best practices
6 TopicsBecome a Microsoft Defender External Attack Surface Management Ninja: Level 400 training
Learn to become a Microsoft Defender External Attack Surface (Defender EASM) Ninja! This blog will walk you through the resources you'll need to master and derive maximum value from Microsoft's Defender EASM product.Defender EASM - Performing a Successful Proof of Concept (PoC)
To effectively determine the benefits of adopting Defender EASM, you should perform a Proof of Concept (PoC). Before enabling Defender EASM, you and your team should go through a planning process to determine success criteria, as well as execute a series of tasks that must be accomplished in the PoC.Identify Digital Assets Vulnerable to Subdomain Takeover
Subdomain takeover vulnerabilities are, in most cases, the result of an organization using an external service and letting it expire. Microsoft Defender External Attack Surface Management continuously maps the external-facing resources across your organization's attack surface to identify, classify, and prioritize risks, including subdomain expiration and takeover.Optimize insights and efficiency with latest Defender EASM features and generative AI integrations
Read the blog to learn about Microsoft Defender External Attack Surface Management (EASM)'s latest updates that increase efficiency and speed to operationalize. Plus, learn about our newest generative AI integrations.