Are you buying for a business based in EU? Please enter your business VAT number to avail reverse charge. VAT will not be applied at checkout.
Note: VAT will be applicable for businesses based in the Netherlands.
Enable secured and compliant collaboration with data loss prevention policies that help avoid leaks and restrict external sharing of sensitive data. Configure protection and governance labels and locate your sensitive data and understand how it is being used.
Included Partially Included Not included |
Microsoft 365 E5 Information Protection and Governance |
---|---|
Accounts and security
Security comes standard in all Microsoft products. Use these resources to get secure today and protect against future threats.
|
|
Included apps | |
Cloud app Security
Cloud app security discovery provides a comprehensive view into your cloud app usage, enabling you to address Shadow IT. To access the cloud app discovery features go to https://portal.cloudappsecurity.com/ and log in with your Azure AD P1 credentials. Azure AD P2 customers will not need to enter credentials and will be automatically redirected.
|
✓ |
Discovered cloud apps | 16,000+ |
Deployment for discovery analysis | Manual and Automatic log upload |
Log anonymization for user privacy | ✓ |
Access to full Cloud App Catalog | ✓ |
Cloud app risk assessment | ✓ |
Cloud usage analytics per app, user, IP address | ✓ |
Ongoing analytics & reporting | ✓ |
Anomaly detection for discovered apps | ✓ |
Data loss prevention (DLP) support | Cross-SaaS DLP and data sharing control |
App permissions and ability to revoke access | ✓ |
Policy setting and enforcement | ✓ |
Integration with Azure Information Protection | ✓ |
Integration with third party DLP solutions | ✓ |
Anomaly detection and behavioral analytics | Office 365 apps |
Manual and automatic alert remediation | ✓ |
SIEM connector | Office 365 alerts only |
Integration to Microsoft Intelligent Security Graph | ✓ |
Activity policies | ✓ |
Azure Information Protection
Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection-no matter where it's stored or who it's shared with.
|
Plan 2 |
Document classification
Manual, default, and mandatory document classification and consumption of classified documents
|
✓ |
Automated and recommended data classification
Automated and recommended data classification and administrative support for automated rule sets
|
✓ |
Hold your own key (HYOK)
Hold Your Own Key (HYOK) that spans Azure Information Protection and Active Directory (AD) Rights Management for highly regulated scenarios
|
✓ |
Bring your own key (BYOK)
For customer-managed provisioning life cycle. Azure subscription required to use configured key for Bring Your Own Key (BYOK).
|
✓ |
Protection for content in Microsoft services
Including content in Microsoft Exchange Online, Microsoft SharePoint Online, and Microsoft OneDrive for Business.
|
✓ |
On-premises Windows Server file shares content protection
Azure Information Protection connector with on-premises Windows Server file shares by using the File Classification Infrastructure (FCI) connector
|
✓ |
On-premises Exchange and SharePoint content protection
Protection for on-premises Exchange and SharePoint content via Azure Information Protection connector
|
✓ |
On-premises automated classification
Azure Information Protection scanner for automated classification, labeling, and protection of supported on-premises files
|
✓ |
Custom templates
Custom templates, including departmental templates
|
✓ |
Azure Information Protection developer kit
Azure Information Protection software developer kit for all platforms- Windows, Windows Mobile, iOS, Mac OSX, and Android
|
✓ |
Document tracking and revocation | ✓ |
Protection for non-Microsoft Office file formats
Including PTXT, PJPG, and PFILE (generic protection)
|
✓ |
Protected content consumption for policy-aware apps
Azure Information Protection content creation by using work or school accounts
|
✓ |
Protected content creation
Azure Information Protection content creation by using work or school accounts
|
✓ |
Office 365 Message Encryption | ✓ |
Administrative control
Includes activating/deactivating the service, onboarding controls for a phased deployment, usage logging, super user capability for eDiscovery and data recovery, bulk protect/unprotect of files.
|
✓ |