You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In addition to Microsoft services, Security Exposure Management allows you to connect to external data sources to further enrich and extend your security posture management.
76
76
For more information on data connectors, see [Data connectors overview](overview-data-connectors.md).
77
77
78
-
79
78
## Next steps
80
79
81
80
Review [prerequisites](prerequisites.md) to get started with Security Exposure Management.
Copy file name to clipboardExpand all lines: exposure-management/prerequisites.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ Permissions are based on [Microsoft Entra ID Roles](/entra/identity/role-based-a
23
23
24
24
- For full Security Exposure Management access, user roles need access to all Defender for Endpoint [device groups](/microsoft-365/security//defender-endpoint/machine-groups).
25
25
- Users who have access restricted to some of the organization's device groups (and not to all), can:
26
-
- Access global exposure insights data.
27
-
- View affected assets under metrics, recommendations, events, and initiatives history only within users' scope
28
-
- View devices in attack paths that are within the users' scope
29
-
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups to which they have access
26
+
- Access global exposure insights data.
27
+
- View affected assets under metrics, recommendations, events, and initiatives history only within users' scope
28
+
- View devices in attack paths that are within the users' scope
29
+
- Access the Security Exposure Management attack surface map and advanced hunting schemas (ExposureGraphNodes and ExposureGraphEdges) for the device groups to which they have access
30
30
31
31
### Permissions for Security Exposure Management tasks
32
32
@@ -73,13 +73,11 @@ You can access Security Exposure Management in the Microsoft Defender portal usi
73
73
74
74
You can check which sensor version a device is running as follows:
75
75
76
-
- On a specific device, browse to the MsSense.exe file in
76
+
- On a specific device, browse to the MsSense.exe file in
77
77
C:\Program Files\Windows Defender Advanced Threat Protection. Right-click the file, and select **Properties**. On the **Details** tab, check the file version.
78
-
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
- For multiple devices, it's easier to run an [advanced hunting Kusto query](/defender-xdr/advanced-hunting-query-language) to check device sensor versions, as follows:
Copy file name to clipboardExpand all lines: exposure-management/value-data-connectors.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ Data ingested from the Connectors gets normalized and incorporated into the Expo
33
33
34
34
Eventually this data will additionally serve to enhance security metrics that measure your exposure risk against a particular criteria, and it will also impact broader organizational initiatives that measure exposure risk across a workload or related to a specific threat area.
35
35
36
-
:::image type="content" source="media/value-data-connectors/device inventory with 3P.png" alt-text="Screenshot of device inventory with discovery source highlighted" lightbox="media/value-data-connectors/device inventory with 3P.png":::
36
+
:::image type="content" source="media/value-data-connectors/device inventory with 3P.png" alt-text="Screenshot of device inventory with discovery source" lightbox="media/value-data-connectors/device inventory with 3P.png":::
37
37
38
38
Benefits of using the external data connectors include:
39
39
@@ -66,7 +66,7 @@ Enrichment information on criticality of assets is retrieved from the data conne
66
66
67
67
To explore your assets and enrichment data retrieved from external data products, you can also view this information in the Exposure Graph. Within the Attack Surface map, you can view the nodes representing assets discovered by your connectors, with built-in icons showing the discovery sources for each asset.
68
68
69
-
:::image type="content" source="media/value-data-connectors/exposure graph data connectors main.png" alt-text="Screenshot of data connectors in exposure graph" lightbox="media/value-data-connectors/exposure graph data connectors main.png":::
69
+
:::image type="content" source="media/value-data-connectors/exposure graph data connectors main.png" alt-text="Screenshot of data connectors in exposure graph shown" lightbox="media/value-data-connectors/exposure graph data connectors main.png":::
70
70
71
71
By opening the side pane for the asset, you can also view the detailed data retrieved from the connector for each asset.
Copy file name to clipboardExpand all lines: exposure-management/whats-new.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,15 +43,15 @@ For more information, see, [SaaS security initiative](/defender-cloud-apps/saas-
43
43
44
44
### New in attack paths
45
45
46
-
We have introduced four new features designed to enhance your security management and risk mitigation efforts. These features provide valuable insights into the attack paths identified within your environment, enabling you to prioritize risk mitigation strategies effectively and reduce the impact of potential threats.
46
+
We have introduced four new features designed to enhance your security management and risk mitigation efforts. These features provide valuable insights into the attack paths identified within your environment, enabling you to prioritize risk mitigation strategies effectively and reduce the impact of potential threats.
47
47
48
48
The new features include:
49
49
50
50
-**Attack path widget on exposure management overview page**: Provides users with an at-a-glance, high-level view of discovered attack paths. It displays a timeline of newly identified paths, key entry points, target types, and more, ensuring security teams stay informed about emerging threats and can respond quickly.
51
51
-**Attack path dashboard**: Provides a high-level overview of all identified attack paths within the environment. This feature enables security teams to gain valuable insights into the types of paths identified, top entry points, target assets, and more, helping to prioritize risk mitigation efforts effectively.
52
52
-**Choke points**: Highlights critical assets that multiple attack paths intersect, identifying them as key vulnerabilities within the environment. By focusing on these choke points, security teams can efficiently reduce risk by addressing high-impact assets, thus preventing attackers from progressing through various paths.
53
53
-**Blast radius**: Allows users to visually explore the paths from a choke point. It provides a detailed visualization showing how the compromise of one asset could affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively.
54
-
54
+
55
55
For more information, see [Overview of attack paths](work-attack-paths-overview.md).
56
56
57
57
## September 2024
@@ -76,7 +76,6 @@ This change now allows users who have been granted access to only some of the or
76
76
77
77
For more information, see [Prerequisites and support](prerequisites.md).
78
78
79
-
80
79
### Proactively manage your security posture
81
80
82
81
Read how the *ExposureGraphEdges* and *ExposureGraphNodes* tables in Advanced Hunting helps your organizations proactively manage and understand your security posture by analyzing asset relationships and potential vulnerabilities.
@@ -151,7 +150,7 @@ The following predefined classification rules were added to the critical assets
151
150
|**Azure Virtual Machine has a Critical Signed-in user**| This rule applies to Azure Virtual Machines with a Critical user signed in protected by Defender for Endpoint with high or very high-criticality users signed in. |
152
151
|**Azure Key Vaults with Many Connected Identities**| This rule applies to Azure Key Vaults with high access compared to others, indicating critical workload usage. |
153
152
154
-
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
153
+
For more information, see, [Predefined classifications](predefined-classification-rules-and-levels.md)
0 commit comments