Microsoft Security Copilot Integration in Defender EASM

 





Introduction

To offer an external picture of online infrastructure, Microsoft Defender External Attack Surface Management (Defender EASM) continuously finds and maps the digital attack surface. IT and security teams can use this visibility to prioritize risk, find unknowns, remove threats, and extend vulnerability and exposure control outside of the firewall. By examining vulnerability and infrastructure data, attack surface insights are produced that highlight the main issues facing a company. 

Defender EASM's integration of Microsoft Security Copilot (Security Copilot) facilitates interaction with attack surfaces identified by Microsoft. Companies can more rapidly comprehend their externally visible infrastructure and pertinent, essential dangers by identifying attack surfaces. This integration sheds light on particular risk areas, such as security hygiene, compliance, and vulnerabilities.

Key Features

The EASM Security Copilot integration can: 
  • Get a snapshot of your external attack surface and generate insights into potential risk- You can get a quick view of your external attack surface by analyzing internet-available information combined with the Defender EASM proprietary discovery algorithm. It provides an easy-to-understand natural language explanation of the organization's externally facing assets, such as hosts, domains, webpages, and IP addresses. It highlights the critical risks associated with each.

  • Prioritize remediation efforts based on asset risk and Common Vulnerabilities and Exposures (CVEs) list items- Defender EASM assists security teams in determining which assets and CVEs represent the highest risk in their  surroundings. It evaluates vulnerability and infrastructure information to highlight critical areas of concern, offering a clear explanation of risks and suggested actions. 

  • Use Security Copilot to surface insights- Security Copilot allows you to ask question in normal language and retrieve information about the attack surface of your company via Defender EASM. Query information such as the quantity of insecure Secure Sockets Layer (SSL) certificates, identified ports, and particular vulnerabilities that impact the attack surface.

  • Expedite attack surface curation- Utilize labels, external IDs, and state modifications for a collection of assets to create your attack surface using Security Copilot. Curation is accelerated by this procedure, allowing for quicker and more effective inventory organization. 

Enable Security Copilot Integration

  1. Access Security Copilot and ensure that your are authenticated. 
  2. Select the Security Copilot plugin icon on the upper-right side of the prompt input bar. 
  3. Under Microsoft, locate Defender External Attack Surface Management. Select On to connect. 
  4. If you want Security Copilot to pull data from your Defender EASM resource, select the gear icon to open the plugin settings. Enter or select values by using the values from your resource's Essentials section on the Overview pane.

Provide Feedback

Your feedback on Security Copilot in general and the Defense EASM plugin in particular is essential for directing the product's ongoing and future development. Using the feedback buttons at the bottom of each finished question is the best to give this feedback right within the product. It is advisable to choose "Looks right" when the outcome meets your expectations, "Needs improvement" when it doesn't, and "Inappropriate" when it is harmful. 

Conclusion

We have discussed main features of Microsoft Security Copilot Integration in Defender EASM.


























Comments

Popular posts from this blog

Deployment (Part 3)

Deployment (Part 1)

Deployment (Part 2)