best practices
6 TopicsBecome a Microsoft Defender External Attack Surface Management Ninja: Level 400 training
Learn to become a Microsoft Defender External Attack Surface (Defender EASM) Ninja! This blog will walk you through the resources you'll need to master and derive maximum value from Microsoft's Defender EASM product.Defender EASM - Performing a Successful Proof of Concept (PoC)
To effectively determine the benefits of adopting Defender EASM, you should perform a Proof of Concept (PoC). Before enabling Defender EASM, you and your team should go through a planning process to determine success criteria, as well as execute a series of tasks that must be accomplished in the PoC.Optimize insights and efficiency with latest Defender EASM features and generative AI integrations
Read the blog to learn about Microsoft Defender External Attack Surface Management (EASM)'s latest updates that increase efficiency and speed to operationalize. Plus, learn about our newest generative AI integrations.One Microsoft: Enriching MDEASM assets with Threat Intelligence Feeds
There is so much data in todays cyber security world that it can become difficult to understand which feeds to prioritize. The Microsoft Defender External Attack Surface can help by showing you what vulnerabilities or exposures are being broadcast to the outside world but getting further context to what is being targeted can only help make informed decisions. This blog will explain the integration with Microsoft Defender Threat Intelligence to give additional insights.Identify Digital Assets Vulnerable to Subdomain Takeover
Subdomain takeover vulnerabilities are, in most cases, the result of an organization using an external service and letting it expire. Microsoft Defender External Attack Surface Management continuously maps the external-facing resources across your organization's attack surface to identify, classify, and prioritize risks, including subdomain expiration and takeover.