Event banner
Transform your defense: Microsoft Security Exposure Management
Event details
Learn how Exposure Management consolidates risk-based views of the attack surface and provides advanced attack path modeling. Learn how to use these capabilities to reduce your organization’s attack surface and limit an adversary’s opportunity for attack. With an expanding attack surface and adversaries constantly evolving it is critical that defenders have a comprehensive view that supports them to effectively reduce risk across the digital estate.
Join this deep dive to get to know Exposure Management in and out. We'll wrap up with an Ask Microsoft Anything (AMA) section so post your questions for our product team!.
This session is part of the Microsoft Secure Tech Accelerator. Add it to your calendar, RSVP for event reminders, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event. |
52 Comments
- Char_CheesmanBronze Contributor
In addition to the questions posted on this page, we also answer questions posted in reply to the event on LinkedIn and X (Twitter). Here are the questions we answered today:
From X -- How does Secure Score fit into this? - answered at 42:20
From X -- Will EDR be based on signature-based detection? - answered at 45:25
From LinkedIn -- You mentioned security initiatives - can we build our own and use those with Exposure Management? - answered at 51:00
From X -- Can you shed light on how attack path analysis works? - answered at 54:35
From LinkedIn -- What's the exposure graph latency? - answered at 1:04:00
- Trevor_Rusher
Community Manager
Discover how Microsoft Copilot for secure can help security analysts and IT admins to rapidly process security signals and respond to potential threats at the speed and scale of AI with the Get started with Microsoft Copilot for Security Learning path! Delve into the intricate AI concepts that underlie the development of this cutting-edge security tool, and learn how to leverage them in your own work.
- Trevor_Rusher
Community Manager
That concludes the live stream for Transform your defense: Microsoft Security Exposure Management and the Microsoft Secure Tech Accelerator. We’ll continue to check back on your questions through Friday!
- PaulPringleBrass ContributorIf an endpoint has a non-Microsoft security agent, is there a way to manually mark it as being covered? Or would it have to be a connector to the third party security agent provider?
- PFortunatoOccasional ReaderDoes or will Exposure Management include Microsoft Data Loss Prevention as part of the contributing content for this solution, such as to identify threats to concentrations of sensitive data types?
- PeterJoInobitsBrass ContributorWill this solution eventually include on premises system risk especially in relation to Active Directory Domain Services? Things such as a single user account being a Domain Admin and a GA in EntraID for example?
- Fish_TacosBrass ContributorHow does the recent xz library Supply Chain Attack be detected with Exposure Management?
- BrjannBrekkan
Microsoft
Please see this blog post for guidance regarding XZ library , this includes guidance for Defender Vulnerability Management, Defender for Cloud and Microsoft Security Exposure Management. https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/microsoft-faq-and-guidance-for-xz-utils-backdoor/ba-p/4101961 - Fish_TacosBrass Contributor*can
- Kerry_KinchenCopper Contributorhow long does it take for the Early previews to be accepted for Defender for ServiceNow and Rapid 7 connections? Did it a few weeks ago, but never heard back, just submitted another and waiting.
- PaulPringleBrass ContributorWhen trying to add an External Connector, a dialog is shown that warns, "Please note, you can perform this action only once for now". Can you explain what this means?
- Char_CheesmanBronze Contributor
Thanks for participating in Transform your defense: Microsoft Security Exposure Management! For reference, the panel covered this topic at around 49:40.
- PeterJoInobitsBrass ContributorNot a question but more of a comment. A very useful metric, if it doesn't exist yet, would be something that allows you to see what software is going EOL/EOS and when. Say starting from a year out...
- Char_CheesmanBronze Contributor
Thanks for participating in Transform your defense: Microsoft Security Exposure Management! For reference, the panel covered this topic at around 44:40.
- PeterJoInobitsBrass ContributorI will expand on that....