Define Filter Criteria in External Attack Surface Management (EASM) Configuration Profile

Let us understand the filter criteria that enable you to discover externally exposed hosts. When you configure EASM for the first time, verify the Organization and the Domain details.

Explore the following to understand more about filter criteria for an EASM configuration profile:

Manage Configurations.

Important to Know!

  • Subsidiaries Enumeration and Horizontal Domain Enumeration are selected by default for Organization and Domain seed types only. If cleared, they are not included in the configuration.
  • You can provide multiple values for all seed types by separating them with semicolons. You can also import seed values in bulk from CSV.
  • If the same IP address is included and excluded, the exclusion takes precedence.

Know More about Include and Exclude Types and Filters

Seed Type for Include

Filter Description Examples
Organization Name of the organization that owns the IP space. The correct legal entity name should be used. Google LLC
Domain/Subdomain Domain or Subdomain of the assets. Only top-level domain expected. Autocomplete helps quickly configure by showing top 5 suggestions after typing three characters. google.com
IP/Netblock Alias for net filter string 34.120.218.237
Certification Subject Certificate subject name cadz02.canadadz.com
ASN Autonomous System Numbers. Including ASN discovers netblocks in Shodan and active assets during sync. AS123456 (must start with "AS" followed by up to 6 digits)

Seed Type for Exclude

You can add Exclude filters while creating or modifying the profile. Values can also be imported from CSV.

Exclusion options.

Filter Description Examples
Organization Name of the organization that owns the IP space Google LLC
Domain/Subdomain Domain or Subdomain of assets qualys.com, doc.qualys.com
IP/Netblock Alias for net filter string 34.120.218.237
City Name of the city Kansas City
Country 2-letter country code US
CDN Default is True. Cannot be added multiple times. -
ASN Autonomous System Numbers. Excluding ASN prevents associated netblocks discovery in Shodan and sync. AS123456

Domain and Organization Validation

You can validate a domain or organization to fetch subsidiaries based on the value entered.

Validation is not supported for multiple values. The Validate button appears only after entering a value.

Vertical Enumeration for EASM Discovery

Allows discovery of sibling subdomains of included subdomains.

  • If Vertical Enumeration is not selected, validation is not done after clicking Check Catalog.
  • If selected, validation occurs only if the primary domain exists in the catalog.

Check catalog.

Insight into User-defined, Catalog, and Enumerated Data

  • Review shows user-defined and catalog data, including file names if imported via CSV.
  • Pagination is supported for large data sets.
  • You can download data in CSV, HTML, or XML formats.
  • You can remove uploaded include/exclude values during edit.

Inclusion and Exclusion details. Delete include and exclude entries.

Subsidiary data syncs only if Subsidiaries Enumeration and Horizontal Domain Enumeration are selected.

Validate domain and organization.

Scenarios

Scenario 1 (Validation Successful): Validation succeeds for the entered domain or organization.

Validation successful.

Scenario 2 (Validation Pending): Value not found in catalog, marked as "Pending Validation".

If reviewed and added to the catalog later, the status changes to Validated.

Add Filters

Click Add Filters to add multiple seed filters with an AND relation.

Input criteria. Type filters.

  • Use the plus icon to add multiple IPs and cities, or enter them as semicolon-separated values.
  • Select countries from the list; the 2-letter code is auto-selected.

    Character limit is 4000 for IP and Country filters; 100 for City filter.

Adding city name.

Add Section

Click Add Section to create a new filter section for each seed type.

Add section. Filter type section.

Add Exclusion

The Exclude section is combined with Include using an AND relation.

Exclude section.

You can also exclude IP addresses from discovery.

Import Seed Values in Bulk from CSV File

You can import Include/Exclude seed values in bulk by uploading a CSV file instead of entering them manually.

  • Download the provided template for the correct format.
  • CSV import supported for Domains, Subdomains, Organizations, IP/Netblocks, and ASN.
  • Semicolon/comma-separated strings are not supported.
  • Incorrect file type (e.g., Organization CSV uploaded for Domain) is rejected.

Optional Settings

EASM profile optional settings.

EASM Purge Rule

Automates purging of assets not discovered after a specified number of discoveries (0–10, default 3).

Enable EASM Scan

Starts the EASM lightweight scan. Configure the scan using the options below.

When you save or update a profile, the system follows a predefined sequence of operations to discover assets and reflect the associated data in the EASM view. The following sequence is followed:

  • After saving/updating the profile, the discovery process is triggered 1 hour later.
  • Scans are triggered 24 hours after the discovery process is completed.
  • Data starts appearing once the scans are completed.

The vulnerabilities discovered through the scan are displayed on the EASM > Vulnerabilities tab.

All EASM Assets

Includes VM-activated assets and managed assets with the EASM source.

Unmanaged EASM Assets only (Exclude VM Activated Assets)

Includes only unmanaged assets.

Tag-based Scope for EASM Scan

The EASM lightweight scan can be configured to perform the scan on selective assets. Instead of scanning all your EASM assets, you can limit the scan scope by including or excluding assets using asset tags. Use the Add Tags or Exclude tags option as required.

When specifying tags, you can choose one of the following conditions:

  • ANY: Includes assets that have any of the specified tags.
  • ALL: Includes assets that have all of the specified tags.

If you exclude assets from the EASM scan, the vulnerabilities discovered on those previously scanned assets are not deleted. They are still visible on the EASM > Vulnerabilities tab.

Asset Inclusion Settings

Your CDN assets are included in the EASM scan by default. You can select the Exclude CDN Assets checkbox to exclude your CDN assets from scans.

Add Internet-facing Tagged Assets

Toggle to include Internet-facing tagged assets (VM and cloud agent) in discovery. If disabled, related info is removed from the Asset Details page.

Add Internet-facing tagged assets to EASM discovery scan

Use this optional setting to add Internet-facing tagged assets to the EASM discovery scan, in addition to Organization and Domain, etc. Your Internet-facing tagged assets, including scanned and cloud agent assets, are picked up as input to EASM. After the sync, you can see the External Attack Surface details on the “Asset Details” page.

Typosquatted Domains Discovery

Toggle to detect typosquatted domains.

If the Exclude Defamatory Domains checkbox is

  • Selected, the scan excludes defamatory domains.
  • Not selected, the scan includes defamatory domains.

View results in Inventory > Domains tab. For more information, refer to View Domain Details.

Domain Security

Toggle to enable the monitoring of DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) records of your internet-facing domains.

For more information, refer to EASM Domain Security.