Home Microsoft Azure Defender EASM Overview | Microsoft Learn

Defender EASM Overview | Microsoft Learn

by admin

Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to give you an external view of your online infrastructure.

Defender EASM gives your security and IT teams essential visibility to help them identify unknowns, prioritize risk, eliminate threats, and extend control of vulnerabilities and exposure beyond the firewall. Attack surface insights are generated by using vulnerability and infrastructure data to showcase key areas of concern for your organization.


Screenshot that shows the Overview dashboard in Defender EASM.

Discovery and inventory

Microsoft proprietary discovery technology recursively searches for infrastructure through observed connections to known legitimate assets. It makes inferences about that infrastructure’s relationship to the organization to uncover previously unknown and unmonitored properties. These known legitimate assets are called discovery seeds. Defender EASM first discovers strong connections to these selected entities and then recurses to unveil more connections and ultimately compile your attack surface.

Defender EASM discovery includes the following kinds of assets:

  • Domains
  • IP address blocks
  • Hosts
  • Email contacts
  • Autonomous system numbers (ASNs)
  • Whois organizations


Screenshot of the Discovery pane.

Discovered assets are indexed and classified in your Defender EASM inventory to give you a dynamic record of the entire web infrastructure under your management. Assets are categorized as recent (currently active) or historic. They can include web applications, third-party dependencies, and other asset connections.

Dashboards

Defender EASM uses dashboards to help you quickly understand your online infrastructure and any key risks to your organization. The dashboards are designed to provide insight on specific areas of risk, including vulnerabilities, compliance, and security hygiene. These insights help you quickly address the components of your attack surface that pose the greatest risk to your organization.


Screenshot of the dashboard and the Security posture pane.

Asset management

You can filter your inventory to surface the insights that are most important to you and your organization. Filtering gives you flexibility and customization to help you access a specific subset of assets. Filtering also puts Defender EASM data to work for your specific use case, whether you’re searching for assets that connect to deprecating infrastructure or identifying new cloud resources.


Screenshot of the Inventory pane.

User permissions

A user in your organization who is assigned the Owner or Contributor role can create, delete, and edit Defender EASM resources and the inventory assets in a resource. The Owner and Contributor roles have permission to use all of the platform’s capabilities and features.

A user who is assigned the Reader role can view Defender EASM data, but they can’t create, delete, or edit a resource or inventory asset.

Data residency, availability, and privacy

Microsoft Defender EASM includes both global data and customer-specific data. The global data is sourced from Microsoft, while labels applied by customers are considered customer data. This customer data is stored in the region selected by the user.

For security reasons, Microsoft collects the user’s IP address upon signing in. This IP address may be stored for up to 30 days, but it can be retained for a longer period if necessary to investigate potentially fraudulent or malicious activity involving the product.

If an Azure region experiences downtime, only the Defender EASM customers in that specific region will be affected. Services and data in other Azure regions will continue to function normally.

When an organization ceases to be a Microsoft customer, the Microsoft compliance framework mandates that all its data be deleted within 180 days. This policy applies to customer data stored in offline locations, such as database backups. Once a resource is deleted, Microsoft cannot restore it. Customer data will remain in our data stores for an additional 75 days, but the specific resources cannot be restored after deletion. After this 75-day period, the customer data is permanently deleted.

Source link

Related Posts

Leave a Comment