Recent Blog ArticlesMost RecentMost LikesDefender EASM - Performing a Successful Proof of Concept (PoC) To effectively determine the benefits of adopting Defender EASM, you should perform a Proof of Concept (PoC). Before enabling Defender EASM, you and your team should go through a planning process to ...Part 1: Uncovering Trackers Using the Defender EASM UI Microsoft Defender External Attack Surface Management (Defender EASM) discovers your externally facing digital assets One asset detail is Trackers.This blog post will show you how to view Tra...Part 2: Uncovering Trackers Using the Defender EASM API In part two of this blog series, we learn how to query theMicrosoft Defender External Attack Surface Management API for Trackers.