<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Security Exposure Management Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/bg-p/securityexposuremanagement</link>
    <description>Microsoft Security Exposure Management Blog articles</description>
    <pubDate>Tue, 28 Apr 2026 22:56:45 GMT</pubDate>
    <dc:creator>securityexposuremanagement</dc:creator>
    <dc:date>2026-04-28T22:56:45Z</dc:date>
    <item>
      <title>Shadow IT Isn’t Going Away: Why Continuous Discovery May Be the Only Way Forward</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/shadow-it-isn-t-going-away-why-continuous-discovery-may-be-the/ba-p/4456242</link>
      <description>&lt;P&gt;Shadow IT has always been a bit of a ghost story in cybersecurity. You know it’s there, lurking in the background, but it rarely shows itself until something goes wrong. For years, people thought it just meant employees sneaking Dropbox or Slack into their workflow without permission. That’s still part of it, sure, but the real problem today seems much bigger.&lt;/P&gt;
&lt;P&gt;Think about all the unmanaged devices on a corporate network. Or those forgotten cloud workloads someone spun up two years ago for testing and never shut down. Then there are service accounts, the non-human identities that quietly run apps and services. Many of these have privileges no one has looked at in years. Together, these blind spots appear to create prime entry points for attackers who specialize in looking where defenders aren’t paying attention.&lt;/P&gt;
&lt;P&gt;The cost of ignoring this hidden world isn’t just about “hypothetical risk.” It can mean leaked data, messy compliance violations, or ransom payments that end up on the evening news. If that sounds a little grim, well, that’s because it is. Organizations have spent huge sums hardening what they can see, while an equal amount of exposure lingers out of sight.&lt;/P&gt;
&lt;P&gt;This is why more security leaders are starting to change track. Instead of waiting for a quarterly assessment to tell them what broke, they’re leaning toward something called Continuous Threat Exposure Management (CTEM). It’s not just another acronym for the shelf. CTEM is more like a discipline, a way to constantly simulate, validate, and rank how attackers could realistically move through an environment. The model usually unfolds in five stages: Discovery, Prioritization, Validation, Mobilization, and Remediation.&lt;/P&gt;
&lt;P&gt;If you’ve been around long enough, you’ve probably seen the “fix it when it breaks” approach. CTEM tries to replace that with a more ongoing, resilient cycle. Microsoft has wrapped this idea into its Microsoft Security Exposure Management (MSEM) platform. Instead of treating vulnerabilities as an endless list to check off, MSEM reframes the question: not just &lt;EM&gt;what&lt;/EM&gt; is vulnerable, but &lt;EM&gt;how&lt;/EM&gt; that exposure ties to your actual business.&lt;/P&gt;
&lt;P&gt;MSEM often gets mistaken for just another scanning tool. It isn’t. It’s closer to the central hub of a security strategy, a place where all the scattered pieces of intelligence finally meet.&lt;/P&gt;
&lt;P&gt;The core idea is simple enough: every part of the environment, cloud workloads, endpoints, identities, and apps produces fragments of data. On their own, those fragments don’t mean much. MSEM’s job is to collect them, stitch them together, and translate the mess into something actionable. Instead of drowning in endless logs and alerts, security teams see what Microsoft calls “security initiatives.” These are basically projects framed around specific risks: protecting against ransomware, locking down external attack surfaces, cleaning up identity sprawl, and so on.&lt;/P&gt;
&lt;P&gt;What makes this design compelling is that it gives organizations a way to treat security posture as a set of measurable efforts rather than an abstract state. You’re not just “more secure” in theory; you can point to initiatives, track progress through metrics (such as ‘Non compliant Impersonation Protection controls for improved protection against financial fraud’), and adjust resources where the gaps are most obvious.&lt;/P&gt;
&lt;P&gt;Now, it’s easy to assume MSEM does all of this discovery work itself. That’s not really the case. Its strength lies in pulling from a broad range of specialized tools inside the Microsoft ecosystem, and 3&lt;SUP&gt;rd&lt;/SUP&gt; party solutions like Qualys, Rapid7, and Tenable. Defender for Endpoint handles unmanaged devices, Defender for Cloud Apps watches application usage, Defender for Cloud keeps an eye on cloud workloads, and so on. Each tool acts as its own sensor. MSEM acts more like the conductor, turning the individual notes into a single performance.&lt;/P&gt;
&lt;P&gt;This architectural choice matters. It’s what turns a scattered set of insights into an integrated view of exposure. Without that, security teams would be left chasing alerts from ten different dashboards, never quite seeing how the pieces connect.&lt;/P&gt;
&lt;P&gt;A lot of people assume MSEM is doing the heavy lifting of discovery all by itself. That’s not really true. Its real value shows up in how it pulls intelligence from across Microsoft’s security ecosystem and then makes sense of it in one place.&lt;/P&gt;
&lt;P&gt;Think of it this way: discovery is spread out across specialized tools; each built for a different job. Microsoft Defender External Attack Surface Management (MDEASM) scans what’s exposed on the internet. Microsoft Defender for Endpoint (MDE) looks inward, finding unmanaged devices and IoT gear floating around on the network. Defender for Cloud keeps watch over workloads in Azure, AWS, and Google Cloud. And Defender for Cloud Apps (MDA) tracks SaaS sprawl and risky usage patterns.&lt;/P&gt;
&lt;P&gt;Each one of these tools is like a domain expert. They collect and classify what they see, then hand their findings over to MSEM. What MSEM does is correlation; it aggregates the raw discoveries into a central intelligence layer. Without that, you’d just have silos of disconnected data. With it, you get something closer to a map of your real exposure.&lt;/P&gt;
&lt;P&gt;This setup may sound a little abstract, but the architectural pattern matters. Security teams aren’t just pulling findings from one box or another. They’re seeing how external assets connect to internal devices, how apps tie back to identities, and how it all flows into business risk. That’s the leap from discovery-as-a-feature to discovery-as-a-system.&lt;/P&gt;
&lt;H2&gt;The Foundational Pillars of Continuous Discovery&lt;/H2&gt;
&lt;P&gt;Uncovering shadow IT isn’t something you do once, and call finished. It’s an ongoing process built on several different kinds of discovery, each one filling in a piece of the puzzle. Microsoft leans on its Defender suite here, every product acts like a specialized sensor, watching its own slice of the environment and feeding results back to MSEM.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Seeing What Attackers See: MDEASM&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Microsoft Defender External Attack Surface Management (MDEASM) tries to map your organization from the outside in. It doesn’t need agents or installs, and it works by scanning the internet in a way that mimics how attackers do reconnaissance.&lt;/P&gt;
&lt;P&gt;The process usually starts with “discovery seeds”, things you already know you own, like domains or IP ranges. From there, MDEASM follows the digital breadcrumbs. It makes connections, finds related hosts, looks at SSL certificates, even flags forgotten web pages or email points of contact. The result is a living inventory of your external assets.&lt;/P&gt;
&lt;P&gt;Security teams may think they already know what’s online, but MDEASM often proves otherwise. It’s not uncommon for it to surface old staging sites, vendor-linked domains, or cloud services no one’s touched in years. These discoveries don’t just sit in a report; they flow back into MSEM, where they become part of the broader external attack surface initiative.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Finding the Stray Devices: MDE&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If MDEASM gives you the attacker’s view, Microsoft Defender for Endpoint (MDE) covers what’s hiding inside your walls. One of its quieter but powerful features is device discovery. Instead of requiring yet another appliance, MDE uses onboarded endpoints to probe for unmanaged devices, IoT gear, and network hardware.&lt;/P&gt;
&lt;P&gt;There are two main modes. &lt;EM&gt;Standard Discovery&lt;/EM&gt; is the one Microsoft pushes, it actively probes and enriches device data, giving a much fuller picture. &lt;EM&gt;Basic Discovery&lt;/EM&gt; just listens passively. The difference may seem subtle, but in practice Standard finds things that Basic would miss entirely.&lt;/P&gt;
