@ -24,6 +24,18 @@ Learn more about MSEM by reading the blogs, [here](https://techcommunity.microso
2424
>
2525
> `https://aka.ms/msem/rss`
2626
27+
## September 2025
28+
29+
### Refined attack path experience
30+
31+
Cloud Attack Paths now reflect real, externally driven and exploitable risks that adversaries could use to compromise your organization, helping you cut through the noise and act faster. The paths now focus on external entry points and how attackers could progress through your environment reaching business-critical targets.
32+
33+
On-premises Attack Path now terminate automatically when they reach End Game assets (Domain Admins, Enterprise Admins, Administrators, or Domain Controllers). These assets provide full domain control if compromised. The visualization and prioritization of attack path risks for on-premises infrastructure provide consistent clarity, enabling security teams to focus on high-impact scenarios and reduce noise.
34+
35+
The changes bring greater clarity, focus, and prioritization empowering security teams to mitigate the most critical risks with confidence.
36+
37+
For more information, see [Overview of attack paths](work-attack-paths-overview.md) and [Review attack paths](review-attack-paths.md).
38+
2739
## May 2025
2840

2941
### Enhanced External Attack Surface Management integration with Exposure Management

exposure-management/work-attack-paths-overview.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: Overview of attack paths in Microsoft Security Exposure Management
33
description: Learn how to mitigate security risks using attack paths in Microsoft Security Exposure Management.
44
ms.author: dlanger
55
author: dlanger
6-
manager: rayne-wiselman
6+
manager: ornat-spodek
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 11/18/2024
9+
ms.date: 09/09/2025
1010

1111
---
1212

@@ -16,6 +16,8 @@ Microsoft Security Exposure Management helps you to manage your company attack s
1616

1717
> [!NOTE]
1818
> The value of attack paths increases based on the data used as a source. If no data is available or the data doesn't reflect your organization's environment, attack paths might not appear. Attack paths might not be fully representative if you don't have licenses defined for workloads integrated and represented in the attack path or if you haven't fully defined critical assets.
19+
>
20+
> You may see an empty Attack Path page, as the experience focuses on imminent threats rather than exploratory scenarios.
1921
2022
## Attack path dashboard
2123

@@ -42,6 +44,20 @@ Here's how Exposure Management helps you to identify and resolve attack paths.
4244
- **Protection**: Ensuring that choke points are secure protects your assets from threats.
4345
- **Blast radius**: Allows users to visually explore the highest-risk paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
4446

47+
## Cloud and on-premises attack paths
48+
49+
### Cloud attack paths
50+
51+
Cloud Attack paths illustrate routes that adversaries could exploit to move laterally within your environment, starting from external exposure and progressing toward meaningful impact within your environment. They help security teams visualize and prioritize real-world risks across their attack surface, focusing on externally-driven, exploitable threats that adversaries could use to compromise your organization.
52+
53+
Cloud attack paths reflect real, externally driven and exploitable risks, helping you cut through the noise and act faster. The paths focus on external entry points and how attackers could progress through your environment reaching business-critical targets.
54+
55+
Attack Path expands cloud threat detection to cover a broad range of cloud resources, including storage accounts, containers, serverless environments, unprotected repositories, unmanaged APIs, and AI agents. Each attack path is built from a real, exploitable weakness such as exposed endpoints, misconfigured access settings, or leaked credentials, ensuring that identified threats reflect genuine risk scenarios. By analyzing cloud configuration data and performing active reachability scans, the system validates whether exposures are accessible from outside the environment, reducing false positives and emphasizing threats that are both real and actionable.
56+
57+
### On-premises attack paths
58+
59+
Attack paths now terminate automatically when they reach End Game assets (Domain Admins, Enterprise Admins, Administrators, or Domain Controllers). These assets provide full domain control if compromised. The visualization and prioritization of attack path risks for on-premises infrastructure provide consistent clarity, enabling security teams to focus on high-impact scenarios and reduce noise
60+
4561
## Next steps
4662

4763
[Review attack paths](review-attack-paths.md).

0 commit comments

Comments
 (0)