<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/ct-p/external-attack-surface-management</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Fri, 17 Apr 2026 12:03:38 GMT</pubDate>
    <dc:creator>external-attack-surface-management</dc:creator>
    <dc:date>2026-04-17T12:03:38Z</dc:date>
    <item>
      <title>Microsoft Secure score not updating after implementation of Attack Surface Reduction</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/microsoft-secure-score-not-updating-after-implementation-of/m-p/4407066#M22</link>
      <description>&lt;P&gt;&amp;lt;p&amp;gt;Hello everyone,&amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;p&amp;gt;I wanted to share that we have successfully implemented &amp;lt;strong&amp;gt;Attack Surface Reduction (ASR)&amp;lt;/strong&amp;gt; rules across our endpoint devices as part of our ongoing security hardening efforts. These configurations are actively deployed and enforced through Intune ASR to help mitigate common attack vectors like Office macro abuse, executable content from email/web, and other high-risk behaviors.&amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;p&amp;gt;However, we’ve noticed that despite this implementation, some ASR-related recommendations are still appearing in Microsoft Secure Score. This can occur due to delays in telemetry updates, device reporting issues, or Secure Score metrics not immediately reflecting policy enforcement across all endpoints.&amp;lt;/p&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;p&amp;gt;We are currently reviewing the underlying data and device reporting to ensure full visibility and alignment with Secure Score.&amp;lt;/p&amp;gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Apr 2025 13:45:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/microsoft-secure-score-not-updating-after-implementation-of/m-p/4407066#M22</guid>
      <dc:creator>Ubaid_Abbasi</dc:creator>
      <dc:date>2025-04-23T13:45:19Z</dc:date>
    </item>
    <item>
      <title>High values CVE's not showing on High priority observations</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/high-values-cve-s-not-showing-on-high-priority-observations/m-p/4400477#M21</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I need some help to understand this logic on Defender EASM. For example, on my "High priority observations", I've got 6 observations, all of those for 1 domain, which is fine.&lt;/P&gt;&lt;P&gt;But then if I go to my inventory and select one other domain, I can see on that host, some CVE's with High priority. Screenshot bellow:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;So, why arent' this results being shown on the list of "High priority observations" if they are ranked with High priority. Is there a logic for this?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 03 Apr 2025 09:02:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/high-values-cve-s-not-showing-on-high-priority-observations/m-p/4400477#M21</guid>
      <dc:creator>dmarquesgn</dc:creator>
      <dc:date>2025-04-03T09:02:45Z</dc:date>
    </item>
    <item>
      <title>Defender EASM source IP addresses/location</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/defender-easm-source-ip-addresses-location/m-p/4276578#M20</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;I am currently building a service that will leverage EASM for discovery and scan for all our customers. However I have a very specific constraint : the scan must be done from a France-localized IP address. Does the resource location (FranceCentral in my case) make the scan occur from a french IP address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I didn't find anything in the blog nor the documention about the scan source IP address or the the scan source location.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd be glad to hear from the EASM team! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 15:12:26 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/defender-easm-source-ip-addresses-location/m-p/4276578#M20</guid>
      <dc:creator>Molx32</dc:creator>
      <dc:date>2024-10-22T15:12:26Z</dc:date>
    </item>
    <item>
      <title>Analytic rules for Microsoft Sentinel based on MS EASM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/analytic-rules-for-microsoft-sentinel-based-on-ms-easm/m-p/4259605#M19</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just imported EASM data to Sentinel, so we can create some analytic rules based on EASM data.&lt;/P&gt;&lt;P&gt;I'm now thinking on which use cases are interesting to create alerts.&lt;/P&gt;&lt;P&gt;Anyone has already followed this path and has some experience of what kind of alerts make sense based on EASM data?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2024 14:11:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/analytic-rules-for-microsoft-sentinel-based-on-ms-easm/m-p/4259605#M19</guid>
      <dc:creator>dmarquesgn</dc:creator>
      <dc:date>2024-10-01T14:11:16Z</dc:date>
    </item>
    <item>
      <title>New Blog | Leverage Generative AI to expedite attack surface investigations in Defender EASM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-leverage-generative-ai-to-expedite-attack-surface/m-p/4227573#M18</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/2411807" target="_blank"&gt;Soham Patel&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A prerequisite to securing an organization on the internet is first knowing what digital assets in the organization are internet-facing. With the constantly changing internet, the migration to multi-cloud environments, the evolution of organizations with mergers and acquisitions, and the emergence of shadow IT, it is often difficult to maintain an updated external view of an organization’s attack surface, leading to security gaps emerging for attackers to exploit.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Microsoft Defender External Attack Surface Management (EASM) solves this challenge by discovering externally facing assets and identifying their risk. Their vulnerabilities can be identified, which helps with prioritizing them, so you know where to start with remediation efforts.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;While Defender EASM equips organizations with an updated external attack surface view and the risks associated with it, these vast, multifaceted attack surfaces require many resources to analyze each asset and its associated metadata. This often increases the time to remediation and the likelihood of an attacker exploiting a security gap. However, generative AI can expedite this analysis process, enabling security professionals to defend organizations at machine speed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/leverage-generative-ai-to-expedite-attack-surface-investigations/ba-p/4110163" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Leverage Generative AI to expedite attack surface investigations in Defender EASM&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 22:07:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-leverage-generative-ai-to-expedite-attack-surface/m-p/4227573#M18</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-08-23T22:07:36Z</dc:date>
    </item>
    <item>
      <title>New Blog | Leverage Generative AI to expedite attack surface investigations in Defender EASM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-leverage-generative-ai-to-expedite-attack-surface/m-p/4173624#M15</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/2411807" target="_blank" rel="noopener"&gt;Soham Patel&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A prerequisite to securing an organization on the internet is first knowing what digital assets in the organization are internet-facing. With the constantly changing internet, the migration to multi-cloud environments, the evolution of organizations with mergers and acquisitions, and the emergence of shadow IT, it is often difficult to maintain an updated external view of an organization’s attack surface, leading to security gaps emerging for attackers to exploit.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Microsoft Defender External Attack Surface Management (EASM) solves this challenge by discovering externally facing assets and identifying their risk. Their vulnerabilities can be identified, which helps with prioritizing them, so you know where to start with remediation efforts.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;While Defender EASM equips organizations with an updated external attack surface view and the risks associated with it, these vast, multifaceted attack surfaces require many resources to analyze each asset and its associated metadata. This often increases the time to remediation and the likelihood of an attacker exploiting a security gap. However, generative AI can expedite this analysis process, enabling security professionals to defend organizations at machine speed.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;At Microsoft Ignite in November 2023, we announced Defender EASM’s&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482" target="_self"&gt;prompting capabilities&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in Copilot for Security. Today, we are thrilled to share that the same capabilities – and more – are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;available in public preview the Copilot chat pane in the Azure portal and can be used alongside Copilot for Security customers’ Defender EASM resources&lt;/STRONG&gt;. This allows organizations to stay secure, with ease.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-1246969330"&gt;Dig into your external attack surface&lt;/H2&gt;
&lt;P&gt;The Copilot chat pane in Azure gives customers AI-driven insights on risky assets within their external attack surface. Instead of manually drilling down to investigate asset details, simply ask Copilot about recently expired SSL certificates and domains, and you’ll get automated answers for each in seconds. To understand which assets may have Common Vulnerabilities and Exposures (CVE), you can quickly find out by asking Copilot “which assets have critical severity CVEs?” or “Does this ‘CVE ID’ impact me?” Knowing where CVEs lie, and how they are classified, will help you in focusing resources and remediation efforts on those that matter most.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Our Copilot capabilities also enable customers to quickly identify assets impacted by specific risks and vulnerabilities, such as assets that have Common Vulnerability Scoring System (CVSS) scores, that are still using SHA-1 certificates, or are expiring soon – empowering them to determine what assets must be remediated first.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For example, we can investigate which assets are impacted by medium priority CVSS Scores and what vulnerabilities must be remediated to secure the targeted assets. In this scenario in the image below, we can see that because of the jQuery version,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://portal.fabrikam.com/" target="_blank" rel="noopener nofollow noreferrer"&gt;https://portal.fabrikam.com/&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is at risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/leverage-generative-ai-to-expedite-attack-surface-investigations/ba-p/4110163" target="_blank" rel="noopener"&gt;Leverage Generative AI to expedite attack surface investigations in Defender EASM&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2024 19:51:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-leverage-generative-ai-to-expedite-attack-surface/m-p/4173624#M15</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-06-21T19:51:21Z</dc:date>
    </item>
    <item>
      <title>New Blog | Leverage Generative AI to expedite attack surface investigations in Defender EASM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-leverage-generative-ai-to-expedite-attack-surface/m-p/4148282#M13</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/2411807" target="_blank" rel="noopener"&gt;Soham Patel&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A prerequisite to securing an organization on the internet is first knowing what digital assets in the organization are internet-facing. With the constantly changing internet, the migration to multi-cloud environments, the evolution of organizations with mergers and acquisitions, and the emergence of shadow IT, it is often difficult to maintain an updated external view of an organization’s attack surface, leading to security gaps emerging for attackers to exploit.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Microsoft Defender External Attack Surface Management (EASM) solves this challenge by discovering externally facing assets and identifying their risk. Their vulnerabilities can be identified, which helps with prioritizing them, so you know where to start with remediation efforts.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;While Defender EASM equips organizations with an updated external attack surface view and the risks associated with it, these vast, multifaceted attack surfaces require many resources to analyze each asset and its associated metadata. This often increases the time to remediation and the likelihood of an attacker exploiting a security gap. However, generative AI can expedite this analysis process, enabling security professionals to defend organizations at machine speed.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;At Microsoft Ignite in November 2023, we announced Defender EASM’s&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482" target="_self"&gt;prompting capabilities&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in Copilot for Security. Today, we are thrilled to share that the same capabilities – and more – are&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;available in public preview the Copilot chat pane in the Azure portal and can be used alongside Copilot for Security customers’ Defender EASM resources&lt;/STRONG&gt;. This allows organizations to stay secure, with ease.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-1246969330"&gt;Dig into your external attack surface&lt;/H2&gt;
&lt;P&gt;The Copilot chat pane in Azure gives customers AI-driven insights on risky assets within their external attack surface. Instead of manually drilling down to investigate asset details, simply ask Copilot about recently expired SSL certificates and domains, and you’ll get automated answers for each in seconds. To understand which assets may have Common Vulnerabilities and Exposures (CVE), you can quickly find out by asking Copilot “which assets have critical severity CVEs?” or “Does this ‘CVE ID’ impact me?” Knowing where CVEs lie, and how they are classified, will help you in focusing resources and remediation efforts on those that matter most.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Our Copilot capabilities also enable customers to quickly identify assets impacted by specific risks and vulnerabilities, such as assets that have Common Vulnerability Scoring System (CVSS) scores, that are still using SHA-1 certificates, or are expiring soon – empowering them to determine what assets must be remediated first.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For example, we can investigate which assets are impacted by medium priority CVSS Scores and what vulnerabilities must be remediated to secure the targeted assets. In this scenario in the image below, we can see that because of the jQuery version,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://portal.fabrikam.com/" target="_blank" rel="noopener nofollow noreferrer"&gt;https://portal.fabrikam.com/&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is at risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/leverage-generative-ai-to-expedite-attack-surface-investigations/ba-p/4110163" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Leverage Generative AI to expedite attack surface investigations in Defender EASM&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="custom-subscription-widget"&gt;
