Forum Discussion
crystalashcraft
Microsoft
Apr 28, 2023New blog post | Part 2: Uncovering Trackers Using the Defender EASM API
Thanks for joining me for the second installment on leveraging Trackers in Microsoft Defender External Attack Surface Management (Defender EASM) to find and manage risk in your organization. This blog post is part two of this series, building on the concepts introduced in part one about discovering your attack surface and applying this valuable inventory data to inform your security efforts at scale. As a quick refresher, in part one, we defined Trackers in Defender EASM and learned how to search for them in the User Interface (UI). This blog post will closely examine the Defender EASM Application Program Interface (API).
Part 2: Uncovering Trackers Using the Defender EASM API - Microsoft Community Hub
No RepliesBe the first to reply