Explore with the attack surface map

To visualize exposure data, use the attack surface map in Microsoft Security Exposure Management, together with the enterprise exposure graph schema.

Security Exposure Management is currently in public preview.

Important

Some information in this article relates to a prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.

Prerequisites

Access the map

  1. In the device inventory, select a device.
  2. Select View Map.

You can also search for an asset from Attack surface -> Map, from Identities, or from the Overview dashboard.

Explore the map

The exposure map gives you visibility into asset connections.

  1. In Attack surface map, explore assets and connections.

  2. Use the map features to explore.

    • Indicators: Icon indicators show node type and edge type. Visual indicators show information such as the high criticality crown or a vulnerability bug, providing visual input to where critical organizational data is at risk.
    • Expandable groups: Provide a way to expand similar assets when you want to view them more in depth. Expanding the view helps you to discover choke points and specific highly vulnerable or critical assets. If not needed, leave them collapsed for a more organized screen.
    • Hovering: Hover over nodes and edges to get additional information.
    • Explore assets and their edges. To explore assets and edge, select the plus sign. Or select the option to explore connected assets from the contextual menu.
    • Asset details: To view details, select the asset icon.
    • Focus on asset: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the Graph view when selecting an individual attack path.
    • Search: Helps you to discover items by node type. By selecting all results, search the particular type for specific results. You can also filter your search by devices, identity, or cloud assets from the initial screen.

    Screenshot of the attack surface exposure map.

Next steps

Work with attack paths.