Forum Discussion

eugene_vox's avatar
eugene_vox
Copper Contributor
Nov 25, 2024

Microsoft Defender External Attack Surface Management (EASM)

Good day everyone, I am needing assistance please in regards to the Microsoft Defender EASM, we are looking to pull out executive reports or custom reports, to highlight all vulnerabilities etc can anyone guide me in the right path on how to achieve this, thanking you in advance

  • Try the following:

     

    1. Use the Export API:
      • The Export API allows you to build custom reports and dashboards tailored to your organization's needs. You can export data and create detailed vulnerability management dashboards.
    2. Leverage Built-in Reports:
      • Navigate through the built-in reports available in the Microsoft Defender portal. These reports provide a comprehensive overview of your security posture and vulnerabilities.
    3. Microsoft Sentinel Integration:
      • Integrate Microsoft Defender EASM with Microsoft Sentinel. This allows you to use Sentinel workbooks with prebuilt templates for various Defender products, enabling you to create custom visualizations and reports.
    4. Use Labels and Queries:
      • Utilize labels to drive workflows and denote asset ownership. Save queries to quickly modify and analyze newly discovered assets. Combine these with data connector exports to generate custom reports.
  • rahukhsjt215's avatar
    rahukhsjt215
    Copper Contributor

    Good day everyone, I am needing assistance please in regards to the Microsoft Defender EASM, we are looking to pull out executive reports or custom reports, to highlight all

  • Try the following:

     

    1. Use the Export API:
      • The Export API allows you to build custom reports and dashboards tailored to your organization's needs. You can export data and create detailed vulnerability management dashboards.
    2. Leverage Built-in Reports:
      • Navigate through the built-in reports available in the Microsoft Defender portal. These reports provide a comprehensive overview of your security posture and vulnerabilities.
    3. Microsoft Sentinel Integration:
      • Integrate Microsoft Defender EASM with Microsoft Sentinel. This allows you to use Sentinel workbooks with prebuilt templates for various Defender products, enabling you to create custom visualizations and reports.
    4. Use Labels and Queries:
      • Utilize labels to drive workflows and denote asset ownership. Save queries to quickly modify and analyze newly discovered assets. Combine these with data connector exports to generate custom reports.

Resources