Microsoft 365 E5 Compliance

Microsoft 365 E5 Compliance

Regular price
Sale price
Regular price
Sold out
Unit price
Delivery : Within 24 hours of order placement.

Are you buying for a business based in EU? Please enter your business VAT number to avail reverse charge. VAT will not be applied at checkout.

Note: VAT will be applicable for businesses based in the Netherlands.

A set of intelligent information protection and compliance solutions to protect and govern sensitive data across devices, apps and cloud services, along with integrated tools to assess risks and efficiently respond to regulatory requirements. A Microsoft 365 E3 subscription is a pre-requisite for this plan.

Partially Included
Not included
Microsoft 365 E5 Compliance
Accounts and security
Security comes standard in all Microsoft products. Use these resources to get secure today and protect against future threats.
 Included apps
       Cloud app Security 
Cloud app security discovery provides a comprehensive view into your cloud app usage, enabling you to address Shadow IT. To access the cloud app discovery features go to and log in with your Azure AD P1 credentials. Azure AD P2 customers will not need to enter credentials and will be automatically redirected.
        Discovered cloud apps Cloud apps with similar functionality to Office 365
        Deployment for discovery analysis Manual log upload
        Data loss prevention (DLP) support Available in Office E3 and above
        App permissions and ability to revoke access
        Anomaly detection and behavioral analytics Office 365 apps
        Manual and automatic alert remediation
        SIEM connector Office 365 alerts only
        Integration to Microsoft Intelligent Security Graph
        Activity policies
       Azure Information Protection 
Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection-no matter where it's stored or who it's shared with.
Plan 2
        Document classification 
Manual, default, and mandatory document classification and consumption of classified documents
        Automated and recommended data classification 
Automated and recommended data classification and administrative support for automated rule sets
        Hold your own key (HYOK) 
Azure Information Protection scanner for automated classification, labeling, and protection of supported on-premises files
        Bring your own key (BYOK) 
For customer-managed provisioning life cycle. Azure subscription required to use configured key for Bring Your Own Key (BYOK).
        Protection for content in Microsoft services 
Including content in Microsoft Exchange Online, Microsoft SharePoint Online, and Microsoft OneDrive for Business.
        On-premises Windows Server file shares content protection 
Azure Information Protection connector with on-premises Windows Server file shares by using the File Classification Infrastructure (FCI) connector
        On-premises Exchange and SharePoint content protection 
Protection for on-premises Exchange and SharePoint content via Azure Information Protection connector
        On-premises automated classification 
Azure Information Protection scanner for automated classification, labeling, and protection of supported on-premises files
        Custom templates 
Custom templates, including departmental templates
        Azure Information Protection developer kit 
Azure Information Protection software developer kit for all platforms- Windows, Windows Mobile, iOS, Mac OSX, and Android
        Document tracking and revocation
        Protection for non-Microsoft Office file formats 
Including PTXT, PJPG, and PFILE (generic protection)
        Protected content consumption for policy-aware apps 
Azure Information Protection content creation by using work or school accounts
        Protected content creation 
Azure Information Protection content creation by using work or school accounts
        Office 365 Message Encryption
        Administrative control 
Includes activating/deactivating the service, onboarding controls for a phased deployment, usage logging, super user capability for eDiscovery and data recovery, bulk protect/unprotect of files.
     Customer Lockbox 
Control how a Microsoft support engineer accesses your data
Additional services
 Included apps
Integrated solutions for data governance, encryption, access control, eDiscovery, and auditing
     Office 365 Privileged Access Management 
Use an approval workflow that's scoped to your high-risk tasks within Office 365