Description #
Microsoft Defender External Attack Surface Management (EASM) is a security tool designed to provide continuous discovery and monitoring of an organization's digital attack surface from an external perspective. By leveraging Microsoft's proprietary discovery technology, Defender EASM uncovers infrastructure connected to known assets, providing IT and security teams with visibility into domains, IP blocks, hosts, email contacts, Autonomous System Numbers (ASNs), and WHOIS organizations. These asset types form the attack surface inventory, revealing external-facing properties that are exposed to the open internet and thus pose potential risks.
With Defender EASM, organizations can gain a comprehensive view of their online infrastructure, including previously unknown or unmonitored properties, extending vulnerability management beyond traditional firewall boundaries. IT Partner will guide you through the initial setup, resource configuration, and implementation of Defender EASM, ensuring that your digital assets are continuously monitored and protected against external threats.
IT Partner Responsibilities #
- Assist in setting up or verifying the existing Azure subscription or Defender EASM trial account.
- Guide the client through understanding the core functionalities and prerequisites for Defender EASM.
- Set up the Defender EASM Azure resource.
- Configure seed and start initial assessment.
- Provide knowledge on how to use the tool effectively, including interpreting reports and responding to alerts.
- Help optimize the ongoing monitoring process and suggest enhancements based on the client's evolving security needs.
Client Responsibilities #
- Ensure access to the required Azure.
- Provide details of known legitimate assets that can be used as discovery "seeds" for the initial setup.
- Collaborate with IT Partner to define key security priorities and known assets.
Prerequisites #
- An Azure subscription is required, or a 30-day free trial of Defender EASM can be utilized for initial setup and evaluation.
Plan #
- Verify the client’s Azure subscription and access permissions.
- Collect information on known legitimate assets to be used for initial discovery.
- Create a new resource group in Azure for Defender EASM.
- Configure the Defender EASM resource in the resource group.
- Configure the discovery settings and connect initial discovery seeds.
- Start the initial discovery process to map the external attack surface.
- Establish monitoring rules and alerts for newly discovered assets.
- Provide recommendations for further optimization based on initial discovery results.
Success criteria #
- Defender EASM configured and operational in the client's Azure environment.
- Comprehensive mapping of the organization’s external attack surface, including domains, IP blocks, and other assets.
- Continuous monitoring of external-facing properties with alerts for any changes or new discoveries.
- Actionable insights that help prioritize risk mitigation efforts and reduce exposure to external threats.
- Knowledge transfer provided to the client's security team for effective use and management of Defender EASM.
Share
Related services
Device migration automation for Windows
This service is especially beneficial for organizations migrating large numbers of devices, reducing downtime, and simplifying the overall migration process. With enterprise-scale deployment capabilities, the tool allows for the migration of thousands of workstations quickly and efficiently, supporting both physical and remote devices via VPNs.
Hypercare for IT
Hypercare for IT is a premium support service designed to provide comprehensive assistance and proactive management for your IT infrastructure. Our service ensures that your IT environment is optimized, secure, and running smoothly, allowing you to focus on your core business activities.