This is the Trace Id: 4bf66dee3500c711a4bcd1501e8fe61e
Skip to main content Microsoft Defender Microsoft Entra Microsoft Intune Microsoft Purview Microsoft Security Copilot Microsoft Sentinel View all products AI-powered cybersecurity Cloud security Data security & governance Identity & network access Privacy & risk management Security for AI Small and medium business Unified SecOps Zero Trust Pricing Services Partners Why Microsoft Security Cybersecurity awareness Customer stories Security 101 Product trials How we protect Microsoft Industry recognition Microsoft Security Insider Microsoft Digital Defense Report Security Response Center Microsoft Security Blog Microsoft Security Events Microsoft Tech Community Documentation Technical Content Library Training & certifications Compliance Program for Microsoft Cloud Microsoft Trust Center Security Engineering Portal Service Trust Portal Microsoft Secure Future Initiative Business Solutions Hub Contact Sales Start free trial Microsoft Security Azure Dynamics 365 Microsoft 365 Microsoft Teams Windows 365 Microsoft AI Azure Space Mixed reality Microsoft HoloLens Microsoft Viva Quantum computing Sustainability Education Automotive Financial services Government Healthcare Manufacturing Retail Find a partner Become a partner Partner Network Microsoft Marketplace Software companies Blog Microsoft Advertising Developer Center Documentation Events Licensing Microsoft Learn Microsoft Research View Sitemap

Microsoft Defender External Attack Surface Management (EASM)

See your business the way an attacker can.
OVERVIEW

Continuous visibility beyond the firewall

See your rapidly changing, global external attack surface in real time with Defender EASM.
  • Understand the full extent of your attack surface, including shadow IT and assets created through common, everyday business growth.
    Two coworkers looking at a laptop screen
  • Maintain a dynamic inventory of external resources across multiple cloud and hybrid environments.
    Person monitoring systems at a workstation with multiple displays
  • Prioritize vulnerabilities and misconfigurations hidden in unmanaged resources, then bring the resources under management to remove those exposures.
    Two colleagues collaborating at a table using a Surface laptop
How it works

Uncover your external attack surface

Get complete visibility into internet-exposed assets with code-level discovery through a global network that graphs online relationships.
Capabilities

Microsoft Defender EASM capabilities

Discover, classify, and prioritize exposed weaknesses in the cloud, software as a service (SaaS), and infrastructure as a service (IaaS) resources to strengthen security posture.
Use dynamic, always-on inventory monitoring to find, analyze, and categorize external-facing resources as they appear.
Contoso IT inventory list showing approved assets.
Back to tabs
RESOURCES

Documentation and training

Get started

Protect everything

Make your future more secure. Explore your security options today. 

Follow Microsoft Security

English (United States) Consumer Health Privacy Sitemap Contact Microsoft Privacy Manage cookies Terms of use Trademarks Safety & eco Recycling About our ads