&lt;DIV class="title-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 21 May 2024 21:57:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-leverage-generative-ai-to-expedite-attack-surface/m-p/4148282#M13</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-05-21T21:57:49Z</dc:date>
    </item>
    <item>
      <title>Leverage Generative AI to expedite attack surface investigations in Defender EASM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/leverage-generative-ai-to-expedite-attack-surface-investigations/ba-p/4110163</link>
      <description>&lt;P&gt;A prerequisite to securing an organization on the internet is first knowing what digital assets in the organization are internet-facing. With the constantly changing internet, the migration to multi-cloud environments, the evolution of organizations with mergers and acquisitions, and the emergence of shadow IT, it is often difficult to maintain an updated external view of an organization’s attack surface, leading to security gaps emerging for attackers to exploit.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Microsoft Defender External Attack Surface Management (EASM) solves this challenge by discovering externally facing assets and identifying their risk. Their vulnerabilities can be identified, which helps with prioritizing them, so you know where to start with remediation efforts.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;While Defender EASM equips organizations with an updated external attack surface view and the risks associated with it, these vast, multifaceted attack surfaces require many resources to analyze each asset and its associated metadata. This often increases the time to remediation and the likelihood of an attacker exploiting a security gap. However, generative AI can expedite this analysis process, enabling security professionals to defend organizations at machine speed.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;At Microsoft Ignite in November 2023, we announced Defender EASM’s &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482" target="_self"&gt;prompting capabilities&lt;/A&gt; in Copilot for Security. Today, we are thrilled to share that the same capabilities – and more – are &lt;STRONG&gt;available in public preview the Copilot chat pane in the Azure portal and can be used alongside Copilot for Security customers’ Defender EASM resources&lt;/STRONG&gt;. This allows organizations to stay secure, with ease.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Dig into your external attack surface&lt;/H2&gt;
&lt;P&gt;The Copilot chat pane in Azure gives customers AI-driven insights on risky assets within their external attack surface. Instead of manually drilling down to investigate asset details, simply ask Copilot about recently expired SSL certificates and domains, and you’ll get automated answers for each in seconds. To understand which assets may have Common Vulnerabilities and Exposures (CVE), you can quickly find out by asking Copilot “which assets have critical severity CVEs?” or “Does this ‘CVE ID’ impact me?” Knowing where CVEs lie, and how they are classified, will help you in focusing resources and remediation efforts on those that matter most.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Our Copilot capabilities also enable customers to quickly identify assets impacted by specific risks and vulnerabilities, such as assets that have Common Vulnerability Scoring System (CVSS) scores, that are still using SHA-1 certificates, or are expiring soon – empowering them to determine what assets must be remediated first.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For example, we can investigate which assets are impacted by medium priority CVSS Scores and what vulnerabilities must be remediated to secure the targeted assets. In this scenario in the image below, we can see that because of the jQuery version, &lt;A href="https://portal.fabrikam.com/" target="_blank" rel="noopener"&gt;https://portal.fabrikam.com/&lt;/A&gt; is at risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Perform advanced queries using natural language&lt;/H2&gt;
&lt;P&gt;An advanced feature in Defender EASM is the ability to search inventory to help solve a wide variety of specific business objectives and answer targeted questions, like &lt;EM&gt;"What assets were registered by name@example.com?”&lt;/EM&gt; or &lt;EM&gt;“What assets are using an Azure service and have vulnerabilities?”&lt;/EM&gt; . This querying capability enables organizations to quickly find assets for remediation based on their business objectives and prompt questions. With 65 unique filter fields and 20 filter operators, these queries can become extremely sophisticated to best address the organizations’ needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To fully utilize Defender EASM’s robust querying capabilities, a certain level of familiarity with the Defender EASM querying tool is required. However, by using Defender EASM capabilities in Copilot, queries can be done faster and easier than ever before.&amp;nbsp;Now, any natural language inquiries, such as &lt;EM&gt;"which pages seen in the last 30 days are using jQuery?"&lt;/EM&gt; and &lt;EM&gt;"find all the page, host, and ASN assets in my inventory with X or Y IP address,"&lt;/EM&gt; can be automatically converted into the corresponding inventory queries across all data discovered by Defender EASM. This allows security analysts to leverage Defender EASM's extensive querying capabilities to extract asset metadata and key asset information – without requiring an advanced query skillset.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To illustrate how this works using Copilot, let’s say that an organization has been informed about the risk associated with jQuery version 3.1.0. From here, a security analyst will want to understand what other assets in their environment are using that same version of jQuery. The analyst can then enter a prompt in natural language, which will create a query in Defender EASM to show the assets running jQuery 3.1.0. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Use Defender EASM's Copilot prompts today&lt;/H2&gt;
&lt;P&gt;Defender EASM’s Copilot prompting capabilities in the Azure portal are currently in public preview and available to Copilot for Security customers. To learn more about Microsoft Copilot for Security, visit &lt;A href="https://aka.ms/CopilotForSecurity" target="_self"&gt;aka.ms/CopilotForSecurity&lt;/A&gt; or contact your Microsoft sales representative. To create a new Defender EASM resource and start using the prompts in the Azure chat pane, to go &lt;A href="https://www.portal.azure.com%20" target="_self"&gt;https://www.portal.azure.com&lt;/A&gt; and search for “Defender EASM”.&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 15:27:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/leverage-generative-ai-to-expedite-attack-surface-investigations/ba-p/4110163</guid>
      <dc:creator>sohampatel</dc:creator>
      <dc:date>2024-05-21T15:27:00Z</dc:date>
    </item>
    <item>
      <title>New Blog | Get visibility into your curated external assets with enhanced generative AI capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-get-visibility-into-your-curated-external-assets-with/m-p/4138929#M12</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/2358435" target="_blank"&gt;Sushma Raja&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Finding, tracking, and managing all the assets found within an organization’s vast – and often unknown – digital attack surface can be a daunting task. &amp;nbsp;A lack of knowing and monitoring all your assets, including shadow IT, leads to security gaps that can be exploited by attackers.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Understanding and documenting your entire attack surface with relevant asset tracking is critical to securing your environment. This highlights the importance of adding an external attack surface management (EASM) tool to your security stack.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;EASM solutions are designed to provide a view of your digital attack surface from the outside in, enabling organizations to see exactly what attackers browsing the internet see when they come across an asset owned by your organization. Microsoft Defender EASM discovers and maps both known and unknown assets from an external perspective just as an attacker would see as they look to find a way to compromise an organization.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-1224840356" class="lia-align-left"&gt;Enhanced Defender EASM functionality in Microsoft Copilot for Security&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;In November 2023, we announced new Defender EASM&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482" target="_blank" rel="noopener"&gt;capabilities&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in Microsoft Copilot for Security that help security teams understand their attack surface, the pervasive CVEs within it, and get assistance remediation prioritization with the help of generative AI. The attack surface snapshot that Copilot users receive when using the prompts are, by default, generated from a library of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;pre-built attack surfaces&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that Microsoft has discovered for thousands of organizations. From our daily scans of the internet, Defender EASM discovers and searches for an organization’s attack surface based on publicly available information.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The results of prompts pulled from an organization’s pre-built attack surface are intended to give customers high-level visibility into their external assets and associated vulnerabilities.&amp;nbsp;So far, they have been used by Early Access customers to achieve this visibility. One customer reported that they were able to identify unknown assets and remediate major vulnerabilities based on information gathered from EASM.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Now, we are thrilled to share enhanced functionality with these capabilities, which allows customers to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;directly connect their seeded and curated Defender EASM resource to Copilot for Security&lt;/STRONG&gt;. With the curated Defender EASM integration, Copilot users can leverage generative AI to get comprehensive, up-to-date information about their external attack surface, analyzing assets that go above and beyond their pre-built attack surface.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Setting up is simple.&amp;nbsp; In the configuration menu of Copilot for Security, turn on the Defender External Attack Surface Management skills on and then click on the Settings icon to enter your resource information.&amp;nbsp; Once this information is entered, your future prompts in Copilot will utilize information from your configured EASM resource.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/get-visibility-into-your-curated-external-assets-with-enhanced/ba-p/4081757" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Get visibility into your curated external assets with enhanced generative AI capabilities&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="custom-subscription-widget"&gt;
&lt;DIV class="title-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 13 May 2024 16:48:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-get-visibility-into-your-curated-external-assets-with/m-p/4138929#M12</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-05-13T16:48:16Z</dc:date>
    </item>
    <item>
      <title>New Blog | Get visibility into your curated external assets with enhanced generative AI capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-get-visibility-into-your-curated-external-assets-with/m-p/4113245#M11</link>
      <description>&lt;P&gt;By&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/user/viewprofilepage/user-id/2358435" target="_blank"&gt;Sushma Raja&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Finding, tracking, and managing all the assets found within an organization’s vast – and often unknown – digital attack surface can be a daunting task. &amp;nbsp;A lack of knowing and monitoring all your assets, including shadow IT, leads to security gaps that can be exploited by attackers.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Understanding and documenting your entire attack surface with relevant asset tracking is critical to securing your environment. This highlights the importance of adding an external attack surface management (EASM) tool to your security stack.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;EASM solutions are designed to provide a view of your digital attack surface from the outside in, enabling organizations to see exactly what attackers browsing the internet see when they come across an asset owned by your organization. Microsoft Defender EASM discovers and maps both known and unknown assets from an external perspective just as an attacker would see as they look to find a way to compromise an organization.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="toc-hId-1224840356" class="lia-align-left"&gt;Enhanced Defender EASM functionality in Microsoft Copilot for Security&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;In November 2023, we announced new Defender EASM&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482" target="_blank" rel="noopener"&gt;capabilities&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in Microsoft Copilot for Security that help security teams understand their attack surface, the pervasive CVEs within it, and get assistance remediation prioritization with the help of generative AI. The attack surface snapshot that Copilot users receive when using the prompts are, by default, generated from a library of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;pre-built attack surfaces&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that Microsoft has discovered for thousands of organizations. From our daily scans of the internet, Defender EASM discovers and searches for an organization’s attack surface based on publicly available information.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The results of prompts pulled from an organization’s pre-built attack surface are intended to give customers high-level visibility into their external assets and associated vulnerabilities.&amp;nbsp;So far, they have been used by Early Access customers to achieve this visibility. One customer reported that they were able to identify unknown assets and remediate major vulnerabilities based on information gathered from EASM.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Now, we are thrilled to share enhanced functionality with these capabilities, which allows customers to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;directly connect their seeded and curated Defender EASM resource to Copilot for Security&lt;/STRONG&gt;. With the curated Defender EASM integration, Copilot users can leverage generative AI to get comprehensive, up-to-date information about their external attack surface, analyzing assets that go above and beyond their pre-built attack surface.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Setting up is simple.&amp;nbsp; In the configuration menu of Copilot for Security, turn on the Defender External Attack Surface Management skills on and then click on the Settings icon to enter your resource information.&amp;nbsp; Once this information is entered, your future prompts in Copilot will utilize information from your configured EASM resource.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Read the full post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/get-visibility-into-your-curated-external-assets-with-enhanced/ba-p/4081757" target="_blank" rel="noopener"&gt;Get visibility into your curated external assets with enhanced generative AI capabilities&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 19:24:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-get-visibility-into-your-curated-external-assets-with/m-p/4113245#M11</guid>
      <dc:creator>DavidFernandes</dc:creator>
