tencent cloud

Service Content
Last updated:2025-09-24 17:40:57
Service Content
Last updated: 2025-09-24 17:40:57
This document describes the service details and delivery content of Exposure Management (CTEM).

Based on the service content, CTEM is available in 3 editions, that is, Standard Edition, Advanced Edition, and Flagship Edition.
Service Classification
Standard Edition
Advanced Edition
Flagship Edition
Service Content
Perform exposure surface mining and asset monitoring on enterprise asset accessibility and exposure, including but not limited to:
Enterprise architecture extensibility mining
Primary domain name detection
Subdomain name detection
Host asset detection
Port service scan
Web asset collection
Admin backend recognition
App, WeChat Mini Program, and WeChat official account collection
Perform exposure surface mining on enterprise asset accessibility and exposure, and leverage Yunding Lab's self-developed engine to identify enterprise asset risks, thus helping proactively manage the impacts of internal and external threats.
Built upon Standard Edition, this edition offers the following additional features:
Vulnerability scan
Self-developed weak password detection
Directory cracking
Sensitive information leakage
Perform exposure surface mining on enterprise asset accessibility and exposure; Experts with years of attack and defense experience and first-party operation experience leverage Yunding Lab's self-developed engine for risk mining; Provide repair priority analysis, attack path analysis, and security operation improvement suggestions.
Built upon Advanced Edition, this edition offers the following additional features:
GitHub leakage
Network disk leakage of document libraries
Vulnerability intelligence scan
Delivery Content
Exposure Surface Asset List
Exposure Surface Management Overview Report
Exposure Surface Asset and Risk List
Exposure Surface Management Overview Report
List of High-Risk Ports, High-Risk Vulnerabilities, and Weak Passwords
Exposure Surface Asset and Risk List
List of High-Risk Ports, High-Risk Vulnerabilities, and Weak Passwords
Exposure Surface Management Analysis Report

Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback