M365 Licensing
O365 Security Licenses & Management provides robust security and management options for Microsoft 365 environments, including M365 E5 licensing, Exchange Plan 2, Teams, and advanced security add-ons like E5 Security and Microsoft Priva for privacy risk management.
Microsoft 365 E5 (no Teams)
Microsoft 365 E5 (without Teams) provides advanced security, compliance, and analytics features, including tools like Microsoft Defender for Office 365, Azure Active Directory Premium P2, Data Loss Prevention, and Power BI Pro for data analysis and business intelligence.
-
Microsoft Entra ID P2
Microsoft Entra ID (formerly known as Azure Active Directory or Azure AD) provides identity and access management solutions for hybrid and multicloud environments.
-
Azure Information Protection Plan 2
Discover, classify, label, and protect sensitive documents and emails.
-
Microsoft Defender for Endpoint
Scale your security with a unified endpoint security platform for preventative protection, post-breach detection, automated investigation, and response.
-
Microsoft Defender for Cloud Apps
View apps used in your organization, identify and combat cyberthreats, and monitor and control data travel in real time.
-
Microsoft Purview Insider Risk Management
Intelligently identify, investigate, and take quick action on insider risks.
-
Microsoft Teams Phone Standard
Enable call control and Private Branch Exchange (PBX) capabilities in the cloud with Microsoft Teams Phone Standard.
-
Microsoft Defender XDR
Protect your organization against sophisticated attacks such as phishing and zero-day malware.
-
Information Protection and Governance
Identify risks by locating data and understanding how it’s used. Help safeguard data where it lives by configuring protection and retention labels.
-
Microsoft Defender for Identity
Use a cloud-based solution that helps protect your organisation’s identities from multiple types of advanced targeted cyberattacks.
-
Microsoft Purview eDiscovery
Help your organization find relevant data quickly and cost-effectively.
-
Power BI Pro
Deliver insights to enable fast, informed decisions with business analytics.
-
Built-in non-Microsoft connectors
Empower multiple compliance solutions with high-fidelity data ingestion from a multitude of non-Microsoft data sources including social media platforms, instant messaging platforms, and document collaboration platforms.
Microsoft Business Premium
Microsoft 365 Business Premium is designed for small to medium-sized businesses, offering a comprehensive set of productivity, collaboration, and security tools. It includes the full suite of Microsoft Office apps, along with advanced security and device management features like Microsoft Intune for mobile device management and Azure Active Directory Premium P1 for enhanced identity and access controls. Additionally, it provides Microsoft Defender for Business to protect against cyber threats, and Exchange Online, SharePoint, and OneDrive for seamless communication and collaboration. This plan is ideal for businesses needing productivity tools with strong security and compliance capabilities.
-
Microsoft Defender for Business
• Provides endpoint protection against malware, ransomware, and other sophisticated attacks.
• Delivers attack surface reduction, threat detection, and automated investigation and remediation.
-
Intune (Mobile Device and Application Management)
• Enables device management policies for mobile and desktop devices, enforcing security settings.
• Protects company data by ensuring compliance with security standards, such as requiring encryption or MFA.
• App protection policies to protect access to company data on both managed and unmanaged devices.
-
Microsoft Defender for Office 365 (Plan 1)
• Safeguards email against advanced threats like phishing, malware, and business email compromise.
• Safe Links and Safe Attachments features to detect malicious URLs and attachments in emails.
-
Conditional Access and Identity Protection
• Sensitivity labels for files, emails, and data, ensuring that content is protected based on classification.
• Integration with Office apps (Word, Excel, PowerPoint, Outlook) to apply security policies automatically
-
Office 365 Message Encryption
• Scans attachments and URLs in emails to detect malicious content before it reaches users.
-
Advanced Auditing and Logging
• Enhanced auditing capabilities for detecting unusual user activities and ensuring compliance.
• Provides extended retention of audit logs for investigations or regulatory purposes.