      <dc:date>2024-04-12T19:24:41Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender EASM should be part of Microsoft Defender XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/microsoft-defender-easm-should-be-part-of-microsoft-defender-xdr/m-p/4111683#M10</link>
      <description>&lt;P&gt;Microsoft Defender EASM should be part of Microsoft Defender XDR.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsoft Defender EASM should not work as one of the service in Microsoft Azure. It should be part of Exposure management in Microsoft Defender XDR.&amp;nbsp;Already Microsoft is trying to consolidate its Security/Defender platforms in to one platform Microsoft Defender XDR. So at the same time why creating new portal for this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 06:23:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/microsoft-defender-easm-should-be-part-of-microsoft-defender-xdr/m-p/4111683#M10</guid>
      <dc:creator>Deleted</dc:creator>
      <dc:date>2024-04-11T06:23:25Z</dc:date>
    </item>
    <item>
      <title>Get visibility into your curated external assets with enhanced generative AI capabilities</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/get-visibility-into-your-curated-external-assets-with-enhanced/ba-p/4081757</link>
      <description>&lt;P class="lia-align-left"&gt;Finding, tracking, and managing all the assets found within an organization’s vast – and often unknown – digital attack surface can be a daunting task. &amp;nbsp;A lack of knowing and monitoring all your assets, including shadow IT, leads to security gaps that can be exploited by attackers.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Understanding and documenting your entire attack surface with relevant asset tracking is critical to securing your environment. This highlights the importance of adding an external attack surface management (EASM) tool to your security stack.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;EASM solutions are designed to provide a view of your digital attack surface from the outside in, enabling organizations to see exactly what attackers browsing the internet see when they come across an asset owned by your organization. Microsoft Defender EASM discovers and maps both known and unknown assets from an external perspective just as an attacker would see as they look to find a way to compromise an organization.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-align-left"&gt;Enhanced Defender EASM functionality in Microsoft Copilot for Security&lt;/H2&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;In November 2023, we announced new Defender EASM &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482" target="_blank" rel="noopener"&gt;capabilities&lt;/A&gt; in Microsoft Copilot for Security that help security teams understand their attack surface, the pervasive CVEs within it, and get assistance remediation prioritization with the help of generative AI. The attack surface snapshot that Copilot users receive when using the prompts are, by default, generated from a library of &lt;EM&gt;pre-built attack surfaces&lt;/EM&gt; that Microsoft has discovered for thousands of organizations. From our daily scans of the internet, Defender EASM discovers and searches for an organization’s attack surface based on publicly available information.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The results of prompts pulled from an organization’s pre-built attack surface are intended to give customers high-level visibility into their external assets and associated vulnerabilities.&amp;nbsp;So far, they have been used by Early Access customers to achieve this visibility. One customer reported that they were able to identify unknown assets and remediate major vulnerabilities based on information gathered from EASM.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Now, we are thrilled to share enhanced functionality with these capabilities, which allows customers to &lt;STRONG&gt;directly connect their seeded and curated Defender EASM resource to Copilot for Security&lt;/STRONG&gt;. With the curated Defender EASM integration, Copilot users can leverage generative AI to get comprehensive, up-to-date information about their external attack surface, analyzing assets that go above and beyond their pre-built attack surface.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Setting up is simple.&amp;nbsp; In the configuration menu of Copilot for Security, turn on the Defender External Attack Surface Management skills on and then click on the Settings icon to enter your resource information.&amp;nbsp; Once this information is entered, your future prompts in Copilot will utilize information from your configured EASM resource.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;All of the existing Defender EASM prompts can be used when searching for information for a curated resource.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Sample prompts to get a summary of your externally facing assets include:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;What are the externally facing assets for [my resource]?&lt;/LI&gt;
&lt;LI&gt;What is [my resource’s] attack surface?&lt;/LI&gt;
&lt;LI&gt;What is my attack surface?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Sample prompts to get attack surface insights include:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Do I have vulnerabilities in my external attack surface for [my resource]?&lt;/LI&gt;
&lt;LI&gt;What risk is in my external attack surface?&lt;/LI&gt;
&lt;LI&gt;What insights are there in my external attack surface?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Sample prompts to learn about CVEs of impact include:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Does this [CVE ID] impact me?&lt;/LI&gt;
&lt;LI&gt;Should I be worried about this [CVE ID]?&lt;/LI&gt;
&lt;LI&gt;How many assets have critical CVSS’s for [my resource]?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Sample prompts to help you understand how you can prioritize remediation efforts include:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI&gt;Which SSL certificates from [my resource] do I need to take action on?&lt;/LI&gt;
&lt;LI&gt;Which expired SSL certificates are recent?&lt;/LI&gt;
&lt;LI&gt;What are my expired domains?&lt;/LI&gt;
&lt;LI&gt;Am I using SHA1 in my attack surface?&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 class="lia-align-left"&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3 class="lia-align-left"&gt;Learn more about Copilot for Security&lt;/H3&gt;
&lt;P class="lia-align-left"&gt;To learn more about Microsoft Copilot for Security, visit aka.ms/CopilotForSecurity or contact your Microsoft sales representative. &lt;SPAN&gt;If you missed us at Microsoft Secure, you may watch the &lt;/SPAN&gt;&lt;A href="https://aka.ms/MSSecureKeynote" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;keynote&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; video and &lt;/SPAN&gt;&lt;A href="https://aka.ms/MSSecureCopilotDemo" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;extended Copilot demo&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; session.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 class="lia-align-left"&gt;New External Attack Surface Protection Initiative in Microsoft Security Exposure Management&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Today, we are excited to announce Defender EASM’s latest integration into &lt;A href="https://aka.ms/exposuremgmtblog" target="_self"&gt;Microsoft Security Exposure Management&lt;/A&gt;, our newest platform that delivers a clear and unified end-to-end view of an organization’s exposure by combining multiple Microsoft Security products and workloads in a single pane of glass, enabling continuous security posture visibility and improvement across the digital estate.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The integration, called the &lt;EM&gt;External Attack Surface Protection Initiative&lt;/EM&gt;, allows CISOs and security team members to see different exposure metrics pertaining to their external attack surface, encouraging proactive posture management.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Defender EASM data surfaces the following information in Exposure Management:&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Percent of assets in the attack surface with High, Medium, and Low Severity Insights&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Large organizations’ attack surfaces can be incredibly broad, so prioritizing the key findings derived from Defender EASM’s data helps customers quickly and efficiently address the most important exposed elements of their attack surface. These Insights are primarily derived by detections created from internal researchers and can include critical CVEs, known associations to compromised infrastructure, use of deprecated technology, infrastructure best practice violations, or compliance issues.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Insight priorities are determined by Microsoft’s assessment of the potential impact of each insight – high, medium, and low severity – and the integration with Microsoft Security Exposure Management helps teams understand which insights to prioritize remediating first. In addition to getting visibility into these common areas of weakness, customers also receive remediation recommendations for each.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Percent of internet-facing assets with Critical and High CVE vulnerabilities&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Common Vulnerabilities and Exposures (CVEs) is a list of publicly disclosed vulnerabilities relating to software weaknesses that could potentially catch the attention of an attacker. When Defender EASM completes the discovery of an organization’s assets, it then looks at what CVEs are associated with the assets. In Exposure Management, customers can see the percentage of assets in their attack surface that have Critical and High CVEs associated with, helping them visualize where they can take action.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Percent of expired SSL certificates&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;The security posture for configuration of an organization's SSL certificate portfolio determines both customer experience and risk of data compromise. In most modern browsers, websites with an expired SSL certification or outdated encryption will be blocked with a warning message to the user, impacting web traffic and brand trust. Users who proceed can have their communications with the website intercepted by a Man-in-the-Middle (MITM) attack.&amp;nbsp; This can have several business impacts from business disruption, compliance issues, to exposure of adjacent critical systems derived by analyzing certificate values.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Percent of expired domains&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Domains, previously owned by your organization which have expired, could be renewed and used by malicious actors to impersonate your brand to target your organization, employees, or customers.&amp;nbsp; Organizations should review these domains to determine if they should be re-registered.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Percent of assets with remote access enabled&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;When remote access is enabled on open ports, it effectively allows attackers to gain unauthorized access to your network. This metric uncovers the percentage of assets in organizations’ external attack surfaces that have remote access enabled, so they can determine if it’s an asset that shouldn’t be accessible from anywhere.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;Percent of assets utilizing SSH SHA1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;Secure Shell Secure Hash Algorithm 1 (SSH SHA 1) is an older hash function that uses weak encryption. Defender EASM can detect assets that use this hash algorithm and alert customers to which assets are exposed to this risk in Exposure Management. Organizations should replace these certificates with new SSL certificates that use SHA-256.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="lia-align-left"&gt;&lt;SPAN&gt;Learn more about Microsoft Security Exposure Management&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P class="lia-align-left"&gt;Achieving robust attack surface visibility and understanding posture are imperative in effectively managing threat exposure. Microsoft Security Exposure Management provides the essential tools and insights needed for proactive cybersecurity measures. It is not just a choice; it's a strategic move towards fortifying your organization's defenses in the face of evolving threats. Dive into a new era of cybersecurity resilience by &lt;A href="https://aka.ms/exposuremgmtdocs" target="_blank" rel="noopener"&gt;getting started today&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/get-visibility-into-your-curated-external-assets-with-enhanced/ba-p/4081757</guid>
      <dc:creator>SushmaRaja</dc:creator>
      <dc:date>2024-03-13T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Latest Defender EASM Features Increase Visibility and Enhance Querying for Faster Remediation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/latest-defender-easm-features-increase-visibility-and-enhance/ba-p/4037760</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender External Attack Surface Management (Defender EASM) discovers and classifies assets and workloads across your organization's digital presence to enable teams to understand and prioritize exposed weaknesses in cloud, SaaS, and IaaS resources to strengthen security posture. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Features recently added increase CWE and CVE visibility and boost query efficiency so users can focus on finding the information that's most important to their environment. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Below, learn about these powerful new enhancements and how you can begin using them today. &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;New Features&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;CWE Top 25 Software Weaknesses dashboard&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The Top 25 Common Weakness Enumeration (CWE) list is provided annually by MITRE. These CWEs represent the most common and impactful software weaknesses that are easy to find and exploit. This dashboard displays all CWEs included on the list over the last five years, listing all inventory assets that might be impacted by each CWE. Referencing this dashboard &lt;/SPAN&gt;&lt;SPAN&gt;saves you research time and&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;helps your vulnerability &lt;/SPAN&gt;&lt;SPAN&gt;re&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;mediation efforts by helping you identify the greatest risks to your organization based on other tangible observed exploits.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;CISA Known Exploits dashboard&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;While there are hundreds of thousands of identified CVE vulnerabilities, only a small subset ha&lt;/SPAN&gt;&lt;SPAN&gt;s&lt;/SPAN&gt;&lt;SPAN&gt;ve&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; been identified by the Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) as recently exploited by threat actors. This list includes less than .5% of all identified CVEs; for this reason, it is instrumental to helping security professionals prioritize the remediation of the greatest risks to their organization. Those who remediate threats based on this list operate with the upmost efficiency because they’re prioritizing the vulnerabilities that have resulted in real security incidents.