Тёмный
No video :(

Introduction to Microsoft Defender External Attack Surface Management 

Microsoft Security Community
Подписаться 30 тыс.
Просмотров 4,9 тыс.
50% 1

Wednesday, March 15, 2023, 11:00 AM ET / 8:00 AM PT (webinar recording date)
Microsoft Defender External Attack Surface Management (EASM) Webinar | Introduction to Microsoft Defender External Attack Surface Management
Presenters: JT Wells and Michael Lindsey
Description:
Introduction into how to gain comprehensive visibility and insights over external facing organizational assets and their digital footprint with Defender EASM.
Timestamps:
00:00 - Introduction
01:31 - Attacks are Crossing Modalities
07:32 - Microsoft Defender External Attack Surface Management Overview
32:17 - Graph the Internet: How it Works
36:16 - Microsoft Defender External Attack Surface Management Architecture
42:13 - Key Features
1:02:11 - Use Cases, Outro
SUBSCRIBE for new Microsoft Security videos every week.
aka.ms/Securit...
To ensure you hear about future Microsoft Defender External Attack Surface Management webinars and other developments, make sure you join our community by going to aka.ms/Securit...
#microsoftdefenderEASM #microsoftdefenderexternalattacksurfacemanagement #MDEASM
#microsoftsecuritycommunity

Опубликовано:

 

14 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 3   
@nmap-p-
@nmap-p- 10 месяцев назад
11:37 32:30 1:00:51 Shugging that protein shake for the gainz 💪Keep strong brother (and protect our assets)!
@meganbowen-go1vp
@meganbowen-go1vp Год назад
In GDRP Compliance section, we can see SSL Certificate Posture where Broken Certificate, Active Certificate Issue, Requires Authorization and Browser Certificacte Error are listed. What is the difference between Broken Certificate and Active Certificate Issue? I mean, the user experience is the same and also descriptions are the same. Can you please clarify what stands for Active Certificate Issue?
@nmap-p-
@nmap-p- 10 месяцев назад
35:50 The company Microsoft seems like a bad example: if you find similar Microsoft Login pages, you probably end up with a bunch of phishing pages hosted on NON-Microsoft assets. From a point of view of a regular company, then yes, you likely find web/admin portals of the company and in rare cases phishing pages (again on non-company related assets).
Далее
до/после Знакомо?
00:16
Просмотров 12 тыс.
1. Introduction, Threat Models
1:17:13
Просмотров 795 тыс.
Demystifying Microsoft Defender for Servers
58:58
Просмотров 12 тыс.