-
Azure Active Directory Premium P1
• Multi-factor authentication (MFA) for enhanced identity protection.
• Conditional Access to manage and control access to company data based on user location, device health, and other risk factors.
-
Information Protection
• Azure Information Protection allows for classifying and labeling documents and emails, helping secure sensitive data.
• Data Loss Prevention (DLP) policies to monitor and protect sensitive information in emails and files.
-
Exchange Online Protection
• Email filtering to safeguard against spam, malware, and known threats.
• Phishing protection and link scanning for advanced security.
-
Advanced Threat Analytics (ATA)
Provides more granular control over who can access your organisation’s resources based on security requirements.
• Continuous risk assessment for identities in Azure AD, with automated responses to high-risk incidents.
-
Sensitivity Labels
• Ensures that emails can be encrypted and protected based on classification policies and organisational security needs.
-
Secure Score
• Provides an overall security assessment and recommendations on how to improve security settings within Microsoft 365.
Teams
The standalone Microsoft Teams license allows users to access the full suite of collaboration features, including chat, video conferencing, file sharing, and integration with other Microsoft 365 apps.
-
End-to-End Encryption for Meetings (E2EE)
Provides encryption for one-on-one Teams calls, ensuring the communication between participants is secured from endpoint to endpoint.
-
Multi-Factor Authentication (MFA) Support
Requires users to provide additional authentication factors (like SMS, phone calls, or authentication apps) to verify their identity when logging in to Teams.
-
Compliance Recording
Supports compliant call recording, ensuring that voice and video calls, chats, and meetings are recorded and stored according to industry regulations and internal policies.
-
Data Loss Prevention (DLP)
Detects and prevents the sharing of sensitive information (such as social security numbers, credit card numbers, or confidential data) in Teams chat and channels, preventing accidental or intentional data leakage.
-
Sensitivity Labels for Teams and SharePoint Sites
• Allows administrators to apply sensitivity labels to Teams sites and SharePoint sites to control how information is shared and accessed.
• Helps ensure that sensitive conversations and files remain protected and comply with organizational policies.
-
Secure Guest Access
• Controls over guest access, including conditional access policies, to restrict and manage what external users can see and do in Teams.
• Provides options to limit guest capabilities and control sharing and access to sensitive data.
-
Audit Logs and Reporting
Tracks detailed logs of user activity within Teams, including sign-ins, file access, and messaging activities, allowing administrators to monitor potential security issues and maintain compliance.
-
Data Residency and Compliance
• Teams ensures that data remains compliant with data residency requirements by storing information in regional data centers, adhering to local data protection regulations.
-
Data Encryption In-Transit and At-Rest
Encrypts all data (messages, files, calls) while in transit and when stored, providing protection against unauthorised access.
-
Information Barriers
Helps prevent individuals or groups from communicating with each other, useful in maintaining ethical walls or for compliance purposes within organisations with strict data separation requirements (e.g., financial services).
-
Advanced Threat Protection (ATP) for Files Shared in Teams
Automatically scans files shared in Teams for malicious content using Microsoft Defender for Office 365 (Plan 1), detecting and blocking threats like malware or viruses.
-
Retention Policies and eDiscovery
• Provides the ability to set retention policies for messages, chats, and files in Teams to comply with legal and regulatory requirements.
• eDiscovery capabilities for identifying and retrieving information stored in Teams for legal or compliance investigations.
-
Safe Links and Safe Attachments (via Defender for Office 365)
Protects users from malicious URLs and attachments shared within Teams chats or meetings, ensuring a secure collaboration environment.
-
Conditional Access and Identity Protection (via Azure AD)
• Enables control over who can access Teams, based on conditions like location, device health, and user risk, providing an extra layer of protection against unauthorized access.
• Integration with Azure AD for risk-based conditional access policies ensures identity security in the use of Teams.