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Both new Defender EASM dashboards are designed to help users find the threats that pose the greatest threat to their organization as efficiently as possible. To learn more about dashboards, see our &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/understanding-dashboards" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;help documentation&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Push notifications&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Users now receive one-time push notifications in the Azure portal to alert them of key updates to their attack surface. These notifications are designed to guide users to the information that helps them create a comprehensive &lt;/SPAN&gt;&lt;SPAN&gt;external &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;attack surface and efficiently manage their ever-changing digital landscape. Users can expect notifications in the following instances:&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Free Trial Ending (within 10 days):&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; when you login to Defender EASM within 10 days of your free trial ending, you will receive a one-time notification that alerts you of the impending trial end.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;New Insight published: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;if your &lt;/SPAN&gt;&lt;SPAN&gt;external &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;attack surface contains inventory assets that are potentially impacted by a new insight, you will receive a notification. Clicking the notification will route you to the detailed list of all assets that are affected by the insight.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Discovery run completion: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;when a discovery run is successfully completed and discovers new assets related to your &lt;/SPAN&gt;&lt;SPAN&gt;external &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;attack surface, you will receive a notification that "X (number) of assets" have been added to your inventory. Click this notification to view a list of the assets added to inventory through that particular discovery run.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Discovery run failure: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;when a discovery run fails, you will receive a push notification that routes you to the Discovery Group page when clicked. This page provides more details about the failure and offers the option to re-run the discovery.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Software Development Kits (SDKs) for Java and Javascript&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Customers can now access client libraries for Javascript and Java that help them operationalize the Defender EASM REST API to automate processes and improve workflows. These SDKs are now available to customers in Public Preview.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;H2 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Key enhancements&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;"NEW" flag for insights&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;New insights are now flagged with “NEW” on the "Attack surface priorities" charts and other areas in the UI.&amp;nbsp; This helps customers quickly navigate to insights that they have not yet investigated, enabling better prioritization when reviewing your attack surface.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;img /&gt;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Discovery run improvements&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Performance enhancements were completed on the backend of the discovery engine to enable larger asset counts to be brought into inventory with each discovery run. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Furthermore, we have added tooltips to the Discovery Group details page to provide more insight into failed discovery runs. By hovering over the information icon next to any failed discovery run within the Run History section, users can understand why their run failed and adjust accordingly before running another discovery, improving efficiency.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Filter editor redesign&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Defender EASM has implemented a new design for filters that makes it easier for you to quickly query your inventory. Each query is now constructed from the main inventory page in a more visual format, making it easier to construct multiple queries before submitting.&amp;nbsp;&amp;nbsp;Unlike the previous filter design, these improvements allow users to view and edit all queries simultaneously before submitting the request, improving the ease of usability of the feature. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;In addition, we have added an “OR” operator for many filters, allowing you to quickly search for multiple desired results. &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;New attack surface insights&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;The Defender EASM team is constantly adding new insights to the platform to ensure that our users have visibility into the latest security threats. The follow insights were added to Defender EASM in the last three months. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Detectable insights&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-42115 - Exim Unauthenticated Remote Code Execution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-40044 - WS_FTP Server Ad Hoc Transfer Unauthorized Deserialization&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-22515 - Confluence Privilege Escalation&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-42793 - TeamCity Unauthenticated Remote Code Execution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-38646 Metabase Unauthenticated Command Execution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-33246 - Apache RocketMQ Broker Unauthenticated Remote Command Injection&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-22518 - Atlassian Confluence Improper Authorization&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-47246 - SysAid Help Desk Path Traversal to Remote Code Execution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-46604 - Apache ActiveMQ OpenWire Broker Remote Code Execution&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;CVE-2023-45849 - Perforce Helix Core Unauthenticated Remote Code Execution over RPC&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;BR /&gt;Potential Insights &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Potential Insights are created when a vulnerable version of software has not been detected and needs to be validated by the customer.&amp;nbsp; Customers using this software should check if they have the vulnerable versions highlighted in the insight:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] August 2023 Juniper Junos OS Multiple Vulnerabilities in J-Web&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] CVE-2023-40044 - WS_FTP Server Ad Hoc Transfer Unauthorized Deserialization&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] CVE-2023-4966 - Citrix NetScaler Gateway and NetScaler ADC Session Token Leak&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] CVE-2023-20198 &amp;amp; CVE-2023-20273 - Cisco IOS XE Authorization Bypass and Privilege Escalation&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] CVE-2023-46747 - F5 BIG-IP Unauthenticated AJP Smuggling&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] CVE-2023-41998 - Arcserve UDP Multiple Vulnerabilities&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] CVE-2023-48365 - Qlik Sense Unauthenticated Remote Code Execution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;[Potential] CVE-2023-50164 - Struts2 Unauthenticated File Traversal and Upload to Remote Code Execution&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 aria-level="3"&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;We want to hear from you!&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;MDEASM is made by security professionals for security professionals. Join our community of security pros and experts to provide product feedback and suggestions and start conversations about how MDEASM helps you manage your attack surface and strengthen your security posture. With an open dialogue, we can create a safer internet together.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 17:04:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/latest-defender-easm-features-increase-visibility-and-enhance/ba-p/4037760</guid>
      <dc:creator>dandennis</dc:creator>
      <dc:date>2024-02-06T17:04:07Z</dc:date>
    </item>
    <item>
      <title>Normalize Billable Assets EASM</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/normalize-billable-assets-easm/m-p/4024392#M9</link>
      <description>&lt;P&gt;Hi, we're currently evaluating EASM and running a trial POC.&lt;/P&gt;&lt;P&gt;We've used the default&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class=""&gt;predefined attack surface template for our Org. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;The Billable asset count number is quite high and "Host: IP pairs" are contributing mostly which are IPv6 addresses. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Can we filter out all these IPv6 for example: Changing their state from Approved to &amp;gt;&amp;gt; "Candidate" or "Dismissed"? The ultimate goal is to normalize the Billable Assets to get accurate cost estimates by filtering out IPv6 addresses. thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 01:18:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/normalize-billable-assets-easm/m-p/4024392#M9</guid>
      <dc:creator>G_Singh_</dc:creator>
      <dc:date>2024-01-09T01:18:13Z</dc:date>
    </item>
    <item>
      <title>New Blog | Defender EASM - Performing a Successful Proof of Concept (PoC)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-defender-easm-performing-a-successful-proof-of-concept/m-p/3996479#M8</link>
      <description>&lt;P&gt;&lt;SPAN class="TextRun SCXW216716608 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;This blog will&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;serve as a&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;high-level&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;guide&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;t&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;o help&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;you&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;execute&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;a simple&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ramew&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;k&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;evaluating De&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ender&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;EASM&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;, and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;other items&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;to consider when&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;embarking on the journey&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;to&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;understand&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;the&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Internet exposed&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;digital&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;assets that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;comprise&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;external&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;attack&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;sur&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ace&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;, s&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;o you can view&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;risks&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;through the same lens as a malicious threat act&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Read the full blog post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/defender-easm-performing-a-successful-proof-of-concept-poc/ba-p/3994862" target="_blank"&gt;Defender EASM - Performing a Successful Proof of Concept (PoC) - Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2023 00:39:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-defender-easm-performing-a-successful-proof-of-concept/m-p/3996479#M8</guid>
      <dc:creator>BrittanyCCP</dc:creator>
      <dc:date>2023-11-30T00:39:54Z</dc:date>
    </item>
    <item>
      <title>Defender EASM - Performing a Successful Proof of Concept (PoC)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/defender-easm-performing-a-successful-proof-of-concept-poc/ba-p/3994862</link>
      <description>&lt;P&gt;&lt;SPAN class="TextRun SCXW216716608 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;Welcome to &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;an&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; introduction&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; o&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; the&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; concepts&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; and simple approach&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;required&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; executing a success&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ul Proo&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; o&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; Concept (PoC) &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;A class="Hyperlink SCXW216716608 BCX8" href="https://learn.microsoft.com/en-gb/azure/external-attack-surface-management/" target="_blank" rel="noreferrer noopener"&gt;&lt;SPAN class="TextRun Underlined SCXW216716608 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8" data-ccp-charstyle="Hyperlink"&gt;Microso&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8" data-ccp-charstyle="Hyperlink"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8" data-ccp-charstyle="Hyperlink"&gt;t De&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8" data-ccp-charstyle="Hyperlink"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8" data-ccp-charstyle="Hyperlink"&gt;ender External Attack Sur&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8" data-ccp-charstyle="Hyperlink"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8" data-ccp-charstyle="Hyperlink"&gt;ace Management&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="TextRun SCXW216716608 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; (D&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;e&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ender &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;EASM). This article will &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;serve as a&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; high-level &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;guide &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;t&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;o help&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; you &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;execute&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;a simple &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ramew&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;k &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;evaluating De&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ender &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;EASM&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;, and &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;other items&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;to consider when&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; embarking on the journey &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;to&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;understand&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;the&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; Internet exposed&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; digital &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;assets that &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;comprise&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt; your &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;external &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;attack &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;sur&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;ace&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;, s&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;o you can view &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;risks &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;through the same lens as a malicious threat act&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;or&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;SPAN class="TextRun SCXW216716608 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW216716608 BCX8"&gt;&lt;SPAN class="TextRun MacChromeBold SCXW14591643 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW14591643 BCX8" data-ccp-parastyle="heading 1"&gt;Planning &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW14591643 BCX8" data-ccp-parastyle="heading 1"&gt;f&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW14591643 BCX8" data-ccp-parastyle="heading 1"&gt;or&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW14591643 BCX8" data-ccp-parastyle="heading 1"&gt; the P&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW14591643 BCX8" data-ccp-parastyle="heading 1"&gt;o&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW14591643 BCX8" data-ccp-parastyle="heading 1"&gt;C&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW14591643 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To ensure success, the first step is planning. This entails understanding the value of Defender EASM, identifying stakeholders who need to be involved, and scheduling planning sessions&amp;nbsp;&lt;SPAN class="NormalTextRun SCXW148052321 BCX8"&gt;to &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW148052321 BCX8"&gt;determine&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW148052321 BCX8"&gt;use cases &amp;amp; &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW148052321 BCX8"&gt;requirements and scope &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW148052321 BCX8"&gt;before beginning&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW148052321 BCX8"&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;For example, one of the core benefits of the Defender EASM solution is that it provides high value &lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;visibility&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt; to Security and IT (Information Technology) teams that enables them to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="21" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Identify previously unknown assets&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="21" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Prioritize risk&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="21" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Eliminate threats&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="21" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Extends vulnerability and exposure control beyond the firewall&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Next, you should identify all relevant stakeholders, or personas, and schedule in 1-2 short planning sessions to document the tasks and expected outcomes, or requirements. These sessions will establish the definition of success for the PoC.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Who are the common stakeholders that should participate in the initial planning sessions? The answer to that question will be unique to each organization, but some common personas include the following:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Vulnerability Management Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;IT personnel responsible for Configuration Management, Patching, Asset Inventory Databases&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Governance, Risk, &amp;amp; Compliance (GRC) Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;(Optional) GRC aligned Legal, Brand Protection, &amp;amp; Privacy Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Internal Offensive Penetration Testing and Red Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Security Operations Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Incident Response Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="11" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Cyber Threat Intelligence, Hunting, and Research Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN class="TextRun MacChromeBold SCXW235888063 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW235888063 BCX8" data-ccp-parastyle="heading 3"&gt;Use Cases &amp;amp; Requirements&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW235888063 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Based on the scope, you can begin collaborating with the correct people to establish use cases &amp;amp; requirements to meet the business goals for the PoC. The requirements should clearly define the subcomponents of the overarching&amp;nbsp;business goals within the charter of your&amp;nbsp;External Attack Surface Management Program. Examples of business goals and high-level supporting requirements might include:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="12" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Discover Uknown Assets&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Find Shadow IT&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="13" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Discover Abandoned Assets&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Resulting from Mergers, Acquistions, or Divestitures&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Insufficient Asset Lifecycle Management in Dev/Test/QA Environments&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="14" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Identification of Vulnerabilities&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Lack of Patching or Configuration Management&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="15" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Assignment of Ownership to Assets&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Line of Business or Subsidiary&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;Based on Geographic Location&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="8" data-aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;On-Prem vs Cloud&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="16" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Reporting, Automation, and Defender EASM&amp;nbsp;Data Integrations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="2"&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/an-introduction-to-microsoft-defender-easm-s-data-connections/ba-p/3931727" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Data Connector&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; integration with Log Analytics or Kusto&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Wingdings" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:2160,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Wingdings&amp;quot;,&amp;quot;469769242&amp;quot;:[9642],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;Use of a reporting or visualization tool, such as &lt;/SPAN&gt;&lt;A href="https://powerbi.microsoft.com/en-us/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;PowerBI&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="o" data-font="Courier New" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="10" data-aria-level="2"&gt;&lt;A href="https://github.com/Azure/MDEASM-Solutions/tree/main/Automation" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Logic Apps&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; to automate management of elements of your attack surface&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN class="TextRun MacChromeBold SCXW184607508 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW184607508 BCX8" data-ccp-parastyle="heading 3"&gt;Prerequisites&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW184607508 BCX8" data-ccp-parastyle="heading 3"&gt; to Exit the Planning Phase&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW184607508 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="18" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="17" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Completion of the Planning Phase!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="18" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="18" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Configure an Azure Active Directory or personal Microsoft account. &lt;/SPAN&gt;&lt;A href="https://signup.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Login or create an account&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; here.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="18" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="19" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Set up a Free 30-day Defender EASM Trial&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;SPAN data-contrast="none"&gt;- Visit the following link for information related to setting up your Defender EASM attack surface &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/cloud-security/microsoft-defender-external-attack-surface-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;today for free&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="18" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="20" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Deploy &amp;amp; Access the Defender EASM Platform&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;SPAN data-contrast="auto"&gt;- Login to &lt;/SPAN&gt;&lt;A href="https://ms.portal.azure.com/auth/login/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Defender EASM&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;SPAN data-contrast="auto"&gt;- Follow the deployment &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/deploying-the-defender-easm-azure-resource" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Quick Start Guide&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Measuring Success?&lt;/H3&gt;
&lt;P&gt;Determining how success will establish the criteria for a successful or failed PoC. Success and Acceptance Criteria should be established for each requirement identified. Weights may be applied to requirements, but measuring success can be as simple as writing out criteria as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Requirement:&lt;/U&gt;&lt;/STRONG&gt; Custom Reporting&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Success Criteria:&lt;/U&gt;&lt;/STRONG&gt; As a vulnerability manager, I want to view a daily report that shows the assets with CVSSv2 and CVSSv3 scores of 10.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Acceptance Criteria:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Data must be exported to Kusto&lt;/LI&gt;
&lt;LI&gt;Data must contain assets &amp;amp; CVSS (Common Vulnerability Scoring System) scores&lt;/LI&gt;
&lt;LI&gt;Dashboards must be created with PowerBI and accessible to user&lt;/LI&gt;
&lt;LI&gt;Dashboard data must be updated daily&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Validation:&lt;/U&gt;&lt;/STRONG&gt; Run a test to validate that acceptance criteria has been met.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Pass / Fail:&lt;/U&gt;&lt;/STRONG&gt; Pass&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1440}"&gt;&lt;SPAN class="TextRun MacChromeBold SCXW146252253 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW146252253 BCX8" data-ccp-parastyle="heading 1"&gt;Executing the PoC&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW146252253 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1440}"&gt;&lt;SPAN class="EOP SCXW146252253 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;EM&gt;&lt;SPAN class="TextRun SCXW41068081 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW41068081 BCX8" data-ccp-parastyle="heading 3"&gt;Implementation an&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW41068081 BCX8" data-ccp-parastyle="heading 3"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW41068081 BCX8" data-ccp-parastyle="heading 3"&gt; Technical Vali&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW41068081 BCX8" data-ccp-parastyle="heading 3"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW41068081 BCX8" data-ccp-parastyle="heading 3"&gt;ation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN class="EOP SCXW41068081 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1440}"&gt;&lt;SPAN class="EOP SCXW146252253 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN class="EOP SCXW41068081 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN class="TextRun SCXW213069409 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;We will now look at &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;five &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;ifferent &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;use &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;cases&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt; &amp;amp; &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;requirements, &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;ef&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;ine the success an&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;d&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;acceptance&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt; criteria for each, an&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;d&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;vali&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;ate&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt; that &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;the requirements are met by &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;observing&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt; the outcome of each in &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;D&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;ef&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;e&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;n&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;e&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;r&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW213069409 BCX8"&gt;EASM.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW213069409 BCX8" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:1440}"&gt;&lt;SPAN class="EOP SCXW146252253 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN class="EOP SCXW41068081 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN class="EOP SCXW213069409 BCX8" data-ccp-props="{}"&gt;&lt;SPAN class="TextRun SCXW226494082 BCX8" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;Use Case&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt; 1&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;:&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;D&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;iscover Unknown Assets&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;, Fin&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;ing Sha&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;d&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW226494082 BCX8" data-ccp-parastyle="heading 3"&gt;ow IT&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW226494082 BCX8" data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Success Criteria: &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;I&gt;&lt;SPAN data-contrast="none"&gt;As a member of the Contoso GRC team, I want to identify Domain assets in our attack surface that have not been registered with the official company email address we use for domain registrations.&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Acceptance Criteria:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="•" data-font="Symbol" data-listid="29" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;•&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="26" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Defender EASM allows for searches of Domain WHOIS data that returns the “Registrant Email” field in the result set.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Validation:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;Click the “Inventory” link on the left of the main Defender EASM page.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-300px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Launch the inventory query screen&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Execute a search in Defender EASM that excludes Domains registered with our official company email address of ‘domainadmin@constoso.com’ and returns all other Domains that have been registered with an email address that contains the email domain ‘contoso.com’.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Query for incorrectly registered Domain assets&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Click on one of the domains in the result set to view asset details. For example, “woodgrovebank.com” domain.&lt;/LI&gt;
