This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
In the onboarding section we will discuss how to gain access to Mandiant Attack Surface Management through Mandiant Advantage, as well as lay the foundational layer of Projects and Collections for your implementation.
Prerequisites
Have a Mandiant Advantage Account
Access to Attack Surface Management (ASM) in Mandiant Advantage
Read and understand ASM Seeds
Read and understand ASM Technologies
Actions
Sign In to Mandiant Advantage
In order to access Mandiant Attack Surface Management (ASM), you need to sign in using your Mandiant Advantage account.
See the Relevant Links section for more documentation regarding the prerequisites.
Entitlement for Mandiant Attack Surface Management.
Steps
Navigate to the Mandiant Advantage Login Page, sign in using your credentials. | Docs
Upon login, you will see your profile page. Fill out your profile appropriately.
At the top of the profile page, there is an Applications section. In there are links to your deployment of Attack Surface Management, Threat Intelligence, and anything else you are entitled to. Click on Attack Surface Management.
Collections are lists of assets that are being monitored for protection under Attack Surface Management (ASM). Collections are populated with “Seeds”, entities that are used to uncover other entities that are exposed.
Roles & Permissions are handled at two levels inside of Attack Surface Management: Project and Collection roles. In order to assume any Collection level roles, a member must have been added to the Project that a Collection lives in.