&lt;P&gt;Once a stray device is found, MDE doesn’t just flag it. It can recommend onboarding, which folds that device into the protection ecosystem. That single step flips the device from being a blind spot into a contributor. Its telemetry then feeds into Cloud Apps discovery (MDA), which creates a feedback loop, one discovery leading to another.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Tracking Cloud App Sprawl: MDA&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Shadow IT often shows up first in cloud applications. Microsoft Defender for Cloud Apps (MDA) acts as the watchdog here. It’s a Cloud Access Security Broker (CASB) that tracks which apps are in use, what data flows through them, and whether they’re risky.&lt;/P&gt;
&lt;P&gt;Its biggest advantage comes from how it pairs with MDE. Even when a device leaves the corporate network, MDE keeps logging app traffic and passes it along to MDA. That way discovery isn’t limited to whatever passes through your firewall or proxy.&lt;/P&gt;
&lt;P&gt;MDA doesn’t stop at visibility. It runs risk assessments across 90-plus factors, looking at things like compliance, hosting region, and historical security issues. If an app looks too risky, admins can mark it “unsanctioned.” That decision ripples back into MDE, which then blocks connections to that app’s domains. The loop completes: visibility becomes governance, and governance becomes enforcement.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Discovering Hidden Identities: MDI&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Devices and apps aren’t the only problem. Service accounts and other non-human identities may be even more dangerous because they’re often privileged and rarely reviewed. Microsoft Defender for Identity (MDI) was built to surface these forgotten accounts.&lt;/P&gt;
&lt;P&gt;It automatically identifies things like group-managed service accounts, standalone managed accounts, or user accounts with suspicious attributes (say, a “password never expires” flag). These accounts show up in a dedicated inventory, alongside recent authentication activity and possible lateral movement paths.&lt;/P&gt;
&lt;P&gt;The point here isn’t just counting accounts. It’s understanding how a single compromised identity could ripple through your environment. MDI highlights attack paths based on identity, which are often overlooked compared to device vulnerabilities.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Watching the Cloud from the Inside: MDC&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As companies spread workloads across Azure, AWS, and Google Cloud, exposures multiply. Microsoft Defender for Cloud (MDC) takes on this space. It’s a Cloud-Native Application Protection Platform (CNAPP) that builds a broad inventory and flags misconfigurations across hybrid and multi-cloud environments.&lt;/P&gt;
&lt;P&gt;Two features stand out. &lt;EM&gt;Data Security Posture Management (DSPM)&lt;/EM&gt; scans for shadow data stores and sensitive information that might have been left exposed. &lt;EM&gt;Cloud Infrastructure Entitlement Management (CIEM)&lt;/EM&gt; digs into permissions, looking for over-privileged or unused access, not just for people but for service principals and managed identities.&lt;/P&gt;
&lt;P&gt;Put together, MDC closes a major gap. Where MDI focused on Active Directory identities, MDC extends that visibility to cloud-native identities and entitlements. It’s a more complete view of identity exposure across the stack.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;The following tables synthesize the discussion on these distributed discovery mechanisms and their critical integrations.&lt;/P&gt;
&lt;P&gt;Table 1: Shadow IT Discovery Matrix&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table class="lia-border-style-solid" border="1" style="width: 1053px; height: 370px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 39px;"&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Primary Shadow IT Discovered&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 39px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Mechanism&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;&lt;STRONG&gt;MDEASM&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Internet-facing assets: domains, hosts, IP blocks, SSL certs, etc.&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Agentless, recursive search starting from "discovery seeds."&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;&lt;STRONG&gt;MDE&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Unmanaged endpoints, network devices, and IoT devices on the corporate network.&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Passive (Basic) and active (Standard) probing from onboarded endpoints.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;&lt;STRONG&gt;MDA&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Cloud and SaaS applications and their associated data/user activity.&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Integration with MDE to collect network traffic, and ingestion of firewall/proxy logs.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 67px;"&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;&lt;STRONG&gt;MDI&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Overlooked non-human identities, such as Active Directory service accounts.&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 67px;"&gt;
&lt;P&gt;Auto-discovery based on account attributes (e.g., SPN, "password never expires").&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 63px;"&gt;&lt;td style="height: 63px;"&gt;
&lt;P&gt;&lt;STRONG&gt;MDC&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 63px;"&gt;
&lt;P&gt;Unmonitored cloud workloads and shadow data resources in multi-cloud and hybrid environments.&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 63px;"&gt;
&lt;P&gt;Asset inventory via Azure Resource Graph and Cloud Security Graph queries.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;The Power of Integration and Correlation in MSEM&lt;/H2&gt;
&lt;P&gt;The real strength of Microsoft’s approach isn’t just in the individual tools; it’s in how they’re wired together. On their own, MDEASM, MDE, MDA, MDI, and MDC are useful. Combined, and funneled into MSEM, they form something closer to a living model of your environment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Exposure Graph&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;At the heart of this setup is what Microsoft calls the exposure graph. Don’t think of it as a giant list of assets and vulnerabilities; it’s more like a map of relationships. A discovered IP address isn’t just “an IP address.” In the graph, it might connect to an unpatched server, which then ties to a service account with excessive privileges. Suddenly you’re not looking at isolated findings, you’re seeing a potential attack chain.&lt;/P&gt;
&lt;P&gt;This shift matters. Traditional vulnerability management tends to overwhelm teams with long lists of CVEs. MSEM, through the exposure graph, reframes that flood into something actionable: not just &lt;EM&gt;what’s&lt;/EM&gt; vulnerable, but &lt;EM&gt;how&lt;/EM&gt; an attacker could realistically use it.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;From Findings to Attack Paths&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;MSEM uses this graph to trace possible attack paths. Imagine an adversary stepping from an exposed web host to a misconfigured endpoint, then leveraging an over-privileged identity. Instead of just listing those three findings separately, MSEM shows you the chain and highlights the choke points.&lt;/P&gt;
&lt;P&gt;These choke points, assets that show up again and again in attack paths, deserve special attention. Fixing one of them can cut off multiple routes at once. On the flip side, MSEM also illustrates the “blast radius”: what happens if a critical asset falls. That picture of impact helps security teams prioritize realistically rather than trying to fix everything at once.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Linking Security to Business Value&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Another part of MSEM that often gets overlooked is how it classifies assets by business importance. Not every server is mission critical. By ranking assets from “low” to “very high,” MSEM ties technical findings to business risk and critical assets. This connection may feel obvious, but in practice, it’s the piece many vulnerability programs miss.&lt;/P&gt;
&lt;P&gt;So instead of just patching the loudest alerts, teams can focus on the paths that lead to their most valuable systems, the ones that keep the business running. That kind of context is what turns exposure management from a technical exercise into a business strategy.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Data Flows Behind the Scenes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To make this work, MSEM relies on steady data exchange between its sibling products:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;MDE → MDA:&lt;/STRONG&gt; Endpoint traffic reveals what apps are in use.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MDEASM → MSEM:&lt;/STRONG&gt; Internet-facing assets flow into the graph.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MDE → MSEM:&lt;/STRONG&gt; Device and vulnerability data enrich attack paths.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MDA → MSEM:&lt;/STRONG&gt; Cloud app risk scores add SaaS context.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MDI → MSEM:&lt;/STRONG&gt; Identity risks and lateral movement insights fill in the human (and non-human) dimension.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MDC → MSEM:&lt;/STRONG&gt; Cloud posture and entitlement data broaden the scope.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sentinel → MSEM:&lt;/STRONG&gt; Threat intel and analytics bring in the real-world adversary perspective.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These integrations may sound a little dry, but they’re what prevent the graph from becoming a static diagram. The data is continuous, the relationships keep updating, and the picture of exposure stays alive rather than getting stale after a single scan.&lt;/P&gt;