&lt;LI&gt;When the asset details open and confirm that the domain ‘woodgrovebank.com’ is in the upper left corner.&lt;/LI&gt;
&lt;LI&gt;Click on the “Whois” tab.&lt;/LI&gt;
&lt;LI&gt;Note that this Domain asset has been registered with an email address that does not match the corporate standard (i.e., “employeeName@contoso.com”) and should be investigated for the existence of Shadow IT.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: WHOIS asset details&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Understand asset details: &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/understanding-asset-details" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/understanding-asset-details&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Domain asset filters: &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/domain-asset-filters" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/domain-asset-filters&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Understanding WHOIS:&amp;nbsp; &lt;A href="https://en.wikipedia.org/wiki/WHOIS" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/WHOIS&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Use Case 2: Abandoned Assets, Acquisitions&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Success Criteria: &lt;/STRONG&gt;&lt;EM&gt;As a member of the Contoso Vulnerability Management team, who just acquired Woodgrove Bank, I want to ensure acquired web sites using the domain “woodgrovebank.com” are redirected to web sites using the domain “contoso.com”.&amp;nbsp; I need to obtain results of web sites that are not redirecting as expected, as those may be abandoned web sites.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Acceptance Criteria:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Defender EASM allows for search of specific initial and final HTTP (Hypertext Transfer Protocol) response codes for Page assets&lt;/LI&gt;
&lt;LI&gt;Defender EASM allows for search of initial and final Uniform Resource Locator (URL) for Page assets&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Validation:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Run a search in Defender EASM that looks for Page assets that have:
&lt;OL type="a"&gt;
&lt;LI&gt;Initial response codes that cause HTTP redirects (i.e., “301”, “302”)&lt;/LI&gt;
&lt;LI&gt;Initial URLs that contain “woodgrovebank.com”&lt;/LI&gt;
&lt;LI&gt;Final HTTP response codes of “200”&lt;/LI&gt;
&lt;LI&gt;Final URL, post HTTP redirect, that do not contain “contso.com”&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Query for incorrect page redirection&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;Click one of the Page assets in the result set to see the asset details.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-270px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Page asset overview&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Validate:
&lt;OL type="a"&gt;
&lt;LI&gt;&amp;nbsp;Initial URL contains “woodgrovebank.com”&lt;/LI&gt;
&lt;LI&gt;Initial response code is either “301” or “301”&lt;/LI&gt;
&lt;LI&gt;Final URL does not contain “contoso.com”&lt;/LI&gt;
&lt;LI&gt;Final response code is “200”&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Asset details summary view: &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/understanding-asset-details" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/understanding-asset-details&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Defender EASM inventory filters overview: &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/inventory-filters" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/inventory-filters&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Page asset filters: &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/page-asset-filters" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/page-asset-filters&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;HTTP Response Codes: &lt;A href="https://en.wikipedia.org/wiki/List_of_HTTP_status_codes" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/List_of_HTTP_status_codes&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Use Case 3: Identification of Vulnerabilities, Lack of Patching or Configuration Management&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Success Criteria: &lt;/STRONG&gt;&lt;EM&gt;As a member of the Contoso Vulnerability Management team, I need the ability to retrieve a list of assets with high priority vulnerabilities and remediation guidance in my attack surface.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Acceptance Criteria:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Defender EASM provides a dashboard of prioritized risks in my external attack surface&lt;/LI&gt;
&lt;LI&gt;Defender EASM provides remediation guidance for each prioritized vulnerability&lt;/LI&gt;
&lt;LI&gt;Defender EASM provides an exportable list of assets impacted by vulnerability&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Validation:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;From the main Defender EASM page, click “Attack Surface Summary” to view the “Attack Surface Summary” dashboard&lt;/LI&gt;
&lt;LI&gt;Click the link that indicates the number of assets impacted by a specific vulnerability to view a list of impacted assets&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Attack Surface Insights Dashboard&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Validate that Defender EASM provides additional information about vulnerabilities and remediation guidance.&lt;/LI&gt;
&lt;LI&gt;Click the link in the upper right corner titled “Download CSV report” and validate the contents within&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Vulnerability remediation details&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Understanding dashboards: &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/understanding-dashboards" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/understanding-dashboards&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Understanding CVEs: &lt;A href="https://nvd.nist.gov/vuln" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Use Case 4: Assignment of Ownership to Assets, Line of Business or Subsidiary&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Success Criteria: &lt;/STRONG&gt;&lt;EM&gt;As a member of the Contoso GRC team, I need the ability to assign ownership of assets to specific business units through, along with a mechanism to quickly visualize this relationship.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Acceptance Criteria:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Defender EASM provides an approach to assigning ownership via labels&lt;/LI&gt;
&lt;LI&gt;Defender EASM allows users to apply labels to assets that meet specific indicators that indicate affiliation with a specific business unit&lt;/LI&gt;
&lt;LI&gt;Defender EASM provides the ability to apply labels in bulk&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Validation:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Click the “Inventory” link on the left of the main Defender EASM page to launch the search screen&lt;/LI&gt;
&lt;LI&gt;Run a search that returns all Page assets that are on the IP Block “10.10.10.0/24”. The Page assets on this network all belong to the Financial Services line of business, so it is the only indicator of ownership needed in this example.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Query to determine Page asset ownership by IP Block&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Select all assets in the result set by clicking the arrow to the right of the checkbox as shown in the following image and choose the option for all assets.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Selecting assets for bulk modification&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;Click the link to modify assets, followed by the link to “Create a new label” on the blade that appears.&lt;/LI&gt;
&lt;LI&gt;A new screen will appear that allows the creation of a label. Enter a descriptive “Label name”, an optional “Display name”, select a desired color, and click “Add” to finish creating a label.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Link to modify assets and create a label&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-150px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Create label detail&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-210px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="7"&gt;
&lt;LI&gt;After creating the label, you will be directed back to the screen to modify assets. Validate that the label was created successfully.&lt;/LI&gt;
&lt;LI&gt;Click into the label text box to see a list of labels available to choose from and select the one that was just created.&lt;/LI&gt;
&lt;LI&gt;Click “Update”&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-300px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Label selected assets&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="10"&gt;
&lt;LI&gt;Click the bell icon to view task notifications to validate the status of labels update.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-270px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: View status of label update task&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-270px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="11"&gt;
&lt;LI&gt;When the task is complete, run the search again to validate that labels have been applied to the assets owned by the Financial Services organization.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-300px"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Figure: Query to validate labels have been applied to assets&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-300px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Asset modification overview: &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/labeling-inventory-assets" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/labeling-inventory-assets&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Defender EASM inventory filters overview: &lt;U&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/inventory-filters" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/external-attack-surface-management/inventory-filters&lt;/A&gt;&lt;/U&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;
&lt;H1&gt;&lt;STRONG&gt;Finishing the PoC&lt;/STRONG&gt;&lt;/H1&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Summarize Your Findings&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Identify how the Defender EASM solution has provided increased &lt;STRONG&gt;visibility&lt;/STRONG&gt; to your organization’s attack surface in the PoC.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Have you discovered unknown assets related to Shadow IT?&lt;/LI&gt;
&lt;LI&gt;Were you able to find potentially abandoned assets related to an acquisition?&lt;/LI&gt;
&lt;LI&gt;Has your organization been able to better prioritize vulnerabilities to focus on the most severe risks?&lt;/LI&gt;
&lt;LI&gt;Do you know have a better view of asset ownership in your organization?&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Feedback?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;We would love to hear any ideas you may have to improve our Defender EASM platform or where and how you might use Defender EASM data elsewhere in the Microsoft Security ecosystem or other security 3&lt;SUP&gt;rd&lt;/SUP&gt; party applications. Please contact us via email at &lt;A href="mailto:mdeasm-pm@microsoft.com" target="_blank" rel="noopener"&gt;mdesam-pm@microsoft.com&lt;/A&gt; to share any feedback you have regarding Defender EASM.&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;Interested in Learning About New Defender EASM Features?&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;Please join our &lt;A href="https://aka.ms/JoinCCP" target="_blank" rel="noopener"&gt;Microsoft Security Connection Program&lt;/A&gt; if you are not a member and follow our Private &amp;amp; Public Preview events. &lt;EM&gt;&lt;U&gt;You will not have access to this exclusive Teams channel until you complete the steps to become a &lt;/U&gt;&lt;/EM&gt;&lt;A href="https://aka.ms/JoinCCP" target="_blank" rel="noopener"&gt;&lt;EM&gt;Microsoft Security Connection Program&lt;/EM&gt;&lt;/A&gt;&lt;EM&gt;&lt;U&gt; member.&lt;/U&gt;&lt;/EM&gt; Users that would like to influence the direction/strategy of our security products are encouraged to participate in our Private Preview events. Members who participate in these events will earn credit for respective Microsoft product badges delivered by &lt;A href="https://info.credly.com/" target="_blank" rel="noopener"&gt;Credly&lt;/A&gt;.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;You now understand how to execute a simple Defender EASM PoC, to include deploying your first Defender EASM resource, identifying common personas, how to set requirements, and measure success. Do not forget! - you can enjoy a free 30-day trial by clicking on the link below.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/cloud-security/microsoft-defender-external-attack-surface-management" target="_blank" rel="noopener"&gt;You can discover your attack surface discovery journey today for free&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 16:06:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/defender-easm-performing-a-successful-proof-of-concept-poc/ba-p/3994862</guid>
      <dc:creator>Michael_Lindsey</dc:creator>
      <dc:date>2023-11-29T16:06:30Z</dc:date>
    </item>
    <item>
      <title>Optimize insights and efficiency with latest Defender EASM features and generative AI integrations</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/m-p/3984273#M7</link>
      <description>&lt;P&gt;New Blog |&amp;nbsp;Optimize insights and efficiency with latest Defender EASM features and generative AI integrations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Over the last six months, Microsoft Defender External Attack Surface Management (EASM) has released updates that help Defender EASM customers increase the speed to operationalize its findings. Now, vulnerability management teams are using labels to drive workflows and denote asset ownership, they are saving queries to quickly modify newly discovered assets, and they are combining it all with data connector exports to generate custom reports to help them see their security data holistically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These new features that we’ve recently delivered make it easier for our customers to track inventory changes, see important asset findings in one place, connect data to supplement workflows, and has made managing assets and long-running tasks more efficient.&lt;/P&gt;
