You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Levering insights from data connectors in Microsoft Security Exposure Management
3
+
description: Learn about leveraging the data connectors in Microsoft Security Exposure Management.
4
+
ms.author: dlanger
5
+
author: dlanger
6
+
manager: rayne-wiselman
7
+
ms.topic: overview
8
+
ms.service: exposure-management
9
+
ms.date: 09/11/2024
10
+
---
11
+
12
+
# Leverage insights from data connectors
13
+
14
+
[Microsoft Security Exposure Management](microsoft-security-exposure-management.md) consolidates security posture data from all your digital assets enabling you to map your attack surface and focus your security efforts on areas at greatest risk. The data from Microsoft products gets ingested automatically once connected to Exposure Management, and you can add more data connectors from external data sources.
15
+
16
+
## Imported assets and types
17
+
18
+
There are various types of assets available for consumption, such as digital assets, customer relationship management (CRM) systems, and mobile applications.
19
+
20
+
- Devices
21
+
- Vulnerabilities
22
+
- Users (future)
23
+
- Software (future)
24
+
- SaaS Applications (future)
25
+
26
+
The asset information imported into Exposure Management includes data from external data sources like Qualys, Rapid7, and ServiceNow CMDB environments. This data is consolidated to provide a comprehensive view of the security posture across all digital assets.
27
+
28
+
## Viewing the imported data
29
+
30
+
The data from the imported assets will appear in the device inventories and the exposure graph. Exposure Management also offers integration with critical asset protection, attack paths, metrics, and initiatives. It provides insights into potential attack paths and entry points that could compromise critical assets. It also offers metrics and recommendations to help prioritize actions to protect these assets.
31
+
32
+
The information brought into the system includes:
33
+
34
+
- Device and service data from systems, including OS
35
+
- Distribution
36
+
- Interfaces
37
+
- Network details
38
+
- Last users
39
+
40
+
[INSERT IMAGE]
41
+
42
+
## Next steps
43
+
44
+
[Configuring your data connectors](configure-data-connectors.md)
Copy file name to clipboardExpand all lines: exposure-management/predefined-classification-rules-and-levels.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,12 +31,13 @@ Current asset types are:
31
31
| ADCS | Device | Medium | ADCS server allows administrators to fully implement a public key infrastructure (PKI) and issue digital certificates that can be used to secure multiple resources on a network. Moreover, ADCS can be used for various security solutions, such as SSL encryption, user authentication, and secure email. |
32
32
| ADFS | Device | High | ADFS server provides users with single sign-on access to systems and applications located across organizational boundaries. It uses a claims-based access control authorization model to maintain application security and implement federated identity. |
33
33
| Backup | Device | Medium | Backup server is responsible for safeguarding data through regular backups, ensuring data protection and disaster recovery readiness. |
34
-
| Domain Admin Machines| Device | High | Domain admin machines are machines that one or more of the domain admins are frequently logged into. These devices are likely to store related files, documents, and credentials used by the domain admins. |
34
+
| Domain Admin Device| Device | High | Domain admin devices are devices that one or more of the domain admins are frequently logged into. These devices are likely to store related files, documents, and credentials used by the domain admins. |
35
35
| Domain Controller | Device | High | Domain controller server is responsible for user authentication, authorization, and centralized management of network resources within an active directory domain. |
36
+
| DNS | Device | Medium | The DNS server is essential for resolving domain names to IP addresses, enabling network communication and access to resources both internally and externally. |
36
37
| Exchange | Device | Medium | Exchange server is responsible for all the mail traffic within the organization. Depending on the setup and architecture, each server might hold several mail databases that store highly sensitive organizational information. |
37
38
| SCCM | Device | Medium | SCCM is used for managing endpoints in a large network, including patch management, software distribution, and inventory management. |
38
-
|ITAdminDevice| Device | Medium | Critical devices used to configure, manage, and monitor the assets within the organization are vital for IT administration and are at high risk of cyber threats. They require top-level security to prevent unauthorized access. |
39
-
|NetworkAdminDevice| Device | Medium | Critical devices used to configure, manage, and monitor the network assets within the organization are vital for network administration and are at high risk of cyber threats. They require top-level security to prevent unauthorized access. |
39
+
|IT Admin Device| Device | Medium | Critical devices used to configure, manage, and monitor the assets within the organization are vital for IT administration and are at high risk of cyber threats. They require top-level security to prevent unauthorized access. |
40
+
|Network Admin Device| Device | Medium | Critical devices used to configure, manage, and monitor the network assets within the organization are vital for network administration and are at high risk of cyber threats. They require top-level security to prevent unauthorized access. |
40
41
| VMware ESXi | Device | High | The VMware ESXi hypervisor is essential for running and managing virtual machines within your infrastructure. As a bare-metal hypervisor, it's providing the foundation for creating and managing virtual resources. |
41
42
| VMware vCenter | Device | High | The VMware vCenter Server is crucial for managing virtual environments. It provides centralized management of virtual machines and ESXi hosts. If it fails, it could disrupt the administration and control of your virtual infrastructure, including provisioning, migration, load balancing of virtual machines, and datacenter automation. However, as there are often redundant vCenter Servers and High Availability configurations, the immediate halt of all operations might not occur. Its failure could still cause significant inconvenience and potential performance issues |
0 commit comments