&lt;H2&gt;The Final Mile: Automation, Consolidation, and Enduring Security&lt;/H2&gt;
&lt;P&gt;Discovery and mapping are only half the story. None of it matters if teams can’t act on the insights quickly. This is where automation and consolidation step in, turning exposure management from a theoretical model into a living defense strategy.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Sentinel: Closing the Loop with Automation&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Microsoft Sentinel often gets described as just another SIEM, but that undersells its role. It’s a cloud-native SIEM and SOAR rolled into one, and it’s the natural endpoint for all the intelligence MSEM and the Defender suite generate.&lt;/P&gt;
&lt;P&gt;Sentinel ingests logs, alerts, and threat data from across Microsoft products and even third-party sources. Unlike Defender’s own hunting logs, which may only stretch back a few weeks, Sentinel can store data long term. That matters for forensic work and for spotting subtle patterns that only emerge over months.&lt;/P&gt;
&lt;P&gt;The real kicker is automation. Through “playbooks,” Sentinel can react the moment an alert fires. That might mean disabling a suspicious account, blocking a domain, or spinning up an investigation workflow. This may sound like standard SOAR, but paired with MSEM’s exposure-driven intelligence, it feels more surgical. The system isn’t just responding to noise, it’s targeting incidents that align with actual attack paths and business-critical risks.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Unified Portal Experience&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;For years, one of the biggest complaints about Microsoft security tools was fragmentation. Each product had its own console, its own quirks, and analysts wasted hours bouncing between tabs. The new unified Defender portal changes that dynamic.&lt;/P&gt;
&lt;P&gt;It brings together SIEM (Sentinel), XDR (the Defender suite), and exposure management (MSEM) into a single workspace. This isn’t just a cosmetic update. By aligning everything under a common schema, it cuts down on duplication, removes awkward hand-offs, and shortens the time it takes to resolve incidents.&lt;/P&gt;
&lt;P&gt;Put simply: analysts spend less time navigating tools and more time making decisions. The unified view also means the intelligence gathered across the digital estate doesn’t get siloed, it’s all immediately visible, in one place, without translation gaps.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why Consolidation Matters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Security teams are often under pressure to “do more with less.” In practice, that usually means juggling too many tools with too few people. Microsoft’s consolidation strategy doesn’t magically fix the staffing problem, but it does help. By shrinking the tool sprawl and normalizing data, the Defender portal reduces operational friction.&lt;/P&gt;
&lt;P&gt;That may sound like an incremental improvement, but in day-to-day work it can translate into faster investigations, fewer missed alerts, and a clearer sense of where risk actually lives. For teams already stretched thin, that kind of streamlining may be the difference between staying ahead of threats and constantly playing catch-up.&lt;/P&gt;
&lt;H2&gt;Conclusion: From Reactive Defense to Ongoing Resilience&lt;/H2&gt;
&lt;P&gt;Shadow IT isn’t a side problem anymore; it’s woven into how organizations operate. The days of treating exposure management as a quarterly checklist are, frankly, behind us. What Microsoft has built with MSEM and the Defender ecosystem may not be perfect, but it does show what a continuous approach looks like in practice.&lt;/P&gt;
&lt;P&gt;The process tends to play out in four layers:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Distributed Discovery&lt;/STRONG&gt;&lt;BR /&gt;Each Defender product acts like a sensor, unearthing its own class of blind spots, from forgotten internet-facing assets to unmanaged endpoints, risky SaaS apps, over-privileged service accounts, and cloud misconfigurations.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Centralized Correlation&lt;/STRONG&gt;&lt;BR /&gt;MSEM pulls all those findings into the Enterprise Exposure Graph. That model connects dots that would otherwise stay isolated, showing how a vulnerability isn’t just a bug on a server but potentially the first step in an attack path.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Actionable Intelligence&lt;/STRONG&gt;&lt;BR /&gt;Instead of drowning in alerts, teams get prioritized initiatives tied to business impact. The question shifts from “what can go wrong?” to “what matters most right now?”&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automated Response and Ongoing Management&lt;/STRONG&gt;&lt;BR /&gt;Sentinel takes over here, providing the long-term data lake and the playbooks that drive quick, automated reactions. This closes the loop and makes exposure management less of a one-off project and more of a continuous cycle.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;What’s striking is how this all comes together in the unified Defender portal. For once, the big promise of “single pane of glass” security actually feels closer to reality.&lt;/P&gt;
&lt;P&gt;Of course, no system is foolproof. MSEM can only act on the data it gets, and automation always carries a risk of overreach. But compared to the reactive, piecemeal approaches of the past, this kind of integrated, living model seems far more aligned with how real threats evolve.&lt;/P&gt;
&lt;P&gt;The bigger question is whether organizations will use it to their full potential. Having the tools in place doesn’t guarantee they’ll be configured, tuned, and acted upon effectively. That’s where people, process, and discipline still matter most.&lt;/P&gt;
&lt;P&gt;So, here’s something worth reflecting on: in your own environment, how many blind spots are you confident you’ve actually mapped? And how many are you just hoping attackers don’t stumble across first?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Call to Action&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;To truly unmask Shadow IT and build enduring resilience, organizations must adopt a continuous approach to threat exposure management.&lt;/P&gt;
&lt;P&gt;Take the first step towards ongoing resilience: Explore the &lt;A href="https://security.microsoft.com" target="_blank"&gt;&lt;STRONG&gt;Microsoft Defender portal&lt;/STRONG&gt;&lt;/A&gt; today to see MSEM in action and begin mapping your organization's unique attack surface.&lt;/P&gt;
&lt;P&gt;Start by connecting your existing Azure subscriptions, AWS accounts, GCP projects (by leveraging Microsoft Defender for Cloud), and third-party security tools to consolidate security data into a single, living model.&lt;/P&gt;
&lt;P&gt;Leverage &lt;STRONG&gt;MSEM's security initiatives and recommendations&lt;/STRONG&gt; to drive prioritized remediation and utilize &lt;STRONG&gt;Microsoft Sentinel for automation&lt;/STRONG&gt; to close the loop on identified threats, transforming exposure management from a technical exercise into a proactive business strategy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 12:54:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/shadow-it-isn-t-going-away-why-continuous-discovery-may-be-the/ba-p/4456242</guid>
      <dc:creator>giulioastori</dc:creator>
      <dc:date>2025-09-23T12:54:00Z</dc:date>
    </item>
    <item>
      <title>Refining Attack Paths: Prioritizing Real-World, Exploitable Threats</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/refining-attack-paths-prioritizing-real-world-exploitable/ba-p/4454051</link>
      <description>&lt;H2&gt;Introduction&lt;/H2&gt;
&lt;P&gt;Cybersecurity teams today face an overwhelming volume of potential threats, alerts, and hypothetical scenarios. The digital landscape is vast, dynamic, and ever-shifting, especially as organizations increasingly operate across complex cloud infrastructures. When every signal is treated with equal weight, security practitioners risk drowning in noise, losing sight of what truly matters: the most urgent, externally sourced threats poised to leave a meaningful impact.&lt;/P&gt;