-
Teams App Security
• Ensures that third-party apps integrated into Teams follow security best practices, with permissions management and access control to avoid unauthorized data access through apps.
Exchange Plan 1
Exchange Online Plan 1 offers a range of essential features for business email and calendar needs, designed for users who require reliable, secure, and efficient email management without the extensive collaboration tools of other Microsoft 365 suites.
-
Mailbox Storage
Each user gets 50 GB of mailbox storage and can send messages up to 150 MB in size.
-
Advanced Security
Built-in anti-malware and anti-spam protection through Exchange Online Protection help secure user mailboxes.
-
In-Place Archive
Users can move old messages automatically to an in-place archive to keep their inbox organized and maintain access to important information.
-
Shared Calendar and Contacts
Facilitates easy scheduling and collaboration through shared calendars, conference room management, and a global address list.
-
eDiscovery and Compliance
Basic eDiscovery capabilities are included for searching through data across Exchange.
-
Outlook Integration
Users have full support for connecting with Outlook on the web, desktop, and mobile apps, offering a familiar and seamless experience.
-
Access from Anywhere
Email, calendar, and contacts are accessible from all major browsers and mobile devices, ensuring productivity across platforms.
-
Focused Inbox
The feature prioritizes important emails, separating them from less critical ones, making inbox management more efficient.
-
Mobile Device Policies
Administrators can manage mobile access, enforce PIN locks, and wipe confidential data from lost or stolen devices.
Exchange Plan 2
Exchange Online Plan 2 is ideal for users with mailboxes exceeding 50 GB, offering 100 GB of mailbox storage and unlimited archiving via In-Place Archive. It also includes advanced compliance features like legal hold and data loss prevention for regulatory protection and sensitive data management.
-
Advanced Data Loss Prevention (DLP)
• Provides the ability to create custom policies that identify and protect sensitive information (such as financial or health data) across email messages and attachments.
• DLP policies can automatically block, report, or encrypt sensitive emails to prevent accidental or malicious data leakage.
-
Microsoft Defender for Office 365 (Plan 1)
• Provides advanced threat protection by scanning emails for malicious attachments and links (Safe Links and Safe Attachments).
• Offers protection against sophisticated threats like phishing, malware, and ransomware.
-
Mailbox Audit Logging
• Provides detailed logging of mailbox activities such as access, changes to permissions, and non-owner access, allowing administrators to track unauthorized or suspicious activity.
• Helps ensure compliance by logging user activity for auditing and reporting purposes.
-
eDiscovery and Content Search
• Enables advanced eDiscovery capabilities for locating, holding, and analyzing email content across the organization for legal or regulatory investigations.
• Content Search allows administrators to query all mailboxes and locate data that matches specific search criteria.
-
Mailbox Size: 100 GB per User
• Each user gets a 100 GB primary mailbox size, which helps accommodate large volumes of email.
• Additional storage is provided through the unlimited archive mailbox.
-
Automatic Updates and Security Patching
Exchange Online ensures that all security patches and updates are automatically applied, reducing vulnerabilities from outdated software.
-
Advanced Threat Intelligence (with Microsoft 365 Security Integration)
Integrates with Microsoft’s Threat Intelligence to proactively identify and remediate potential threats before they impact your environment.
-
Multi-Factor Authentication (MFA) Support
Supports multi-factor authentication for secure access to mailboxes, adding an extra layer of protection to users’ email accounts.
-
SPF, DKIM, and DMARC Support
Helps prevent email spoofing and ensures that emails sent from your domain are authenticated, reducing phishing risks.
-
Admin Role-Based Access Control (RBAC)
Allows administrators to define specific roles and access levels for users within the Exchange environment, ensuring that only authorized personnel can manage sensitive configurations or view confidential data.
-
Exchange Online Protection (EOP)
• Integrated anti-spam and anti-malware filtering to safeguard mailboxes against known threats.
• Phishing protection with real-time link and attachment scanning.
-
Unlimited Archiving (In-Place Archive)
• Offers unlimited mailbox archiving for users, allowing them to store older email outside of their primary mailbox while still being searchable and accessible.
• Helps ensure compliance with industry-specific regulations by retaining and preserving email data.
-
Legal Hold (In-Place Hold)
• Allows administrators to place mailboxes on hold to preserve deleted or modified messages for eDiscovery, ensuring compliance with legal or regulatory requirements.
• Retains all mailbox content, including deleted items and edited emails, for litigation or audit purposes.
-
Retention Policies and Tags
• Allows organizations to create and apply custom retention policies for email, helping them meet compliance requirements related to data retention.
• Retention tags can be applied to individual items or folders, automating email deletion or archiving based on corporate policies.
-
Encryption for Emails (S/MIME and Office 365 Message Encryption)
• Provides encryption options for emails to ensure that sensitive communications are protected both at rest and in transit.
• Office 365 Message Encryption allows users to send encrypted emails to external recipients, even if they are not using Office 365.
-
Transport Layer Security (TLS)
All emails sent between Exchange Online mailboxes are encrypted using TLS, ensuring secure communication over the internet.
-
Shared Mailbox Security Features
Offers the ability to create shared mailboxes without requiring a separate license, while still applying security features such as DLP and encryption to ensure that emails in shared mailboxes are equally protected.
-
Safe Attachments and Safe Links (via Defender for Office 365)
Scans all attachments and links in emails before they reach users to detect malicious content or phishing attempts.
-
Junk Email Filtering and Quarantine
Automatically detects and filters out unwanted or harmful emails, placing them in quarantine for review by administrators or end-users.
E5 Security Add-On
The Microsoft 365 E5 Security Add-On provides advanced security tools like Microsoft Defender for Endpoint, Defender for Office 365 (Plan 2), and Azure Active Directory Premium P2. It enhances threat detection, identity protection, and compliance management across endpoints, emails, and cloud environments, offering comprehensive security for businesses.
-
Microsoft Defender for Endpoint (Plan 2)
• Offers advanced endpoint detection and response (EDR) capabilities, with deep analytics and automated investigation and remediation for endpoint threats.
• Provides detailed vulnerability management, attack surface reduction, and behavior-based detection of sophisticated attacks.
• Centralized dashboard for managing endpoint security across the organization.
-
Microsoft Defender for Office 365 (Plan 2)
• Offers comprehensive email protection, including anti-phishing, anti-malware, and anti-spam filtering with real-time link and attachment scanning (Safe Links, Safe Attachments).
• Includes attack simulation training to help users identify and avoid phishing attacks and other social engineering tactics.
• Provides post-breach investigation, hunting, and response capabilities to trace threats and respond to security incidents.
-
Azure Active Directory Premium P2
• Advanced identity protection with features like Identity Protection, which uses risk-based conditional access to block or enforce MFA for risky sign-ins.
• Privileged Identity Management (PIM) to manage, control, and monitor privileged access to critical resources within Azure AD, ensuring just-in-time and time-bound access for admins.
• Azure AD Conditional Access and Identity Governance, allowing more granular policies based on user, location, and device state for securing access to apps and data.
-
Microsoft Defender for Cloud (formerly Azure Security Center)
• Delivers unified security management and threat protection across your Azure, hybrid, and multi-cloud environments.
• Offers advanced security recommendations, compliance assessments, and threat detection across cloud resources.
• Integration with Microsoft Sentinel for SIEM (Security Information and Event Management) functionality.
-
Advanced Threat Analytics (ATA)
• Detects advanced threats using on-premises behavioral analytics and machine learning, identifying suspicious activities in real time.
• Provides a detailed timeline of an attack, highlighting how it progresses within the network, making it easier to respond to threats effectively.
-
Azure Sentinel Integration (Optional)
• Works with Azure Sentinel for advanced SIEM functionality, providing a holistic view of your security posture across hybrid environments.
