You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exposure-management/exposure-insights-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,7 +96,7 @@ Grayed out metrics aren't considered for score calculation.
96
96
97
97
## Working with recommendations
98
98
99
-
Security Exposure Management ingests security recommendations from multiple source, including Expsosure Management, [Microsoft Secure Score](/defender-xdr/microsoft-secure-score), and Microsoft Defender for Cloud. With the integration of Defender for Cloud in the Defender portal, Microsoft Security Exposure Management consolidates all of these recommendations into a unified Recommendations Catalog accessible in the Defender portal.
99
+
Security Exposure Management ingests security recommendations from multiple sources, including Exposure Management, [Microsoft Secure Score](/defender-xdr/microsoft-secure-score), and Microsoft Defender for Cloud. With the integration of Defender for Cloud in the Defender portal, Microsoft Security Exposure Management consolidates all of these recommendations into a unified Recommendations Catalog accessible in the Defender portal.
Copy file name to clipboardExpand all lines: exposure-management/security-recommendations.md
+59-53Lines changed: 59 additions & 53 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.date: 07/30/2025
13
13
14
14
This article describes how to work with security recommendations in the new unified recommendations experience in [Microsoft Security Exposure Management](microsoft-security-exposure-management.md).
15
15
16
-
## Prerequisites
16
+
## Before you start
17
17
18
18
- Learn about the [unified recommendations catalog](exposure-insights-overview.md#working-with-recommendations) before you start.
19
19
-[Review permissions and prerequisites needed](prerequisites.md) for working with Security Exposure Management.
@@ -34,40 +34,70 @@ You can explore the full breadth of Microsoft's security recommendations without
34
34
35
35
## Review recommendations
36
36
37
-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select **Exposure management > Exposure insights > Recommendations** to open the unified [Recommendations](https://security.microsoft.com/exposure-recommendations) page.
37
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), select **Exposure management > Recommendations** to open the unified [Recommendations](https://security.microsoft.com/exposure-recommendations) page.
38
38
39
39
:::image type="content" source="./media/recommendations-navigation.png" alt-text="Screenshot of the recommendations window." lightbox="./media/recommendations-navigation.png":::
40
40
41
41
### Navigate the new unified recommendations interface
42
42
43
-
1.**Use the attack surface tabs**: The recommendations are now organized by tabs for different domains:
44
-
-**Devices** - Device-related recommendations including misconfigurations and vulnerabilities
45
-
-**Cloud** - Multicloud (Azure, AWS, and GCP), hybrid environments and code recommendations with risk-based prioritization.
Use the recommendations tabs that are organized by asset type to explore specific recommendation categories:
49
44
50
-
1.**Separate views for issue types**: On the Devices tab, you'll find separate views for:
51
-
-**Misconfigurations** - Configuration-related security issues from MDVM, Microsoft Secure Score, and Security Exposure Management, contributing to the Devices Secure Score
52
-
-**Vulnerabilities** - Software vulnerabilities from MDVM requiring patches, preserving the familiar structure, fields, filters, and prioritization logic with the same exposure score
53
-
54
-
This separation recognizes that misconfigurations and vulnerabilities often represent distinct workflows handled by different personas, allowing for clearer prioritization and ownership.
45
+
-**Devices** - Device-related recommendations including misconfigurations and vulnerabilities
46
+
-**Cloud assets** - Multicloud (Azure, AWS, and GCP), hybrid environments and code recommendations with risk-based prioritization.
##Cloud recommendations with risk-based prioritization
51
+
#### Filter and sort recommendations
57
52
58
-
In the Defender portal, cloud recommendations are prioritized by risk, helping you focus on what matters most. The Cloud assets tab presents security recommendations related to cloud assets across your environment with enhanced context. It has separate views for misconfigurations, vulnerabilities, and exposed secrets.
53
+
There are several ways to filter and sort recommendations in each category to help you prioritize your security efforts effectively.
59
54
60
-
:::image type="content" source="media/security-recommendations/cloud-assets-security-recommendations.png" alt-text="Screenshots of cloud assets recommendations tab" lightbox="media/security-recommendations/cloud-assets-security-recommendations.png":::
55
+
Sort the recommendations by any of the headings or filter them based on your task needs.
61
56
62
-
With the integration of Defender for Cloud in the Defender portal, you can also access enhanced cloud recommendations through the unified interface:
57
+
Apply advanced filtering using the **Add filter** option to narrow down recommendations by various criteria depending on the recommendation type.
63
58
64
-
:::image type="content" source="./media/defender-for-cloud-defender-portal/recommendations.png" alt-text="Screenshot of unified cloud recommendations in the Defender portal." lightbox="./media/defender-for-cloud-defender-portal/recommendations.png":::
59
+
#### Devices
60
+
61
+
The Devices tab provides a unified view of device-related security recommendations, combining misconfigurations and vulnerabilities into a single location for easier management.
62
+
63
+
There are separate views for issue types:
64
+
65
+
-**Misconfigurations** - Configuration-related security issues from Vulnerability Management, Microsoft Secure Score, and Security Exposure Management, contributing to the Devices Secure Score
66
+
-**Vulnerabilities** - Software vulnerabilities from Vulnerability Management requiring patches, preserving the familiar structure, fields, filters, and prioritization logic with the same exposure score
65
67
66
-
### Cloud Secure Score integration
68
+
This separation recognizes that misconfigurations and vulnerabilities often represent distinct workflows handled by different personas, allowing for clearer prioritization and ownership.