&lt;P&gt;Our goal is simple: reducing risk. That’s why our focus stays on the core problem — not just listing misconfigurations but showing how attackers could actually exploit them. Over the past year, we’ve evolved our exposure management strategy so that security issues, from Defender (&lt;A href="https://learn.microsoft.com/en-us/defender" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/defender&lt;/A&gt;) are no longer viewed in isolation, but connected through attack paths to tell a complete story.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;It’s time to rethink how risk is defined and how defenses are prioritized, as this directly shapes the proactive security steps that follow.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;We’re excited to share important updates to our platform that bring more clarity and focus on how organizations understand, respond to, and mitigate real-world risks. This post will walk you through the key changes to attack paths, including enhancements for cloud environments, and explain what this means for security teams.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;What Is an attack path?&lt;/H2&gt;
&lt;P&gt;An attack path represents how an attacker could move through your environment — from an entry point, across misconfigurations or vulnerabilities, toward critical assets. It highlights exploitable sequences across your cloud and on-prem architecture, showing how risks connect.&lt;/P&gt;
&lt;P&gt;Historically, attack paths also included many potential or low-probability scenarios, which, while thorough, sometimes distracted teams from urgent threats.&lt;/P&gt;
&lt;H2&gt;Cloud Attack Paths: Enhanced Visibility and Precision&lt;/H2&gt;
&lt;P&gt;The most significant changes in this release center on cloud environments, where the attack surface is vast and interconnected. Here’s what cloud security teams can expect: attack paths now surface only the most urgent, exploitable, and externally initiated threats, dramatically reducing informational noise and boosting operational efficiency.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This change means that security teams can focus their efforts where it matters, defending the cloud assets most likely to be targeted and exploited in real attacks. The streamlined interface ensures that critical risks rise to the top, enabling rapid response and reducing the cognitive load on analysts.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;Under the Hood: How This New Model Exposes Real-World Cloud Risks&lt;/H2&gt;
&lt;P&gt;This change is more than attack path triage refinement. It's a structural shift in how cloud threats are discovered and prioritized. Behind the scenes, we’ve expanded our detection logic to analyze a broad spectrum of cloud resource exposures across storage accounts, containers, serverless environments, unprotected repositories, unmanaged APIs, and even AI agents. These components often fall outside traditional scanning scopes, where scanning tools typically focus on virtual machines, known CVEs and perimeter services, yet they represent high-value entry points for attackers. By anchoring attack paths to externally observable signals—like exposed endpoints, misconfigured access controls, or leaked credentials—we ensure that each surfaced path begins with a demonstrable, exploitable weakness that an attacker could realistically use as a foothold.&lt;/P&gt;
&lt;P&gt;To support the passive analysis of cloud configurations, that is, inspecting resource metadata and configuration settings without sending traffic to the asset, we’ve launched an active scanning mechanism to validate the actual reachability of identified exposures. While passive analysis helps map potential misconfigurations across resources, active scans confirm whether exposures are truly reachable from an external attacker’s perspective. This dual-layered approach reduces noise and false positives, ensuring that the attack paths we surface reflect real-world, actionable threats, not just theoretical risks.&lt;/P&gt;
&lt;H2&gt;On-Premises Attack Path Update: End Game Asset Termination&lt;/H2&gt;
&lt;P&gt;While our main update is cloud-centric, we’ve also introduced a significant configuration change for on-premises attack paths. Attack routes are now configured to terminate automatically upon reaching any of the following asset types:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Domain Admins&lt;/LI&gt;
&lt;LI&gt;Enterprise Admins&lt;/LI&gt;
&lt;LI&gt;Domain Controllers&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These assets are classified as “End Game”—if an adversary compromises any of them, they effectively gain full control over your domain. This automatic termination ensures consistency and clarity, helping defenders visualize high-impact scenarios and prioritize accordingly.&lt;/P&gt;
&lt;H2&gt;Why This Matters: Operational Impact&lt;/H2&gt;
&lt;P&gt;For security professionals, time and attention are precious resources. The difference between a theoretical risk and an actionable threat can mean the difference between prevention and breach. By sharpening the focus of attack paths, we empower defenders to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Respond more quickly to genuine risks.&lt;/LI&gt;
&lt;LI&gt;Allocate resources to the threats most likely to result in compromise.&lt;/LI&gt;
&lt;LI&gt;Reduce fatigue and cognitive overload.&lt;/LI&gt;
&lt;LI&gt;&lt;S&gt; &lt;/S&gt;Build a clear, reliable process for detecting and responding to threats.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;This evolution isn’t just about filtering noise—it’s about enabling security teams to make strategic decisions with confidence, clarity, and speed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;Looking Ahead: Future Research and Exploratory Experiences&lt;/H2&gt;
&lt;P&gt;While this update narrows focus to urgent threats, we recognize the value of long-term planning. In future releases, we’ll introduce exploratory tools that allow teams to simulate scenarios like:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;What happens if this user is compromised?&lt;/LI&gt;
&lt;LI&gt;Which assets would be at risk if this service is breached?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These tools will support strategic planning while keeping the main interface focused on real-time risk.&lt;/P&gt;
&lt;H2&gt;Stay Focused, Stay Secure&lt;/H2&gt;
&lt;P&gt;The attack path experience has always been about empowering defenders with the context and clarity needed to protect what matters most. With this update—especially the sharpened focus on cloud attack paths—we’re taking a step forward in helping organizations cut through the noise, visualize real risk, and act with purpose.&lt;/P&gt;
&lt;P&gt;Security teams can now stay focused on the most urgent, externally sourced threats—without losing sight of the broader strategic picture. As we move forward, research and community input will be vital in shaping the next generation of attack path intelligence, ensuring our solutions remain both actionable and adaptable.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;Stay tuned for more updates, and as always, stay focused—stay secure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;To learn more: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/security-exposure-management/whats-new#refined-attack-path-experience" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/security-exposure-management/whats-new#refined-attack-path-experience&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 19:37:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/refining-attack-paths-prioritizing-real-world-exploitable/ba-p/4454051</guid>
      <dc:creator>Yulia_Zhurbinsky</dc:creator>
      <dc:date>2025-09-15T19:37:55Z</dc:date>
    </item>
    <item>
      <title>Proactive Security with Continuous Threat Exposure Management (CTEM)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/proactive-security-with-continuous-threat-exposure-management/ba-p/4452149</link>
      <description>&lt;P&gt;After spending hours wrestling with security incidents that could have been prevented, you may come to realize something that might seem obvious but took all this time to truly understand; playing defense isn't enough anymore. The whole "wait and see" approach to cybersecurity feels a bit like waiting for your house to catch fire before installing smoke detectors.&lt;/P&gt;