&lt;P&gt;Additionally, we’re excited to announce that we’ve extended Defender EASM’s footprint into Microsoft Security Copilot with capabilities that enable Copilot users to learn more about their external attack surface exposures in context and at AI speeds.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Read on to learn more about the latest in Defender EASM:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482" target="_blank"&gt;Optimize insights and efficiency with latest Defender EASM features and generative AI integrations - Microsoft Community Hub&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 22:59:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/m-p/3984273#M7</guid>
      <dc:creator>BrittanyCCP</dc:creator>
      <dc:date>2023-11-15T22:59:56Z</dc:date>
    </item>
    <item>
      <title>Optimize insights and efficiency with latest Defender EASM features and generative AI integrations</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482</link>
      <description>&lt;P&gt;Discovering and prioritizing vulnerabilities that often arise as a result of known and unknown internet-exposed assets – which can emerge from shadow IT, the supply chain, and the shift of moving to the cloud, for example – is an essential practice our customers take to reduce external risk and stay secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Over the last six months, Microsoft Defender External Attack Surface Management (EASM) has released updates that help Defender EASM customers increase the speed to operationalize its findings. Now, vulnerability management teams are using labels to drive workflows and denote asset ownership, they are saving queries to quickly modify newly discovered assets, and they are combining it all with data connector exports to generate custom reports to help them see their security data holistically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These new features that we’ve recently delivered make it easier for our customers to track inventory changes, see important asset findings in one place, connect data to supplement workflows, and has made managing assets and long-running tasks more efficient.&lt;/P&gt;
&lt;P&gt;Additionally, we’re excited to announce that we’ve extended Defender EASM’s footprint into Microsoft Security Copilot with capabilities that enable Copilot users to learn more about their external attack surface exposures in context and at AI speeds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Read on to learn more about the latest in Defender EASM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Understand inventory changes over time&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;While Defender EASM has long provided detailed dashboards with information on vulnerabilities, misconfigurations, breakdowns of device types, and other useful analytics, these have primarily focused on point-in-time snapshot-style views. In October, we released a new &lt;STRONG&gt;dashboard that shows inventory changes&lt;/STRONG&gt; in your attack surface. With the introduction of this dashboard, you can now see changes to the attack surface over time, as assets move in and out of the attack surface, whether automatically due to Microsoft’s ongoing scanning and enumeration, or due to manual curation in product, or even via API-based adjustments made via external integrations. In addition to a graphical overview of the changes over the selected time period (7 or 30 days), you can also see the change counts for each day in the last 30 days, both in the aggregate and for each individual asset type.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Inventory changes dashboard in Defender EASM&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;See asset vulnerabilities in one place&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;In Defender EASM we have two different detection methods used to identify software, services, and vulnerabilities on your external assets: insight detections authored by Microsoft’s security research team, and internet graph-based detections based on software and service components that Defender EASM can identify in your environment, allowing us to identify likely CVEs on assets. Our two different detection methods complement one another and are valuable in generating the most accurate coverage, however, analysts sometimes found it challenging to align the two together when inspecting assets, and complicated to identify which observations came from Microsoft research versus graph detection, or both methods combined.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In June, we introduced a new feature into the Defender EASM interface that helps &lt;STRONG&gt;unify asset detail data&lt;/STRONG&gt; and showcases all high, medium, and low priority observations related to any given asset in a single tab, labeled “Observations”, on the asset details page. The new tab is helpful so you can see exactly which detection method the insights are coming from, whether that be from research, graph detection, or both. This new tab represents a significant step in unifying findings in the EASM interface so that analysts can understand all the security posture-relevant findings for an asset in a single place and make smart decisions about how best to proceed in terms of investigation or remediation steps. Analysts can also more clearly understand the breadth of Microsoft’s security knowledge regarding any given asset and feel confident that EASM is providing them with clear guidance as they evaluate ongoing deployment of security controls, whether direct or compensating.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Observations tab Defender EASM&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Connect, organize, and take action on your data&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This year, we’ve added many new capabilities and features in Defender EASM that make it easier for you to &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/an-introduction-to-microsoft-defender-easm-s-data-connections/ba-p/3931727" target="_blank" rel="noopener"&gt;connect your external attack surface data&lt;/A&gt; to other Microsoft tools, as well as the ability to keep assets organized with &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/labeling-inventory-assets" target="_blank" rel="noopener"&gt;labeling, bulk modification, and task management&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Created to supplement existing workflows, gain new insights, and automate data flow between tools, Defender EASM’s recent &lt;STRONG&gt;data connections&lt;/STRONG&gt; feature is compatible with both Microsoft Log Analytics and Azure Data Explorer. The integration provides external attack surface data flow into your mission-critical systems, so you can get a holistic view of your data, enhance data visualizations, stay compliant, and effectively guard against vulnerabilities. Learn how to get started with data connections &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/data-connections" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Data connections in Defender EASM&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Organizing attack surface data – even after you’ve enabled a data connection – is important because it helps you apply business context to the asset at hand. For example, labeling assets is helpful to distinguish any assets that may have come in from a merger or acquisition, or those that require compliance monitoring, or when dealing with assets impacted by a specific vulnerability that requires mitigation. New this year, we’ve added the ability to &lt;STRONG&gt;apply any text label to a subset of assets&lt;/STRONG&gt; – including within any asset export via the data connectors – so they can be grouped together to better operationalize your inventory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Asset labeling in Defender EASM&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In addition to applying labels to better organize assets, assets can also be categorized to tell you what their role is within your organization. For example, if the asset is approved and owned, or dependent on a third party, or only retained in your inventory to be monitored. Now, you can &lt;STRONG&gt;change the state of your selected assets in bulk&lt;/STRONG&gt;, saving you time in categorizing many assets at once.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Changing the state of your assets in bulk in Defender EASM&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the new ability to modify hundreds – or even thousands – of assets at a time, we’ve added a new &lt;STRONG&gt;“Task Manager” page&lt;/STRONG&gt; to Defender EASM, making it possible to easily track the progress of tasks (like asset modification or downloading dashboard chart data) that may take a longer time to complete. Furthermore, you will also be &lt;STRONG&gt;notified via a pop-up&lt;/STRONG&gt; about the progress of any relevant tasks that are running in the background – eliminating the need to check the status every so often and helping you stay focused on other priorities.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Task manager page in Defender EASM&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Notifications in Defender EASM&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Learn more about organizing, modifying, and tracking your external attack surface data &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/labeling-inventory-assets" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Get a snapshot view of your external attack surface with generative AI&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;We are excited to announce our new Defender EASM capabilities within the Microsoft Security Copilot standalone experience, currently available in the Early Access Program. These capabilities enable your security teams to quickly gain derive insights into your (non-curated) external attack surface at AI speeds – without the need for prior configuration in Defender EASM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The capabilities solve for three distinct needs:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;They help SOC teams understand their externally facing assets&lt;/LI&gt;
&lt;LI&gt;They help vulnerability managers understand particular CVEs of impact&lt;/LI&gt;
&lt;LI&gt;They help security teams know where to start prioritizing remediation efforts&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Let’s dive into how you can use the capabilities to address each.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Understand your externally facing assets&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Understanding your digital footprint as threats emerge every day is critical in keeping your organization secure and compliant. The new set of Defender EASM capabilities in Security Copilot allow your organization’s SOC team to obtain a global snapshot view of the external attack surface, based on Microsoft’s pre-built library of external attack surfaces, by identifying externally facing assets exposed to the internet -- such as domains, hosts, and IP addresses – whether they are hosted on premise, in the cloud, or originating from a third party. You can also see how many high, medium, and low priority insights that may impact your organization are present, and quickly identify the assets they are tied to.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use any of the following prompts in Security Copilot to understand your external attack surface:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Please tell me my externally facing assets.&lt;/LI&gt;
&lt;LI&gt;Get the external attack surface for [my organization].&lt;/LI&gt;
&lt;LI&gt;What is the external attack surface for [my organization]?&lt;/LI&gt;
&lt;LI&gt;What are the externally facing assets for [my organization]?&lt;/LI&gt;
&lt;LI&gt;How many High Priority Insights impact my external attack surface?&lt;/LI&gt;
&lt;LI&gt;Get high priority attack surface insights for [my organization].&lt;/LI&gt;
&lt;LI&gt;Get low priority attack surface insights for [my organization].&lt;/LI&gt;
&lt;LI&gt;Does my organization have high severity vulnerabilities in the external attack surface?&lt;/LI&gt;
&lt;LI&gt;Are there any medium priority insights?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Understanding the external attack surface in Security Copilot’s standalone experience&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Understand particular CVEs of impact&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;After you’ve understood your attack surface composition, it’s imperative to investigate if there are high priority insights present so you can understand which assets are risky to your organization. Defender EASM capabilities do the digging for you, enabling you to quickly see high priority observations and significantly reduce the time it takes to research vulnerable assets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use the following prompts to understand if your organization is impacted by a particular CVE of interest and get visibility into vulnerable and critical high severity CVEs:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Is my external attack surface impacted by [CVE ID]?&lt;/LI&gt;
&lt;LI&gt;Get assets affected by [CVE ID] for my organization.&lt;/LI&gt;
&lt;LI&gt;Which assets are affected by [CVE ID] for my organization?&lt;/LI&gt;
&lt;LI&gt;Is my external attack surface impacted by [CVE ID]?&lt;/LI&gt;
&lt;LI&gt;Are any assets impacted be [CVE ID] for [my organization]?&lt;/LI&gt;
&lt;LI&gt;Get assets affected by high severity CVSS’s in my attack surface.&lt;/LI&gt;
&lt;LI&gt;How many high priority insights impact my external attack surface?&lt;/LI&gt;
&lt;LI&gt;How many assets have critical CVSS’s for my organization?&lt;/LI&gt;
&lt;LI&gt;What assets are affected by CVSS for [my organization]?&lt;/LI&gt;
&lt;LI&gt;Are there assets with high CVSS scores for [my organization]?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Showcasing particular CVEs within the external attack surface in Security Copilot’s standalone experience&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Asking about high priority insights in Security Copilot’s standalone experience&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Understand how you should prioritize your remediation efforts&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Once you’ve found the assets that need attention, Defender EASM capabilities will take it a step further and identify assets that need immediate attention by showing assets with critical and high CVSS scores, expired domains and SSL certificates, and any assets using SSL SHA1. This is helpful in reducing the time it takes you to determine which assets should be remediated first.&lt;/P&gt;
&lt;P&gt;Use the following prompts to unlock which assets need your attention first:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;How many domains are expired in my organization’s attack surface?&lt;/LI&gt;
&lt;LI&gt;How many assets are using expired domains for my organization?&lt;/LI&gt;
&lt;LI&gt;How many SSL certificates are expired for my organization?&lt;/LI&gt;
&lt;LI&gt;How many assets are using expired SSL certificated for my organization?&lt;/LI&gt;
&lt;LI&gt;How many SSL SHA1 certificates are present for my organization?&lt;/LI&gt;
&lt;LI&gt;How many assets are using SSL SHA 1 for my organization?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;Checking for expired domains in Security Copilot’s standalone experience&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Defender EASM capabilities in Security Copilot make it easy for you to get a snapshot view of your external attack surface, without needing to create a Defender EASM workspace.&lt;/P&gt;
&lt;P&gt;Interest in the Security Copilot Early Access Program has been high and space is still available. Reach out to your sales representative to get more details on early access program qualifications.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/optimize-insights-and-efficiency-with-latest-defender-easm/ba-p/3976482</guid>
      <dc:creator>gkostolny</dc:creator>
      <dc:date>2023-11-15T16:00:00Z</dc:date>
    </item>
    <item>
      <title>An introduction to Microsoft Defender EASM’s Data Connections functionality</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/an-introduction-to-microsoft-defender-easm-s-data-connections/ba-p/3931727</link>