• Azure Sentinel helps collect, detect, investigate, and respond to security events in real-time.
-
Communication Compliance
• Monitors communications across Microsoft Teams, Exchange, and other platforms for policy violations (such as harassment, sensitive data leaks, or inappropriate content).
• Helps organizations stay compliant with industry regulations and internal policies by analyzing communication trends and applying machine learning to detect risks.
-
Compliance Score
Offers continuous assessments of an organization’s compliance posture, with scoring to reflect alignment with key regulations and security best practices.
-
Microsoft Defender for Identity
• Detects identity-based threats using AI and machine learning to monitor on-premises Active Directory signals for compromised identities or insider threats.
• Identifies unusual behavior and lateral movement attempts within the network, protecting against credential theft and privilege escalation attacks.
• Integrates with Azure AD to provide additional protection for hybrid environments.
-
Microsoft Cloud App Security (MCAS)
• Delivers Cloud Access Security Broker (CASB) functionality to help monitor, control, and protect cloud apps and services in real-time.
• Detects shadow IT, enabling businesses to discover and manage unauthorized cloud apps being used within the organization.
• Protects sensitive data with DLP policies across cloud services, including monitoring risky activities and suspicious file sharing in real-time.
-
Microsoft Information Protection (MIP) Premium
• Helps protect sensitive data with advanced classification, labeling, and encryption capabilities for files, emails, and other content.
• Includes automatic labeling based on content analysis, helping to ensure sensitive data is properly protected in transit and at rest.
• Integration with Office apps for seamless data protection when sharing or collaborating on documents.
-
Microsoft Sentinel (Optional)
• An advanced, AI-powered SIEM and SOAR (Security Orchestration Automated Response) solution for centralized security monitoring and incident response.
• Collects data from various sources, correlating events and alerts to detect complex attacks, with built-in hunting capabilities and customizable playbooks for automated response.
-
Insider Risk Management
• Helps detect and mitigate potential insider threats by monitoring risky user behavior, including inappropriate file sharing, data exfiltration, and abnormal activities within the organization.
• Enables you to set policies to monitor and respond to risky behaviors based on predefined templates, such as data theft, intellectual property leaks, and sensitive data handling violations.
-
Compliance Manager
• Provides a centralized dashboard for managing compliance across various regulations and standards (e.g., GDPR, HIPAA, and ISO).
• Includes assessment templates to help organizations track and manage their compliance posture, offering recommendations to close gaps.
• Offers audit trails and control implementation guidance for maintaining compliance.
-
Attack Simulation Training
• Enables security teams to run phishing simulations and other social engineering attack tests across the organization to educate users about common attack vectors.
• Provides detailed reporting on user performance in simulations, helping administrators identify areas for improvement.
-
Zero Trust Framework
Integrated with Microsoft’s Zero Trust model, leveraging identity, endpoint, network, and application data to continuously validate access based on real-time risk levels.
Microsoft Priva - Privacy Risk Management
Assess your organization’s privacy posture and proactively find and resolve privacy risks like data hoarding, data transfers, and data oversharing. Process data subject requests and subject rights requests at scale with automated data discovery, conflict detection, in-place review, and secure collaboration. Increase awareness of privacy requirements and risks with privacy training and automated reminders to review and delete obsolete items.
-
Automated Data Discovery and Classification
• Automatic Identification of Personal Data: Automatically scans and identifies personal data (such as names, addresses, and social security numbers) across Microsoft 365 environments, including emails, documents, Teams, SharePoint, and OneDrive.
• Sensitive Information Types: Pre-defined and customizable sensitive information types for automated classification, ensuring personal data is properly identified and managed.
• Data Mapping: Creates a detailed map of where personal data is stored, how it’s processed, and who has access, making it easier to understand and control data flows across the organization.