&lt;P&gt;Today a reactive security posture is no longer sufficient. Organizations need a proactive approach to identify, assess, and mitigate risks before attackers can exploit them across all workloads.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This is where the Continuous Threat Exposure Management (CTEM) framework comes into play, offering a structured, cyclical approach to reducing risk across your attack surface. Security Exposure Management (SEM) is a powerful solution designed to operationalize each phase of the CTEM framework, providing a unified view of your security posture and empowering security teams to make informed, swift decisions.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;What is Continuous Threat Exposure Management (CTEM)?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Gartner introduced the coined term CTEM in 2022, and it is a strategic security framework that emphasizes continuous and adaptive risk reduction. It's a cyclical process, not a one-time assessment, ensuring that an organization's security posture evolves with its digital footprint and the threat landscape. The framework is typically broken down into five core stages:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Scoping&lt;/STRONG&gt;: Defining the critical assets and systems that require the most protection.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Discovery&lt;/STRONG&gt;: Identifying all potential attack surfaces, vulnerabilities, and misconfigurations within the defined scope.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prioritization&lt;/STRONG&gt;: Ranking identified risks based on their potential impact and exploitability, focusing resources on the most critical exposures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Validation&lt;/STRONG&gt;: Testing the identified attack paths and the effectiveness of existing security controls.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mobilization&lt;/STRONG&gt;: Orchestrating and implementing remediation actions, then continuously monitoring for new exposures.&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;By adopting CTEM, organizations can shift from merely identifying vulnerabilities to understanding the true risk they pose to business-critical assets and taking targeted action.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;SEM: Your CTEM Command Center&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Security Exposure Management (SEM) is a comprehensive security solution that provides a unified view of your security posture across company assets and workloads. SEM is explicitly designed to help organizations build and enhance a CTEM program. It continuously discovers assets and workloads, enriching asset information with crucial security context to help proactively manage attack surfaces, protect critical assets, and explore and mitigate exposure risk.&lt;/P&gt;
&lt;P&gt;SEM caters to a wide range of security professionals, from Security and Compliance Admins (including those responsible for overall Security Risk), and Security Operations (SecOps) teams needing visibility across organizational silos, to Security Architects solving systemic issues, and Chief Information Security Officers (CISOs) requiring insights into organizational attack surfaces and exposure to understand security risk within broader frameworks.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Now, let's explore how SEM operationalizes each stage of the CTEM framework.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;CTEM Stage 1: Scoping – Defining Your Crown Jewels&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The first stage of CTEM, Scoping, involves identifying and defining the business-critical assets that, if compromised, would have the most significant impact on your organization. This is about understanding your "crown jewels" and where to focus your most rigorous security efforts.&lt;/P&gt;
&lt;P&gt;SEM streamlines this vital process through its robust Critical Asset Management capabilities. It enables security teams to prioritize investigations, posture recommendations, and remediation steps directly on these high-value assets.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Operationalizing Scoping with SEM&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Predefined Classifications: SEM offers an out-of-the-box catalog of predefined critical asset classifications for devices, identities, and cloud resources. These include:
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Critical Cyber-security Assets: Such as file servers, domain controllers, ADCS, and ADFS servers.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Databases with Sensitive Data: Identifying data stores holding sensitive information like secrets, confidential documents, or personally identifiable information.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Identity Groups and User Roles: Including Power Users, Privileged Role Administrators, Application Administrators, Authentication Administrators, Global Administrators, and various Microsoft Entra ID roles (e.g., Domain Name Administrator, Permissions Management Administrator, Exchange Administrator). Notably, recent updates in 2025 introduced predefined rules for senior executives across Technology, Finance, Operations, Marketing, Information, Execution, and Human Resources, classifying these identities as "Very High" criticality.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Cloud Resources: Such as Confidential Azure Virtual Machines, Azure Key Vaults with many connected identities or high operation volumes, premium tier Azure Kubernetes Service clusters, and Azure Arc Kubernetes clusters with multiple nodes.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Security Operations Assets: Predefined classifications also include "Security Operations Admin Device" and "Security Operations Admin User," recognizing their vital role in security administration and high-risk profile.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Custom Classifications: Beyond the predefined catalog, organizations can create custom critical assets to align with their unique risk profiles and pinpoint their specific "crown jewels". This is done using a query builder, allowing definitions based on specific criteria, such as devices with a certain naming convention. Assets can also be manually added to classifications, and criticality levels can be modified to reflect organizational context.&lt;/LI&gt;
&lt;LI&gt;Asset Criticality Levels: Assets are categorized into four levels of criticality – Very High, High, Medium, and Low – to guide prioritization efforts. A "Very High" asset is essential for business survival, while "Low" has minimal impact if compromised. This criticality information is then integrated into other Defender portal experiences like Advanced Hunting, the device inventory, and attack paths, with visual indicators like a halo color and crown icon on the Attack Surface Map for highly critical assets.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By leveraging SEM's comprehensive critical asset management, organizations can effectively scope their CTEM program, ensuring that security efforts are concentrated on the assets that matter most.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;CTEM Stage 2: Discovery – Uncovering Your Digital Footprint&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Once critical assets are scoped, the next CTEM stage, Discovery, focuses on continuously identifying and enumerating all assets, vulnerabilities, and potential attack vectors across the entire digital estate. This provides a holistic understanding of an organization's attack surface.&lt;/P&gt;
&lt;P&gt;SEM excels in this phase by providing a unified view across the organization, continuously discovering assets and workloads, and gathering discovered data into a comprehensive exposure graph.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Operationalizing Discovery with SEM:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;The Enterprise Exposure Graph: This is SEM's central tool for exploring and managing attack surfaces. It aggregates information about devices, identities, machines, storage, users, and workloads from across the enterprise, offering a unified, comprehensive view of the organizational security posture. The graph relies on two core tables in Advanced Hunting:
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; ExposureGraphNodes: Contains organizational entities and their properties (e.g., devices, identities, user groups, cloud assets like VMs, storage, containers).&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; ExposureGraphEdges: Provides visibility into relationships between entities and assets, crucial for understanding how threats can move across the environment. These tables extend existing Defender XDR advanced hunting schemas.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Comprehensive Data Ingestion: To ensure a complete picture, SEM consolidates security posture data from various sources:&lt;/LI&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Microsoft Services: Data from Microsoft Defender for Endpoint, Identity, Cloud Apps, Office, IoT, Secure Score, Vulnerability Management, Cloud, Entra ID, and External Attack Surface Management (EASM) are automatically ingested and consolidated.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; External Data Connectors: SEM supports integrating with a variety of external security solutions and data sources, including ServiceNow CMDB, Qualys VM, Rapid7 VM, and Tenable. These connectors normalize data within the exposure graph, enhancing device inventory, mapping relationships, and revealing new attack paths for comprehensive attack surface visibility. This capability is currently in public preview but will incur consumption-based costs upon general availability.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Visibility of Discovery Sources: The Device Inventory and Attack Surface Map now display the specific tools or products (both Microsoft and external connectors) that reported each asset, allowing users to filter devices by their reporting sources.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Attack Surface Map: This visual tool helps you explore and visualize the exposure data queried through the enterprise exposure graph schema. It allows you to check asset connections, identify unwanted links, and see whether a device has a path to the internet and what other devices might be exposed. Visual indicators like high criticality crowns or vulnerability bugs provide quick insights.&lt;/LI&gt;