      <description>&lt;P&gt;Microsoft Defender External Attack Surface Management (EASM) continuously discovers a large amount of up-to-the-minute attack surface data, helping organizations know where their internet-facing assets lie. Connecting and automating this data flow to all our customers’ mission-critical systems that keep their organizations secure is essential to understanding the data holistically and gaining new insights, so organizations can make &amp;nbsp;&amp;nbsp;&amp;nbsp; informed, data-driven decisions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In June, we released the new &lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/data-connections" target="_blank" rel="noopener"&gt;Data Connections&lt;/A&gt; feature within Defender EASM, which enables seamless integration into Azure Log Analytics and Azure Data Explorer, helping users supplement existing workflows to gain new insights as the data flows from Defender EASM into the other tools. The new capability is currently available in public preview for Defender EASM customers.&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&lt;STRONG&gt;Why use data connections?&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;The data connectors for Log Analytics and Azure Data Explorer can easily augment existing workflows by automating recurring exports of all asset inventory data and the set of potential security issues flagged as insights to specified destinations to keep other tools continually updated with the latest findings from Defender EASM. Benefits of this feature include:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Users have the option to build &lt;STRONG&gt;custom dashboards and queries&lt;/STRONG&gt; to enhance security intelligence. This allows for easy visualization of attack surface data, to then go and perform data analysis.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Custom reporting&lt;/STRONG&gt; enables users to leverage tools such as Power BI. Defender EASM data connections will allow the creation of custom reports that can be sent to CISOs and highlight security focus areas.&lt;/LI&gt;
&lt;LI&gt;Data connections enable users to easily access their environment for &lt;STRONG&gt;policy compliance&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Defender EASM’s data connectors significantly &lt;STRONG&gt;enrich existing data&lt;/STRONG&gt; to be better utilized for threat hunting and incident handling.&lt;/LI&gt;
&lt;LI&gt;Data connectors for Log Analytics and Azure Data Explorer enable organizations to &lt;STRONG&gt;integrate Defender EASM workflows&lt;/STRONG&gt; into the local systems for improved monitoring, alerting, and remediation.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;In what situations could the data connections be used?&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;While there are many reasons to enable data connections, below are a few common use cases and scenarios you may find useful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The feature allows users to push asset data or insights to &lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/tutorial-log-alert" target="_blank" rel="noopener"&gt;Log Analytics to create alerts&lt;/A&gt; based on custom asset or insight data queries. For example, a query that returns new High Severity vulnerability records detected on Approved inventory can be used to trigger an email alert, giving details and remediation steps to the appropriate stakeholders. The ingested logs and Alerts generated by Log Analytics can also be visualized within tools like Workbooks or Microsoft Sentinel.&lt;/LI&gt;
&lt;LI&gt;Users can push asset data or insights to Azure Data Explorer/Kusto to generate &lt;A href="https://learn.microsoft.com/en-us/azure/data-explorer/dashboard-customize-visuals" target="_blank" rel="noopener"&gt;custom reports&lt;/A&gt; or dashboards via Workbooks or Power BI. For example, a custom-developed dashboard that shows all of a customer’s approved Hosts with recent/current expired SSL Certificates that can be used for directing and assigning the appropriate stakeholders in your organization for remediation.&lt;/LI&gt;
&lt;LI&gt;Users can include asset data or insights in a data lake or other automated workflows. For example, generating trends on new asset creation and attack surface composition or discovering unknown cloud assets that return 200 response codes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;STRONG&gt;How do I get started with Data Connections?&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;We invite all Microsoft Defender EASM users to participate in using the data connections to Log Analytics and/or Azure Data Explorer so you can experience the enhanced value it can bring to your data, and thus, your security insights.&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Step 1) Ensure your organization meets the preview prerequisites&lt;/STRONG&gt;&lt;/H3&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="312px" height="30px"&gt;
&lt;P&gt;&lt;STRONG&gt;Aspect&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="312px" height="30px"&gt;
&lt;P&gt;&lt;STRONG&gt;Details&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="312px" height="112px"&gt;
&lt;P&gt;Required/Preferred&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Environmental Requirements&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="312px" height="112px"&gt;
&lt;P&gt;Defender EASM resource must be created and contain an Attack Surface footprint. &lt;BR /&gt;Must have Log Analytics and/or Azure Data Explorer/ Kusto&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="312px" height="140px"&gt;
&lt;P&gt;Required Roles &amp;amp; Permissions&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="312px" height="140px"&gt;
&lt;P&gt;- Must have a tenant with Defender EASM created (or be willing to create one). This provisions the EASM API service principal.&lt;/P&gt;
&lt;P&gt;- User and Ingestor roles assigned to EASM API (Azure Data Explorer)&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Step 2) Access the Data Connections&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Users can access Data Connections from the &lt;STRONG&gt;Manage &lt;/STRONG&gt;section of the left-hand navigation pane (shown below) within their Defender EASM resource blade. This page displays the data connectors for both Log Analytics and Azure Data Explorer, listing any current connections and providing the option to add, edit or remove connections.&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Connection prerequisites:&lt;/STRONG&gt; To successfully create a data connection, users must first ensure that they have completed the required steps to grant Defender EASM permission for the tool of their choice. This process enables the application to ingest our exported data and provides the authentication credentials needed to configure the connection.&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Step 3: Configure Permissions for Log Analytics and/or Azure Data Explorer&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Log Analytics:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the Log Analytics workspace that will ingest your Defender EASM data or&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/azure-monitor/logs/quick-create-workspace?tabs=azure-portal" target="_blank" rel="noopener"&gt;create a new workspace&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;On the leftmost pane, under&amp;nbsp;&lt;STRONG&gt;Settings&lt;/STRONG&gt;, select&amp;nbsp;&lt;STRONG&gt;Agents&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;img /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Data Explorer:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Expand the&amp;nbsp;&lt;STRONG&gt;Log Analytics agent instructions&lt;/STRONG&gt;&amp;nbsp;section to view your workspace ID and primary key. These values are used to set up your data connection.&lt;/LI&gt;
&lt;LI&gt;Open the Azure Data Explorer cluster that will ingest your Defender EASM data or &lt;A href="https://learn.microsoft.com/en-us/azure/data-explorer/create-cluster-database-portal" target="_blank" rel="noopener"&gt;create a new cluster&lt;/A&gt;.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Databases &lt;/STRONG&gt;in the Data section of the left-hand navigation menu.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Select + Add Database to create a database to house your Defender EASM data.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;4. Name your database, configure retention and cache periods, then select &lt;STRONG&gt;Create.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;5.&amp;nbsp;Once your Defender EASM database has been created, click on the database name to open the details page. Select &lt;STRONG&gt;Permissions &lt;/STRONG&gt;from the Overview section of the left-hand navigation menu.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;To successfully export Defender EASM data to Data Explorer, users must create two new permissions for the EASM API: &lt;STRONG&gt;user &lt;/STRONG&gt;and &lt;STRONG&gt;ingestor&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;6. First, select &lt;STRONG&gt;+ Add &lt;/STRONG&gt;and create a user. Search for “&lt;STRONG&gt;EASM API&lt;/STRONG&gt;,” select the value, then click &lt;STRONG&gt;Select. &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;7. Select &lt;STRONG&gt;+ Add &lt;/STRONG&gt;to create an ingestor. Follow the same steps outlined above to add the EASM API as an ingestor.&lt;/P&gt;
&lt;P&gt;8. Your database is now ready to connect to Defender EASM.&lt;/P&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Step 4: Add data connections for Log Analytics and/or Azure Data Explorer&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Log Analytics:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Users can connect their Defender EASM data to either Log Analytics or Azure Data Explorer. To do so, select “Add connection” from the Data Connections page for the appropriate tool.&amp;nbsp; The Log Analytics connection addition is covered below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A configuration pane will open on the right-hand side of the Data Connections screen as shown below. The following fields are required:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;: enter a name for this data connection.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Workspace ID&lt;/STRONG&gt; For Log Analytics, users enter the Workspace ID and the coinciding API key associated with their account.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Api key &lt;/STRONG&gt;Log Analytics users enter the API key associated with their account&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Content&lt;/STRONG&gt;: users can select to integrate asset data, attack surface insights, or both datasets.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Frequency: &lt;/STRONG&gt;select the frequency that the Defender EASM connection sends updated data to the tool of your choice. Available options are daily, weekly, and monthly.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Azure Data Explorer:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Azure Data Explorer connection addition is covered below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A configuration pane will open on the right-hand side of the Data Connections screen as shown below. The following fields are required:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;: enter a name for this data connection.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cluster name:&lt;/STRONG&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Region: &lt;/STRONG&gt;The region associated with Azure Data explorer&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Database: &lt;/STRONG&gt;The database associated with the Azure Data explorer&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Content&lt;/STRONG&gt;: users can select to integrate asset data, attack surface insights, or both datasets.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Frequency: &lt;/STRONG&gt;select the frequency that the Defender EASM connection sends updated data to the tool of your choice. Available options are daily, weekly, and monthly.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;&lt;STRONG&gt;Step 5: View data and gain security insights&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;To view the ingested Defender EASM asset and attack surface insight data, you can use the query editor available by selecting the ”Logs” option from the left hand menu of the Azure Log Analytics Workspace you created earlier. These tables are also updated at the Data Connection configuration record frequency.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Extending Defender EASM Asset and Insights data, via these two new data connectors, into Azure ecosystem tools like Log Analytics and Data Explorer enables customers to orchestrate the creation of contextualized data views that can be operationalized into existing workflows and provides the facility and toolsets for analysts to investigate and develop new methods of applicative Attack Surface Management.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Additional resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://ms.portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.Easm%2Fworkspaces" target="_blank" rel="noopener"&gt;Use Defender EASM to enable Data Connections in the Azure Portal&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/data-connections" target="_blank" rel="noopener"&gt;Learn more about Data Connections&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/external-attack-surface-management/data-connections" target="_blank" rel="noopener"&gt;Learn how to start using Defender EASM&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/bg-p/DefenderExternalAttackSurfaceMgmtBlog" target="_blank" rel="noopener"&gt;Check out our Tech Community blog for more Defender EASM content&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 19 Sep 2023 16:32:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/an-introduction-to-microsoft-defender-easm-s-data-connections/ba-p/3931727</guid>
      <dc:creator>lgoduti</dc:creator>
      <dc:date>2023-09-19T16:32:08Z</dc:date>
    </item>
    <item>
      <title>New Blog | One Microsoft: Enriching MDEASM assets with Threat Intelligence Feeds</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-one-microsoft-enriching-mdeasm-assets-with-threat/m-p/3906412#M6</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Organizations need processes and tools such as Microsoft Defender External Attack Surface Management (MDEASM) to help with identifying and managing the points in a software system or network infrastructure that could be targeted by potential attackers. These points, often referred to as "attack vectors," are vulnerabilities or weaknesses that attackers could exploit to gain unauthorized access, compromise systems, or steal sensitive data.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The External Attack Surface specifically refers to the components and interfaces of a system that are exposed to the outside world, such as public-facing applications, network services, APIs, and other entry points. These are the points that can be targeted by attackers who are trying to breach the system from outside the organization's perimeter.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog covers how Microsoft Security can help identify threats by leveraging Microsoft Defenders External Attack Surface Management asset discovery against the Microsoft Defender Threat Intelligence feeds.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;Read the full blog post here:&amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-external/one-microsoft-enriching-mdeasm-assets-with-threat-intelligence/ba-p/3905929" target="_blank"&gt;One Microsoft: Enriching owned assets with Threat Intelligence Feeds&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 17:25:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-external/new-blog-one-microsoft-enriching-mdeasm-assets-with-threat/m-p/3906412#M6</guid>
      <dc:creator>BrittanyCCP</dc:creator>
      <dc:date>2023-08-22T17:25:55Z</dc:date>
    </item>
  </channel>
</rss>

