title | description | author | ms.author | manager | ms.topic | ms.service | ms.date |
---|---|---|---|---|---|---|---|
What is Microsoft Security Exposure Management? |
Learn how Microsoft Security Exposure Management enhances and extends security posture management. |
dlanger |
dlanger |
rayne-wiselman |
overview |
exposure-management |
08/20/2024 |
Microsoft Security Exposure Management is a security solution that provides a unified view of security posture across company assets and workloads. Security Exposure Management enriches asset information with security context that helps you to proactively manage attack surfaces, protect critical assets, and explore and mitigate exposure risk.
Security Exposure Management is currently in public preview.
[!INCLUDE prerelease]
Security Exposure Management is aimed at:
- Security and compliance admins responsible for maintaining and improving organizational security posture.
- Security operations (SecOps) and partner teams who need visibility into data and workloads across organizational silos to effectively detect, investigate, and mitigate security threats.
- Security architects responsible for solving systematic issues in overall security posture.
- Chief Security Information Officers (CISOs) and security decision makers who need insights into organizational attack surfaces and exposure in order to understand security risk within organizational risk frameworks.
With Security Exposure Management you can:
-
Get a unified view across the organization: Security Exposure Management continuously discovers assets and workloads, and gathers discovered data into a unified and up-to-date view of your inventory and attack surface.
-
Manage and investigate attack surfaces: Visualize, analyze, and manage cross-workload attack surfaces.
- The enterprise exposure graph gathers information to provide a comprehensive view of security posture and exposure across the business.
- Graph schemas provide contextual information about specific organizational entities such as devices, identities, machines, and storage.
- Query the enterprise exposure graph to explore assets, assess risk, and hunt for threats across on-premises, hybrid, and multicloud environments.
- Visualize your environment and graph queries with the attack surface map.
-
Discover and safeguard critical assets: Security Exposure Management marks predefined assets and assets you customize, as critical. This enables you to focus and prioritize on those critical assets to ensure security and business continuity.
-
Manage exposure: Security Exposure Management provides tools to manage security exposure, and mitigate exposure risk.
- Exposure insights aggregate security posture data, and provide rich context around the security posture state of your asset inventory.
- You leverage these insights to prioritize security efforts and investments.
- Insights include security events, recommendations, metrics, and security initiatives.
- As you manage exposure risk, attack paths show you how an attacker might breach your attack surface.
- Security Exposure Management generates attack paths based on data collected across assets and workloads. It simulates attack scenarios, and identifies weaknesses that an attacker could exploit.
- You can use the enterprise exposure graph and attack surface map to visualize and understand potential threats.
- You can also focus on choke points through which many attack paths flow.
- Actionable recommendations help you to mitigate identified attack paths.
Currently, Security Exposure Management consolidates security posture information and insights from workloads that include:
- Microsoft Defender for Endpoint
- Microsoft Defender for Identity
- Microsoft Defender for Cloud Apps
- Microsoft Defender for Office
- Microsoft Defender for IoT
- Microsoft Secure Score
- Microsoft Defender Vulnerability Management
- Microsoft Defender for Cloud
- Microsoft Entra ID
- Microsoft Defender External Attack Surface Management (EASM)
In addition to Microsoft services, Security Exposure Management will connect to non-Microsoft data sources over time.
Review prerequisites to get started with Security Exposure Management.