&lt;LI&gt;Hybrid Attack Paths: A significant enhancement in November 2024, SEM now supports the discovery and visualization of hybrid attack paths that originate from on-premises environments and traverse into cloud infrastructures. This capability bridges a critical gap, equipping security teams to identify cross-environment attack vectors and understand how on-prem vulnerabilities could target cloud assets.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By continuously gathering and unifying data from diverse sources into the exposure graph and visualizing it through tools like the Attack Surface Map, SEM ensures that organizations have an unparalleled understanding of their complex digital footprint, a cornerstone of effective CTEM.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;CTEM Stage 3: Prioritization – Focusing on What Matters Most&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The third stage of CTEM, Prioritization, is crucial for making security efforts impactful. It involves ranking identified exposures based on their potential business impact, likelihood of exploitation, and the criticality of affected assets. This ensures that security teams focus their limited resources on the risks that pose the greatest threat to the organization.&lt;/P&gt;
&lt;P&gt;SEM provides powerful tools and insights to manage security exposure and mitigate risk effectively. It offers a contextual, risk-based approach to identify and prioritize critical assets in real time.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Operationalizing Prioritization with SEM:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Exposure Insights: SEM continuously aggregates security posture data and insights across workloads and resources into a single pipeline, providing rich context around the security posture state of your asset inventory. These insights, which include security events, recommendations, metrics, and security initiatives, enable CISOs, decision-makers, and security teams to understand and manage exposure risk and prioritize efforts.&lt;/LI&gt;
&lt;LI&gt;Security Initiatives: SEM organizes security posture data into security initiatives, which are manageable projects for assessing and tracking exposure risk for specific security areas or workloads. These include:
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Workload Initiatives: Such as Endpoint Security, Identity Security, and Cloud Security.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Horizontal Threat Initiatives: Covering areas like Ransomware Protection and Business Email Compromise - Financial Fraud.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Threat Analytics Initiatives: Based on up-to-date research from Microsoft security researchers, focusing on specific threat actors and attack vectors.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Specialized Initiatives: Including Critical Asset Protection, Enterprise IoT Security, OT Security, SaaS Security, External Attack Surface Management, and Zero Trust (Foundational). Each initiative provides an "all-up score" for quick measurement of security posture, along with a target score indicator.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Security Metrics: Within initiatives, metrics measure exposure risk for different areas, gathering one or more recommendations for similar assets. Metrics show progress from 0% (high exposure) to 100% (no exposure) with a progress bar. They are assigned a weight (High, Medium, Low, or Risk Accepted), which reflects their importance and impact on the initiative score. Users can customize these weights based on business priorities.&lt;/LI&gt;
&lt;LI&gt;Attack Paths and Choke Points: SEM generates attack paths based on collected data, simulating attack scenarios to identify weaknesses. A key aspect of prioritization is identifying choke points, critical assets where multiple attack paths intersect. By focusing remediation efforts on these choke points, security teams can efficiently reduce risk across numerous attack paths. SEM provides an attack path dashboard and a dedicated widget on the overview page to highlight these. Furthermore, DACL-based path analysis provides a more accurate representation of attack paths by incorporating group-based permissions, allowing defenders to make more informed decisions regarding permission structures.&lt;/LI&gt;
&lt;LI&gt;Security Recommendations: SEM consolidates security recommendations from various sources, including Microsoft Defender for Cloud, Microsoft Secure Score, and Microsoft Threat Analytics, into a single catalog. These recommendations are categorized by compliance status and offer actionable steps for remediation, directly influencing initiative and metric scores. Recommendations for critical assets can be prioritized directly from the Security recommendations page.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Through these interconnected features, SEM enables organizations to move beyond a laundry list of vulnerabilities, providing the context and tools necessary to strategically prioritize the most impactful risks to their critical assets.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;CTEM Stage 4: Validation – Testing Your Defenses&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Validation stage of CTEM is where organizations test their security controls and confirm the viability and potential impact of identified attack paths. This hands-on phase ensures that theoretical risks are understood in a practical context and that remediation actions are genuinely effective.&lt;/P&gt;
&lt;P&gt;SEM provides sophisticated tools to visualize, explore, and query potential attack vectors, allowing security teams to validate their understanding of the attack surface and the effectiveness of their defenses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Operationalizing Validation with SEM:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Attack Path Visualization and Exploration: SEM's attack path graph view uses enterprise exposure graph data to visualize how potential threats might unfold, showing the end-to-end routes attackers could take to reach critical assets. Hovering over nodes and connectors provides additional details, illustrating complex relationships from, for example, a virtual machine with TLS/SSL keys to permissions on storage accounts. The Attack Surface Map extends this visualization, allowing security teams to see multiple attack paths and choke points, helping to contextualize risks within the broader network framework.&lt;/LI&gt;
&lt;LI&gt;Blast Radius Analysis: SEM offers a blast radius feature that allows users to visually explore the highest-risk paths originating from a choke point. This detailed visualization reveals how the compromise of one asset could cascade and affect others, enabling security teams to assess the broader implications of an attack and prioritize mitigation strategies more effectively. This is crucial for understanding the true scope of a potential breach.&lt;/LI&gt;
&lt;LI&gt;Querying the Enterprise Exposure Graph with KQL: For deeper investigation and validation, SEM integrates with Advanced Hunting in the Microsoft Defender portal, allowing users to proactively hunt for enterprise exposure threats using Kusto Query Language (KQL). The make-graph and graph-match operators are fundamental for building graph structures from tabular data and searching for specific patterns in the exposure graph. This enables security teams to validate assumptions and test hypothetical attack scenarios, for example:
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Discovering Vulnerable VMs: Queries can identify virtual machines exposed to the internet with a Remote Code Execution (RCE) vulnerability.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Identifying Privileged Escalation Paths: Teams can pinpoint internet-facing devices vulnerable to privilege escalation.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Uncovering Risky User Access: Queries can reveal users logged into multiple critical devices, highlighting potential lateral movement paths.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp; &amp;nbsp; Mapping Specific Attack Paths: KQL can display paths from a specific IP node through multiple assets to a virtual machine node label, validating network reachability and potential attack chains.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Simulated Attack Scenarios: SEM automatically generates attack paths by simulating attack scenarios based on collected data, identifying vulnerabilities and weaknesses an attacker could exploit. The dynamic nature of SEM means these attack paths are continuously updated to reflect real-time environmental changes, such as asset additions/removals, configuration updates, or user activity.&lt;/LI&gt;