67
69
68
-
The Cloud Secure Score provides comprehensive scoring alongside traditional Secure Score:
70
+
##Cloud assets
69
71
70
-
:::image type="content" source="./media/defender-for-cloud-defender-portal/cloud-secure-score.png" alt-text="Screenshot of Cloud Secure Score in the Defender portal." lightbox="./media/defender-for-cloud-defender-portal/cloud-secure-score.png":::
72
+
This tab provides a prioritized list of security actions designed to improve your cloud security posture by addressing vulnerabilities and misconfigurations. These recommendations are ranked by effective risk, helping security teams focus on the most critical threats first.
73
+
74
+
Apply filters and filter sets such as **Exposed asset**, **Asset risk factors**, **Environment**, **Workload**, **Recommendation maturity** and others.
75
+
76
+
On the left navigation pane, you can choose to either view all recommendations or view by a specific category.
77
+
78
+
There are separate views for issue types:
79
+
80
+
-**Misconfigurations**
81
+
-**Vulnerabilities**
82
+
-**Exposed Secrets**.
83
+
84
+
For each view you will view the **Cloud secure score**, **Score history**, **Recommendation by risk level** and how the risk is calculated.
85
+
86
+
:::image type="content" source="media/security-recommendations/cloud-assets-security-recommendations.png" alt-text="Screenshots of cloud assets recommendations tab" lightbox="media/security-recommendations/cloud-assets-security-recommendations.png":::
87
+
88
+
> [!NOTE]
89
+
> In the Defender portal, some recommendations that previously appeared as a single aggregated item now display as multiple individual recommendations. This change reflects a shift from grouping related findings under one recommendation to listing each recommendation separately.
90
+
91
+
> - You may notice a longer list of recommendations compared to before. Combined findings (such as vulnerabilities, exposed secrets, or misconfigurations) are now shown individually rather than nested under a parent recommendation.
92
+
> - The old grouped recommendations still appear side by side with the new format for now, but they will eventually be deprecated.
93
+
> - These recommendations are marked as Preview. This tag indicates that the recommendation is in an early state and does not affect Secure Score yet.
94
+
> - Secure Score currently applies to the parent recommendation only, not to each individual item.
95
+
>
96
+
**Tip**: If you see both formats or recommendations with a Preview tag, this is expected during the transition. The goal is to improve clarity and allow customers to act on specific recommendations more easily.
97
+
98
+
With the integration of Defender for Cloud in the Defender portal, you can also access enhanced cloud recommendations through the unified interface:
99
+
100
+
:::image type="content" source="./media/defender-for-cloud-defender-portal/recommendations.png" alt-text="Screenshot of unified cloud recommendations in the Defender portal." lightbox="./media/defender-for-cloud-defender-portal/recommendations.png":::
71
101
72
102
Key improvements in the cloud recommendations experience include:
73
103
@@ -76,40 +106,16 @@ Key improvements in the cloud recommendations experience include:
76
106
-**Enhanced data**: Core recommendation data from Azure Recommendations enriched with additional fields and capabilities from Exposure Management
77
107
-**Prioritized by criticality**: Greater emphasis on critical issues that pose the highest risk to your organization
78
108
79
-
## Device vulnerabilities and misconfigurations
80
-
81
-
The Devices tab maintains familiar functionality while benefiting from the unified catalog structure:
82
-
83
-
### Device vulnerabilities
84
-
85
-
-**Preserved experience**: The same table structure, fields, filters, and prioritization logic from MDVM
86
-
-**Familiar exposure scoring**: Uses the established exposure score methodology for assessing device vulnerability
87
-
-**Integrated workflow**: Part of the unified experience while maintaining specialized vulnerability management workflows
88
-
89
-
### Device misconfigurations
109
+
#### SaaS apps, Identities, and Data tabs
90
110
91
-
-**Unified data sources**: Combines device-related misconfiguration recommendations from MDVM, Microsoft Secure Score, and Security Exposure Management
92
-
-**Secure Score contribution**: Recommendations contribute to the Devices Secure Score following Microsoft's established calculation methodology
93
-
-**Enhanced baseline logic**: Based on MDVM's device recommendations enhanced with additional context from other sources
111
+
These tabs provide recommendations specific to SaaS applications, identity security, and data protection, respectively. Each tab allows you to filter and sort recommendations to focus on the most relevant security actions for your organization.
94
112
95
-
1.**Use enhanced filtering and sorting**: Sort the recommendations by any of the headings or filter them based on your task needs. Sorting includes all of the headers:
96
-
-**Name** - Recommendation name
97
-
-**State** - Compliant or not compliant
98
-
-**Impact** - High, low, or medium impact
99
-
-**Workload** - Which workload the recommendations relate to
100
-
-**Domain** - Device, apps, data, or identity
101
-
-**Risk Score** - For cloud recommendations, shows calculated risk score based on asset value and other factors
102
-
-**Last calculated** - Last time the recommendation was calculated
103
-
-**Last state change** - Last time the recommendation state changed
104
-
-**Related initiatives** - The number of related initiatives
105
-
-**Related metrics** - The number of related metrics
113
+
The recommendations summary on these tabs includes:
1. Select a recommendation to view and review details.
115
121
@@ -125,7 +131,7 @@ You can also review recommendations on the **Recommendations** tab in a specific
125
131
- Microsoft Secure Score for Microsoft 365 recommendations
126
132
- Other Microsoft workloads as appropriate
127
133
128
-
1.**Note on unified workflow**: All recommendations, including those from Azure security center, are now visible in MSEM, so you can manage your entire security posture from the unified portal without needing to navigate to separate Azure portals for cloud recommendations.
134
+
1.**Note on unified workflow**: All recommendations, including those from Azure security center, are now visible in Exposure Management, so you can manage your entire security posture from the unified portal without needing to navigate to separate Azure portals for cloud recommendations.
0 commit comments