This is the Trace Id: d57cc993be8a85d46d47eb156a876208
Skip to main content Why Microsoft Security AI-powered cybersecurity Cloud security Data security & governance Identity & network access Privacy & risk management Security for AI Unified SecOps Zero Trust Microsoft Defender Microsoft Entra Microsoft Intune Microsoft Priva Microsoft Purview Microsoft Sentinel Microsoft Security Copilot Microsoft Entra ID (Azure Active Directory) Microsoft Entra Agent ID Microsoft Entra External ID Microsoft Entra ID Governance Microsoft Entra ID Protection Microsoft Entra Internet Access Microsoft Entra Private Access Microsoft Entra Permissions Management Microsoft Entra Verified ID Microsoft Entra Workload ID Microsoft Entra Domain Services Azure Key Vault Microsoft Sentinel Microsoft Defender for Cloud Microsoft Defender XDR Microsoft Defender for Endpoint Microsoft Defender for Office 365 Microsoft Defender for Identity Microsoft Defender for Cloud Apps Microsoft Security Exposure Management Microsoft Defender Vulnerability Management Microsoft Defender Threat Intelligence Microsoft Defender Suite for Business Premium Microsoft Defender for Cloud Microsoft Defender Cloud Security Posture Mgmt Microsoft Defender External Attack Surface Management GitHub Advanced Security Microsoft Defender for Endpoint Microsoft Defender XDR Microsoft Defender for Business Microsoft Intune core capabilities Microsoft Defender for IoT Microsoft Defender Vulnerability Management Microsoft Intune Advanced Analytics Microsoft Intune Endpoint Privilege Management Microsoft Intune Enterprise Application Management Microsoft Intune Remote Help Microsoft Cloud PKI Microsoft Purview Communication Compliance Microsoft Purview Compliance Manager Microsoft Purview Data Lifecycle Management Microsoft Purview eDiscovery Microsoft Purview Audit Microsoft Priva Risk Management Microsoft Priva Subject Rights Requests Microsoft Purview Data Governance Microsoft Purview Suite for Business Premium Microsoft Purview data security capabilities Pricing Services Partners Cybersecurity awareness Customer stories Security 101 Product trials Industry recognition Microsoft Security Insider Microsoft Digital Defense Report Security Response Center Microsoft Security Blog Microsoft Security Events Microsoft Tech Community Documentation Technical Content Library Training & certifications Compliance Program for Microsoft Cloud Microsoft Trust Center Service Trust Portal Microsoft Secure Future Initiative Business Solutions Hub Contact Sales Start free trial Microsoft Security Azure Dynamics 365 Microsoft 365 Microsoft Teams Windows 365 Microsoft AI Azure Space Mixed reality Microsoft HoloLens Microsoft Viva Quantum computing Sustainability Education Automotive Financial services Government Healthcare Manufacturing Retail Find a partner Become a partner Partner Network Microsoft Marketplace Marketplace Rewards Software development companies Blog Microsoft Advertising Developer Center Documentation Events Licensing Microsoft Learn Microsoft Research View Sitemap

Go deep on real code and real systems at Microsoft Build, June 2-3.

Learn more

Microsoft Defender External Attack Surface Management (EASM)

See your business the way an attacker can.

A person working at their desk looking at data in Microsoft Excel on a desktop monitor.

Defender EASM capabilities are now available in Azure Copilot

Get AI-driven insights on risky assets within your external attack surface and convert natural language into corresponding inventory queries across all discovered data.

Continuous visibility beyond the firewall

See your rapidly changing, global external attack surface in real time with Defender EASM.

Discover unmanaged resources

Understand the full extent of your attack surface, including shadow IT and assets created through common, everyday business growth. 

Multicloud visibility

Maintain a dynamic inventory of external resources across multiple cloud and hybrid environments.

Identify exposed weaknesses

Prioritize vulnerabilities and misconfigurations hidden in unmanaged resources, then bring the resources under management to remove those exposures.

The external attack surface management challenge

In this era of hybrid work, shadow IT creates an increasingly serious security risk. Defender EASM helps cloud security teams see unknown and unmanaged resources outside the firewall.

Video container

Capabilities

Discover, classify, and prioritize exposed weaknesses in the cloud, software as a service (SaaS), and infrastructure as a service (IaaS) resources to strengthen security posture.

A Defender EASM inventory report in Azure including a list of approved assets.

Real-time inventory

Use dynamic, always-on inventory monitoring to find, analyze, and categorize external-facing resources as they appear.

An attack surface summary dashboard broken out into three priority levels.

Attack surface visibility

Discover external assets across multiple cloud environments, including unknown resources such as shadow IT.

A security posture dashboard detailing open ports, SSL configuration and SSL organization.

Exposure detection and prioritization

Uncover vulnerabilities throughout every layer of your external attack surface, including frameworks, web pages, components, and code.

An OWASP Top 10 dashboard explaining what broken access control means, how to remediate it, and a list of related assets.

More secure management for every resource

Help protect newly discovered resources in the Microsoft Defender for Cloud portal.

Microsoft azure Web pages with a medium scored CVE report

Attack surface insights at generative AI speeds

Get an AI-assisted view into risky assets, quickly drill through asset details, and convert natural language into corresponding inventory queries across all discovered data.

Back to tabs

Uncover your external attack surface

Get complete visibility into internet-exposed assets with code-level discovery through a global network that graphs online relationships.

A Block diagram Infographic explaining assets with Microsoft Defender External attack surface management

Defender EASM insights across security solutions

Make informed decisions to secure your digital estate. Get generative AI assisted external attack surface insights and quickly find risky assets and associated vulnerabilities and gain insight into your external risk posture in a unified, end-to-end view.

Screenshot of Microssoft azure Inventory

Microsoft Security Copilot

Protect at the speed and scale of AI with an assistant powered by generative AI.

Back to tabs

Related products

Use best-in-class Microsoft security products to prevent and detect attacks across your organization.

A person working at their desk.

Microsoft Defender for Cloud

Assist in guarding against evolving threats across multicloud and hybrid environments.

Three people having a conversation at a desk with multiple screens.

Microsoft Defender Threat Intelligence

Help protect your organization from modern adversaries with a comprehensive view of your threat exposure.

A person working at their desk with multiple screens

Microsoft Sentinel

See and stop threats across your entire enterprise with intelligent security analytics.

Documentation and training

Blog

Announcement blog

Learn about exciting recent developments in threat intelligence from Microsoft.

Documentation

Documentation

Learn how to deploy and use Defender EASM in your environment.

Infographic

The scale and scope of cybercrime in 60 seconds

During a cyberattack, every second counts. Here’s a year’s worth of cybersecurity research condensed into one 60-second window.

Infographic

Understand your attack surface as it grows and evolves

Learn how Defender EASM gives real-time visibility into your expanding, constantly changing enterprise attack surface.

Protect everything

Make your future more secure. Explore your security options today. 

Follow Microsoft Security