&lt;LI&gt;Metric and Initiative History: The history tab within initiatives allows users to track score changes over time, including the reasons for those changes and the percentage effect of individual metrics. More granularly, by selecting a specific metric, users can see a list of assets where exposure has been added or removed, providing clear insight into exposure shifts and helping validate the impact of changes.&lt;/LI&gt;
&lt;LI&gt;Content Versioning Notifications: SEM provides proactive notifications about upcoming version updates for metrics, offering advanced visibility into expected changes and their impact on related initiatives. This allows teams to prepare for and understand potential shifts in their measured exposure.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By providing these extensive validation capabilities, SEM moves organizations beyond theoretical risk assessments, offering the tools to practically test and confirm the efficacy of their security posture against evolving threats.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;CTEM Stage 5: Mobilization – Taking Decisive Action&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The final stage of CTEM, Mobilization, focuses on orchestrating and implementing remediation actions based on the validated risks, and then continuously monitoring the environment for new exposures. This is where insights are translated into concrete security improvements.&lt;/P&gt;
&lt;P&gt;SEM not only identifies risks but also provides the actionable intelligence and platform integration needed to efficiently remediate them, supporting a unified and adaptive security posture.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Operationalizing Mobilization with SEM:&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;Actionable Recommendations: SEM provides actionable recommendations to mitigate identified attack paths and security issues. These recommendations are gathered from various sources and offer remediation steps. Users can directly manage and remediate these recommendations within the originating workload (e.g., Microsoft Defender for Cloud, Microsoft Defender Vulnerability Management) from within SEM's interface.&lt;/LI&gt;
&lt;LI&gt;Choke Point Mitigation: A highly effective mobilization strategy involves focusing remediation efforts on choke points, critical assets where multiple attack paths converge. By securing these high-impact assets, security teams can efficiently reduce risk across numerous potential attack vectors simultaneously. SEM provides visibility into these choke points, enabling strategic mitigation.&lt;/LI&gt;
&lt;LI&gt;Unified Security Operations: SEM is a core component of unified security operations within the Microsoft Defender portal. This portal brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, SEM, and generative AI, fostering a cohesive security ecosystem. This unification simplifies the management of security data across different platforms and solutions. Access control to SEM can be managed using Microsoft Defender XDR Unified Role-Based Access Control (RBAC), allowing for dedicated and granular permissions, adhering to the principle of least privilege.&lt;/LI&gt;
&lt;LI&gt;Event Notifications: SEM helps organizations stay informed of critical changes through security events. These events notify users when there's a significant drop (e.g., 2% or more) in an all-up initiative score or a specific metric score, indicating an increase in exposure risk. A new event type was also added in August 2024 to notify users when a new initiative is added to SEM. These alerts prompt security teams to investigate and respond promptly.&lt;/LI&gt;
&lt;LI&gt;Tracking Progress and Adaptation: SEM allows organizations to track their security posture improvements over time. As metrics improve through implemented recommendations, the associated initiative scores rise to reflect a better security posture. The History tab within initiatives provides a detailed timeline of significant score changes, including the reasons behind them (e.g., property changes, value changes, metric removal/deprecation), offering valuable feedback on the effectiveness of mobilization efforts.&lt;/LI&gt;
&lt;LI&gt;Enhanced Visibility for Scoped Users: SEM provides enhanced support for device group scoping, ensuring that users with restricted access to certain devices only see relevant data. This means initiative scores, metric progress, security events, and historical insights are calculated and displayed according to their specific user scope. This granular control helps focused teams mobilize effectively without being overwhelmed by irrelevant data.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By integrating remediation directly into workflows, providing clear progress tracking, and enabling adaptive responses to real-time changes, SEM ensures that the CTEM framework doesn't just identify problems but drives continuous, measurable improvements in an organization's security posture.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;The Continuous Threat Exposure Management (CTEM) framework is an essential strategy for organizations aiming to build resilience against an ever-evolving threat landscape. It demands a proactive, cyclical, and integrated approach to security. Security Exposure Management (SEM) is purpose-built to operationalize each of these five critical stages—Scoping, Discovery, Prioritization, Validation, and Mobilization, providing a unified, intelligent, and actionable platform.&lt;/P&gt;
&lt;P&gt;From meticulously defining critical assets, to comprehensively discovering your attack surface, intelligently prioritizing risks, rigorously validating defenses, and efficiently mobilizing remediation efforts, SEM empowers security teams to stay ahead of attackers. By leveraging SEM, organizations can transform their security posture from reactive to proactive, continuously identifying, prioritizing, and mitigating risks across their entire digital estate to reduce exposure before attackers can exploit it.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 15:29:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/proactive-security-with-continuous-threat-exposure-management/ba-p/4452149</guid>
      <dc:creator>giulioastori</dc:creator>
      <dc:date>2025-09-10T15:29:07Z</dc:date>
    </item>
    <item>
      <title>Microsoft Security Exposure Management Ninja Training</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/microsoft-security-exposure-management-ninja-training/ba-p/4444285</link>
      <description>&lt;P&gt;This blog post has a curation of many Microsoft security exposure management (MSEM) resources, organized in a format that can help you to go from absolutely no knowledge in MSEM, to designing and implementing different scenarios. You can use this blog post as a training roadmap to ramp up your knowledge in MSEM.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft Security Exposure Management empowers customers to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Build an effective exposure management program with a continuous threat exposure management (&lt;A href="https://www.gartner.com/en/articles/how-to-manage-cybersecurity-threats-not-episodes" target="_blank" rel="noopener"&gt;CTEM&lt;/A&gt;) process.&lt;/LI&gt;
&lt;LI&gt;Reduce risk with a clear view of every asset and real-time assessment of potential exposures both inside-out and outside-in.&lt;/LI&gt;
&lt;LI&gt;Identify and classify critical assets, ensuring they are protected against a wide variety of threats.&lt;/LI&gt;
&lt;LI&gt;Discover and visualize potential adversary intrusion paths, including lateral movement, to proactively identify and stop attacker activity.&lt;/LI&gt;
&lt;LI&gt;Communicate exposure risk to business leaders and stakeholders with clear KPIs and actionable insights.&lt;/LI&gt;
&lt;LI&gt;Enhance exposure analysis and remediation by integrating with third-party data sources and tools&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-embeded-content" contenteditable="false"&gt;&lt;IFRAME src="https://www.youtube.com/embed/zY13PZ3GpIY?si=qLmeiLrwiQioEfLk" width="560" height="315" title="YouTube video player" allowfullscreen="allowfullscreen" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" frameborder="0" sandbox="allow-scripts allow-same-origin allow-forms"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Modules&lt;/STRONG&gt;&lt;BR /&gt;To become a Microsoft security exposure management Ninja, you will need to complete each module. The content of each module will vary, refer to the legend to understand the type of content before clicking in the topic’s hyperlink. The table below summarizes the content of each module:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="width: 93.9815%; height: 622.011px; border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr style="height: 44.8722px;"&gt;&lt;td style="height: 44.8722px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Module&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 44.8722px;"&gt;
