Get Started with EASM
This section explains what you need before using External Attack Surface Management (EASM).
Prerequisites
- Ensure that you have EASM enabled for your CSAM subscription.
- The required roles and permissions are configured. For more information, refer to Role-based Permission for Managing EASM Profile.
EASM Discovery Profile
The EASM profiles specifies the discovery scope that EASM uses to discover and monitor your externally exposed assets. This gives you complete visibility of your external attack surface.