![]() Users can leverage Defender EASM data to automate workflows by integrating into existing processes or creating new applications and clients. ![]() REST API: The Defender EASM REST API lets customers manage their attack surface at scale. Added to inventory within a specific time range.Relate to a particular brand owned by the organization.Impacted by a specific vulnerability that requires mitigation. ![]() Owned by a specific business unit in their organization.Labels help you organize your attack surface and apply business context in a highly customizable way you can apply any text label to any asset, allowing you to group assets and better operationalize your inventory. The SDK is now available to customers in Public Preview. Data connections can support large exports – more than 100 million assets a day.Ĭustomers can now access a client library for Python that helps them operationalize the Defender EASM REST API to automate processes and improve workflows. Users need to be active customers to export Defender EASM data to either tool, and data connections are subject to the pricing model of each respective platform. The data connector sends asset data to two different platforms: Microsoft Log Analytics and Azure Data Explorer. Below, learn about these powerful new enhancements and how you can begin using them today.ĭefender EASM now offers data connections to help users seamlessly integrate their attack surface data into other Microsoft solutions to supplement existing workflows with new insights. Features recently added boost usability and enable exciting new ways for customers to leverage their inventory data and critical security insights derived from their organization's assets and workloads. Microsoft Defender External Attack Surface Management (Defender EASM) discovers and classifies assets and workloads across your organization's digital presence to enable teams to understand and prioritize exposed weaknesses in cloud, SaaS, and IaaS resources to strengthen security posture.
0 Comments
Leave a Reply. |