
Then select your organization from the list and click “Build my Attack Surface”.Īt this point, the discovery will be running in the background. When first accessing your Defender EASM instance, select “Getting Started” in the “General” section to search for your organization in the list of automated attack surfaces. This enables users to quickly access their inventory as Defender EASM refreshes the data, adding additional assets and recent context to your Attack Surface. It is recommended that all users search for their organization’s attack surface before creating a custom attack surface and running additional discoveries.

Microsoft has preemptively configured the attack surfaces of many organizations, mapping their initial attack surface by discovering infrastructure that’s connected to known assets. Discovered assets are indexed in a customer’s inventory, providing a dynamic system of record of web applications, third party dependencies, and web infrastructure under the organization’s management through a single pane of glass.īefore you run a custom discovery, see the What is discovery? article to understand key concepts mentioned in this article. Discovery scans the internet for assets owned by your organization to uncover previously unknown and unmonitored properties.

Microsoft Defender External Attack Surface Management (Defender EASM) relies on our proprietary discovery technology to continuously define your organization’s unique Internet-exposed attack surface.