&lt;P&gt;&lt;STRONG&gt;Description&lt;/STRONG&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 74.5327px;"&gt;&lt;td style="height: 74.5327px;"&gt;
&lt;P&gt;1 – Introducing Microsoft Security Exposure management&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 74.5327px;"&gt;
&lt;P&gt;In this module you will familiarize yourself with MSEM and understand the use case scenarios.&amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 69.1548px;"&gt;&lt;td style="height: 69.1548px;"&gt;
&lt;P&gt;2 – Planning MSEM Adoption&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 69.1548px;"&gt;
&lt;P&gt;In this module you will learn the main considerations to correctly plan MSEM adoption. From supported platforms to best practices operationalization.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 85.1705px;"&gt;&lt;td style="height: 85.1705px;"&gt;
&lt;P&gt;3 – Attack Surface management Capabilities in Microsoft Security Exposure management&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 85.1705px;"&gt;In this module you will learn how to use the attack surface management capabilities available in MSEM, which includes attack paths, attack surface map.&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 121.179px;"&gt;&lt;td style="height: 121.179px;"&gt;
&lt;P&gt;4 – Exposure Insights&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 121.179px;"&gt;
&lt;P&gt;In this module you will learn about the Initiatives, metrics, recommendations, events in Microsoft Security Exposure management and give you insights on how they can help you with your posture journey. In this module you will also familiarize yourself with recommendations and events.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 114.886px;"&gt;&lt;td style="height: 114.886px;"&gt;
&lt;P&gt;5 – First and Third-party integrations &amp;nbsp;&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 114.886px;"&gt;
&lt;P&gt;In this module you will learn how the variety of tools could help us to extend our exposure management capabilities in Microsoft Security Exposure management, which includes MDC, MDI, MDE, MDVM, EASM and more. &amp;nbsp;This module also covers how these integrations work in MSEM, the different categories of capabilities, and how to get the most benefit.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr style="height: 112.216px;"&gt;&lt;td style="height: 112.216px;"&gt;
&lt;P&gt;5 – Regulatory Compliance Capabilities in Microsoft Defender for Cloud&lt;/P&gt;
&lt;/td&gt;&lt;td style="height: 112.216px;"&gt;
&lt;P&gt;In this module you will learn about the regulatory compliance dashboard in Microsoft Defender for Cloud and give you insights on how to include additional standards. In this module you will also familiarize yourself with Azure Blueprints for regulatory standards.&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Module 1 - Introducing MSEM&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/introducing-microsoft-security-exposure-management/ba-p/4080907" target="_blank" rel="noopener"&gt;Introducing Microsoft Security Exposure Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=cK8wSA6apk0&amp;amp;t=136s&amp;amp;pp=ygUnTWljcm9zb2Z0IHNlY3VyaXR5IGV4cG9zdXJlIG1hbmFnZW1lbnQg" target="_blank" rel="noopener"&gt;Getting Started with Microsoft security exposure management &lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://youtu.be/RU3V0SZVMhQ" target="_blank" rel="noopener"&gt;Stay ahead of threats with proactive security - part 1&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=72dvWC3hGbk" target="_blank" rel="noopener"&gt;Stay ahead of threats with proactive security - part 2&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/microsoft-security-exposure-management" target="_blank" rel="noopener"&gt;What is Microsoft Security Exposure Management? &lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/bade/documents/products-and-services/en-us/security/MSEM-cyber-risks-ebook-MSEM-eBook-Final.pdf" target="_blank" rel="noopener"&gt;Navigating cyber risks with MSEM (AKA MSEM eBook)&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Module 2 - &lt;/STRONG&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Planning Your MSEM Adoption&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/integration-licensing#whats-integrated-into-security-exposure-management" target="_blank" rel="noopener"&gt;Integration and licensing for Microsoft Security Exposure Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/compare-secure-score-security-exposure-management" target="_blank" rel="noopener"&gt;Compare Microsoft Security Exposure Management with secure score&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/prerequisites" target="_blank" rel="noopener"&gt;Microsoft Security Exposure Management - Prerequisites&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.youtube.com/live/ByjEaiLzw8c?si=StVU8g0kLjkszXax" target="_blank" rel="noopener"&gt;Proactive Protection with Microsoft Security Exposure Management: Part 1&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://www.youtube.com/live/WEZaFz_e_4s?si=aCPWjwzYz-PdcXbC" target="_blank" rel="noopener"&gt;Proactive Protection with Microsoft Security Exposure Management: Part 2&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/live/vY_VmZ9LLgg?si=iJXGozwT8U8pjpA8" target="_blank" rel="noopener"&gt;Transform your Defense with MSEM&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://youtu.be/q0ImL9nw-Jw?si=ZcGQyWkYY9yo7fIY" target="_blank" rel="noopener"&gt;Proactive security with continuous exposure management&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Module 3 - Attack Surface Management Capabilities in MSEM&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/critical-asset-protection-with-microsoft-security-exposure-management/4122645" target="_blank" rel="noopener"&gt;Critical Asset Protection with Microsoft Security Exposure Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/microsoft-security-exposure-management-graph-unveiling-the-power/4148546" target="_blank" rel="noopener"&gt;Microsoft Security Exposure Management graph: unveiling the power&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.youtube.com/watch?v=cK8wSA6apk0&amp;amp;t=307s" target="_blank" rel="noopener"&gt;Visual mapping of potential attack paths&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/microsoft-security-exposure-management-graph-prioritization-is-the-king/4160316" target="_blank" rel="noopener"&gt;Microsoft Security Exposure Management Graph: Prioritization is the king&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/attack-path-management-with-microsoft-security-exposure-management/4296575" target="_blank" rel="noopener"&gt;Attack path management with Microsoft Security Exposure Management&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Module 4 - Exposure Insights&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/unlock-proactive-defense-microsoft-security-exposure-management-now-generally-av/4303219" target="_blank" rel="noopener"&gt;Unlock Proactive Defense: Microsoft Security Exposure Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/respond-to-trending-threats-and-adopt-zero-trust-with-exposure-management/4130133" target="_blank" rel="noopener"&gt;Respond to trending threats and adopt zero-trust with Exposure Management&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Module 5 - Configure your data connectors&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/configure-data-connectors" target="_blank" rel="noopener"&gt;Configure your data connectors&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/value-data-connectors" target="_blank" rel="noopener"&gt;Getting value from your data connectors&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/servicenow-data-connector" target="_blank" rel="noopener"&gt;ServiceNow&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/qualys-data-connector" target="_blank" rel="noopener"&gt;Qualys&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/rapid7-data-connector" target="_blank" rel="noopener"&gt;Rapid7&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/security-exposure-management/tenable-data-connector" target="_blank" rel="noopener"&gt;Tenable &lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Need more help? Customers with&amp;nbsp;&lt;A href="https://go.microsoft.com/fwlink/?linkid=2267193" aria-label="Link eligible licenses" target="_blank"&gt;eligible licenses&lt;/A&gt; can request Microsoft 365 deployment assistance from FastTrack. &lt;A href="https://go.microsoft.com/fwlink/?linkid=2317800" aria-label="Link Learn more" target="_blank"&gt;Learn more&lt;/A&gt;, &lt;A href="https://go.microsoft.com/fwlink/?linkid=2335607" aria-label="Link submit request for assistance" target="_blank"&gt;submit request for assistance&lt;/A&gt;, or contact your designated FastTrack Architect.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2025 18:16:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-security-exposure/microsoft-security-exposure-management-ninja-training/ba-p/4444285</guid>
      <dc:creator>YuriDiogenes</dc:creator>
      <dc:date>2025-10-16T18:16:12Z</dc:date>
    </item>
  </channel>
</rss>

