Skip to content

Commit ed41ae3

Browse files
committed
update images
1 parent 4ae067e commit ed41ae3

File tree

4 files changed

+12
-16
lines changed

4 files changed

+12
-16
lines changed

exposure-management/microsoft-security-exposure-management.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,6 @@ Currently, Security Exposure Management consolidates security posture informatio
7575
In addition to Microsoft services, Security Exposure Management allows you to connect to external data sources to further enrich and extend your security posture management.
7676
For more information on data connectors, see [Data connectors overview](overview-data-connectors.md).
7777

78-
7978
## Next steps
8079

8180
Review [prerequisites](prerequisites.md) to get started with Security Exposure Management.

exposure-management/prerequisites.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ Permissions are based on [Microsoft Entra ID Roles](/entra/identity/role-based-a
2323

2424
- For full Security Exposure Management access, user roles need access to all Defender for Endpoint [device groups](/microsoft-365/security//defender-endpoint/machine-groups).
2525
- Users who have access restricted to some of the organization's device groups (and not to all), can:
26-
- Access global exposure insights data.
27-
- View affected assets under metrics, recommendations, events, and initiatives history only within users' scope
28-
- View devices in attack paths that are within the users' scope
29-
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups to which they have access
26+
- Access global exposure insights data.
27+
- View affected assets under metrics, recommendations, events, and initiatives history only within users' scope
28+
- View devices in attack paths that are within the users' scope
29+
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups to which they have access
3030

3131
### Permissions for Security Exposure Management tasks
3232

@@ -73,13 +73,11 @@ You can access Security Exposure Management in the Microsoft Defender portal usi
7373

7474
You can check which sensor version a device is running as follows:
7575

76-
- On a specific device, browse to the MsSense.exe file in
76+
- On a specific device, browse to the MsSense.exe file in
7777
C:\Program Files\Windows Defender Advanced Threat Protection. Right-click the file, and select **Properties**. On the **Details** tab, check the file version.
78-
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
79-
80-
``` DeviceInfo | project DeviceName, ClientVersion ```
81-
78+
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
8279

80+
``` DeviceInfo | project DeviceName, ClientVersion ```
8381

8482
## Getting support
8583

exposure-management/value-data-connectors.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Data ingested from the Connectors gets normalized and incorporated into the Expo
3333

3434
Eventually this data will additionally serve to enhance security metrics that measure your exposure risk against a particular criteria, and it will also impact broader organizational initiatives that measure exposure risk across a workload or related to a specific threat area.
3535

36-
:::image type="content" source="media/value-data-connectors/device inventory with 3P.png" alt-text="Screenshot of device inventory with discovery source highlighted" lightbox="media/value-data-connectors/device inventory with 3P.png":::
36+
:::image type="content" source="media/value-data-connectors/device inventory with 3P.png" alt-text="Screenshot of device inventory with discovery source" lightbox="media/value-data-connectors/device inventory with 3P.png":::
3737

3838
Benefits of using the external data connectors include:
3939

@@ -66,7 +66,7 @@ Enrichment information on criticality of assets is retrieved from the data conne
6666

6767
To explore your assets and enrichment data retrieved from external data products, you can also view this information in the Exposure Graph. Within the Attack Surface map, you can view the nodes representing assets discovered by your connectors, with built-in icons showing the discovery sources for each asset.
6868

69-
:::image type="content" source="media/value-data-connectors/exposure graph data connectors main.png" alt-text="Screenshot of data connectors in exposure graph" lightbox="media/value-data-connectors/exposure graph data connectors main.png":::
69+
:::image type="content" source="media/value-data-connectors/exposure graph data connectors main.png" alt-text="Screenshot of data connectors in exposure graph shown" lightbox="media/value-data-connectors/exposure graph data connectors main.png":::
7070

7171
By opening the side pane for the asset, you can also view the detailed data retrieved from the connector for each asset.
7272

exposure-management/whats-new.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,15 +43,15 @@ For more information, see, [SaaS security initiative](/defender-cloud-apps/saas-
4343

4444
### New in attack paths
4545

46-
We have introduced four new features designed to enhance your security management and risk mitigation efforts. These features provide valuable insights into the attack paths identified within your environment, enabling you to prioritize risk mitigation strategies effectively and reduce the impact of potential threats.
46+
We have introduced four new features designed to enhance your security management and risk mitigation efforts. These features provide valuable insights into the attack paths identified within your environment, enabling you to prioritize risk mitigation strategies effectively and reduce the impact of potential threats.
4747

4848
The new features include:
4949

5050
- **Attack path widget on exposure management overview page**: Provides users with an at-a-glance, high-level view of discovered attack paths. It displays a timeline of newly identified paths, key entry points, target types, and more, ensuring security teams stay informed about emerging threats and can respond quickly.
5151
- **Attack path dashboard**: Provides a high-level overview of all identified attack paths within the environment. This feature enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively.
5252
- **Choke points**: Highlights critical assets that multiple attack paths intersect, identifying them as key vulnerabilities within the environment. By focusing on these choke points, security teams can efficiently reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
5353
- **Blast radius**: Allows users to visually explore the paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
54-
54+
5555
For more information, see [Overview of attack paths](work-attack-paths-overview.md).
5656

5757
## September 2024
@@ -76,7 +76,6 @@ This change now allows users who have been granted access to only some of the or
7676

7777
For more information, see [Prerequisites and support](prerequisites.md).
7878

79-
8079
### Proactively manage your security posture
8180

8281
Read how the *ExposureGraphEdges* and *ExposureGraphNodes* tables in Advanced Hunting helps your organizations proactively manage and understand your security posture by analyzing asset relationships and potential vulnerabilities.
@@ -151,7 +150,7 @@ The following predefined classification rules were added to the critical assets
151150
| **Azure Virtual Machine has a Critical Signed-in user** | This rule applies to Azure Virtual Machines with a Critical user signed in protected by Defender for Endpoint with high or very high-criticality users signed in. |
152151
| **Azure Key Vaults with Many Connected Identities** | This rule applies to Azure Key Vaults with high access compared to others, indicating critical workload usage. |
153152

154-
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
153+
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
155154

156155
## May 2024
157156

0 commit comments

Comments
 (0)