-
Automated Recommendations and Remediation
Risk Mitigation Actions: Automatically provides recommendations and remediation steps to reduce privacy risks, such as restricting access to personal data, setting up retention policies, or limiting external sharing.
• Configurable Privacy Policies: Organizations can create and customize privacy policies tailored to their specific requirements, ensuring the system flags any deviations from these policies.
• Automated Remediation: Enables automated responses to privacy risks, such as revoking permissions to personal data when it’s overexposed, reducing the chance of accidental data leaks.
-
Privacy Insights Dashboard
• Comprehensive Overview: A centralized dashboard that provides visibility into the organization’s overall privacy health and risk posture, with clear insights into where personal data is stored, how it’s being used, and where potential risks lie.
• Customizable Metrics: Track privacy metrics like data subject types, privacy incidents, high-risk data locations, and the overall number of privacy risks detected and remediated.
• Trend Analysis: Offers historical data and trend analysis to help privacy officers and compliance teams identify recurring issues or data management patterns that need attention.
-
Privacy Incident Reporting
• Incident Detection: Detects and reports potential privacy incidents, such as unauthorized access or sharing of personal data, and provides administrators with detailed logs for investigation.
• Root Cause Analysis: Helps teams identify the root cause of privacy breaches or incidents, including where and how personal data was compromised or mismanaged.
• Incident Resolution Workflow: Enables an automated workflow to resolve privacy incidents, including assigning tasks, tracking remediation efforts, and documenting actions taken for auditing purposes.
-
Third-Party Data Sharing Controls
• External Sharing Monitoring: Tracks and monitors how personal data is shared with external users or partners, ensuring third-party access to sensitive data is controlled and monitored.
• Sharing Restrictions: Automates restrictions on sharing personal data outside the organization, based on data sensitivity or policy requirements, ensuring compliance with contractual or legal obligations when working with third-party entities.
-
Privacy Risk Assessments
• Risk Detection: Continuously assesses privacy risks by detecting oversharing of personal data, identifying data that may be overexposed or shared beyond intended limits (e.g., public sharing, sharing with unauthorized users).
• Data Exposure Alerts: Alerts admins when sensitive personal information is at risk of exposure, enabling them to take immediate action to reduce risks, such as data access violations or data retention issues.
• Data Subject Risk Insights: Provides insights into specific privacy risks affecting data subjects (e.g., customers, employees) based on their personal data exposure within the organization.
-
Data Minimization and Retention
Retention and Deletion Policies: Helps enforce data minimization principles by recommending or automating the deletion of outdated or unnecessary personal data in line with regulatory requirements.
• Lifecycle Management of Personal Data: Ensures personal data is only kept for the required duration, reducing exposure and ensuring compliance with data retention laws.
• Data Subject Request Support: Simplifies compliance with data subject requests by helping organizations locate, review, and process requests for access, correction, or deletion of personal data.
-
Data Subject Request Management
• Efficient Handling of Data Subject Requests (DSRs): Helps organizations efficiently respond to DSRs (e.g., the right to access, rectify, or delete personal data). Streamlines the process by locating all data relevant to a subject’s request across the Microsoft 365 environment.
• Automated Data Collection for DSRs: Automatically gathers relevant personal data from across the organization when a data subject makes a request, making it easier for teams to process and respond within required timelines.
• Audit Trail: Keeps a detailed audit log of all activities related to data subject requests, ensuring organizations can demonstrate compliance with regulatory obligations.
-
Compliance with Privacy Regulations
• Regulatory Compliance Support: Helps organizations stay compliant with privacy laws such as GDPR, CCPA, HIPAA, and other regional and industry-specific regulations by enforcing data protection measures and best practices.
• Built-in Assessments: Offers pre-configured assessments to measure the organization’s alignment with key privacy regulations, providing recommendations to address any gaps.
• Compliance Reporting: Generates reports for regulatory compliance audits, including data flows, risk management activities, DSR handling, and privacy policy adherence.