New blog post | Part 2: Uncovering Trackers Using the Defender EASM API

Microsoft

Thanks for joining me for the second installment on leveraging Trackers in Microsoft Defender External Attack Surface Management (Defender EASM) to find and manage risk in your organization. This blog post is part two of this series, building on the concepts introduced in part one about discovering your attack surface and applying this valuable inventory data to inform your security efforts at scale. As a quick refresher, in part one, we defined Trackers in Defender EASM and learned how to search for them in the User Interface (UI)This blog post will closely examine the Defender EASM Application Program Interface (API).

crystalashcraft_0-1682655682176.png

Part 2: Uncovering Trackers Using the Defender EASM API - Microsoft Community Hub

 

0 Replies