Skip to content

Commit 24c5f27

Browse files
committed
Fixed some Acrolinx issues on YML files
1 parent 8d7c6ca commit 24c5f27

5 files changed

Lines changed: 9 additions & 9 deletions

File tree

learn-pr/wwl-sci/discover-external-assets-vulnerabilities/2-explore-external-attack-surface-capabilities.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.discover-external-assets-vulnerabilities.explore-external-attack-surface-capabilities
33
metadata:
4-
title: Explore EASM features and capabilities
5-
description: Explore how Microsoft Defender EASM is deployed as an Azure resource, what asset types and states it discovers, and how its outside-in scanning scope differs from Defender CSPM and MDVM.
4+
title: Explore External Attack Surface Management (EASM) features and capabilities
5+
description: Explore how Microsoft Defender EASM is deployed as an Azure resource, what assets it discovers, and how it's outside-in scanning scope differs from other Defender tools.
66
ms.date: 04/07/2026
77
author: r-c-stewart
88
ms.author: roberts

learn-pr/wwl-sci/discover-external-assets-vulnerabilities/3-discover-assets-recursive-discovery.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.wwl.discover-external-assets-vulnerabilities.discover-assets-recursive-discovery
33
metadata:
44
title: Discover assets using recursive discovery
5-
description: Learn how EASM's recursive discovery engine uses seeds to find unknown internet-facing assets, and how to configure discovery groups and manage your attack surface inventory.
5+
description: Learn how Microsoft Defender External Attack Surface Management (EASM)'s recursive discovery engine uses seeds to find unknown internet-facing assets.
66
ms.date: 04/07/2026
77
author: r-c-stewart
88
ms.author: roberts

learn-pr/wwl-sci/discover-external-assets-vulnerabilities/4-analyze-attack-surface-dashboards.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
uid: learn.wwl.discover-external-assets-vulnerabilities.analyze-attack-surface-dashboards
33
metadata:
44
title: Analyze your attack surface with dashboards
5-
description: Use EASM dashboardsOverview, Attack surface summary, Security posture, and OWASP Top 10to identify and prioritize vulnerabilities, exposed services, certificate issues, and web application risks across your external attack surface.
5+
description: Use External Attack Surface Management (EASM) dashboardsOverview, Attack surface summary, Security posture, and OWASP Top 10to identify and prioritize vulnerabilities, exposed services, certificate issues, and web application risks across your external attack surface.
66
ms.date: 04/07/2026
77
author: r-c-stewart
88
ms.author: roberts

learn-pr/wwl-sci/discover-external-assets-vulnerabilities/5-integrate-external-attack-surface-defender-cloud.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.discover-external-assets-vulnerabilities.integrate-external-attack-surface-defender-cloud
33
metadata:
4-
title: Integrate EASM insights with Defender for Cloud
5-
description: Connect EASM's outside-in discovery data with Defender CSPM to perform attack path analysis starting from internet-exposed resources and run Cloud Security Explorer queries that correlate external exposure with internal security findings.
4+
title: Integrate External Attack Surface Management (EASM) insights with Defender for Cloud
5+
description: Connect EASM outside-in discovery data with Defender Cloud Security Posture Management (CSPM) to perform attack path analysis starting from internet-exposed resources and run Cloud Security Explorer queries that correlate external exposure with internal security findings.
66
ms.date: 04/07/2026
77
author: r-c-stewart
88
ms.author: roberts

learn-pr/wwl-sci/discover-external-assets-vulnerabilities/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,10 @@ metadata:
1010
ms.service: defender-for-cloud
1111
ai-usage: ai-assisted
1212
title: Discover unprotected assets and vulnerabilities by using Microsoft Defender External Attack Surface Management
13-
summary: In this module, you use Microsoft Defender External Attack Surface Management (EASM) to discover and secure your external attack surface. You learn how EASM's outside-in discovery complements inside-out CSPM and MDVM, use recursive discovery to find unknown internet-facing assets across your organization, analyze dashboards to prioritize vulnerabilities and security hygiene risks, and integrate EASM findings with Defender CSPM for attack path analysis.
13+
summary: In this module, you use Microsoft Defender External Attack Surface Management (EASM) to discover and secure your external attack surface. You learn how Microsoft Defender External Attack Surface Management (EASM) outside-in discovery complements other Defender tools. EASM uses recursive discovery to find unknown internet-facing assets across your organization, analyze dashboards to prioritize vulnerabilities and security hygiene risks, and integrate EASM findings with Defender CSPM for attack path analysis.
1414
abstract: |
15-
After completing this module, you will be able to:
16-
- Explore EASM features and capabilities, including asset types, asset states, and how its outside-in scanning scope differs from Defender CSPM and MDVM
15+
After completing this module, you'll be able to:
16+
- Explore EASM features and capabilities, including asset types, asset states, and how outside-in scanning differs from other Defender tools
1717
- Configure asset discovery using seeds to identify unknown internet-facing infrastructure and asset connections
1818
- Use EASM dashboards to prioritize vulnerabilities and security hygiene risks across your attack surface
1919
- Integrate EASM findings with Defender CSPM to analyze attack paths starting from internet-exposed resources

0 commit comments

Comments
 (0)