
Are you buying for a business based in EU? Please enter your business VAT number to avail reverse charge. VAT will not be applied at checkout.
Note: VAT will be applicable for businesses based in the Netherlands.
A set of intelligent information protection and compliance solutions to protect and govern sensitive data across devices, apps and cloud services, along with integrated tools to assess risks and efficiently respond to regulatory requirements. A Microsoft 365 E3 subscription is a pre-requisite for this plan.
![]() ![]() ![]() |
Microsoft 365 E5 Compliance |
---|---|
Accounts and security
Security comes standard in all Microsoft products. Use these resources to get secure today and protect against future threats.
|
|
![]() |
![]() |
![]() ![]() ![]() Cloud app security discovery provides a comprehensive view into your cloud app usage, enabling you to address Shadow IT. To access the cloud app discovery features go to https://portal.cloudappsecurity.com/ and log in with your Azure
AD P1 credentials. Azure AD P2 customers will not need to enter credentials and will be automatically redirected.
|
✓ |
Discovered cloud apps | Cloud apps with similar functionality to Office 365 |
Deployment for discovery analysis | Manual log upload |
Data loss prevention (DLP) support | Available in Office E3 and above |
App permissions and ability to revoke access | ✓ |
Anomaly detection and behavioral analytics | Office 365 apps |
Manual and automatic alert remediation | ✓ |
SIEM connector | Office 365 alerts only |
Integration to Microsoft Intelligent Security Graph | ✓ |
Activity policies | ✓ |
![]() ![]() ![]() Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection-no
matter where it's stored or who it's shared with.
|
Plan 2 |
Document classification
![]() Manual, default, and mandatory document classification and consumption of classified documents
|
✓ |
Automated and recommended data classification
![]() Automated and recommended data classification and administrative support for automated rule sets
|
✓ |
Hold your own key (HYOK)
![]() Azure Information Protection scanner for automated classification, labeling, and protection of supported on-premises files
|
✓ |
Bring your own key (BYOK)
![]() For customer-managed provisioning life cycle. Azure subscription required to use configured key for Bring Your Own Key (BYOK).
|
✓ |
Protection for content in Microsoft services
![]() Including content in Microsoft Exchange Online, Microsoft SharePoint Online, and Microsoft OneDrive for Business.
|
✓ |
On-premises Windows Server file shares content protection
![]() Azure Information Protection connector with on-premises Windows Server file shares by using the File Classification Infrastructure (FCI) connector
|
✓ |
On-premises Exchange and SharePoint content protection
![]() Protection for on-premises Exchange and SharePoint content via Azure Information Protection connector
|
✓ |
On-premises automated classification
![]() Azure Information Protection scanner for automated classification, labeling, and protection of supported on-premises files
|
✓ |
Custom templates
![]() Custom templates, including departmental templates
|
✓ |
Azure Information Protection developer kit
![]() Azure Information Protection software developer kit for all platforms- Windows, Windows Mobile, iOS, Mac OSX, and Android
|
✓ |
Document tracking and revocation | ✓ |
Protection for non-Microsoft Office file formats
![]() Including PTXT, PJPG, and PFILE (generic protection)
|
✓ |
Protected content consumption for policy-aware apps
![]() Azure Information Protection content creation by using work or school accounts
|
✓ |
Protected content creation
![]() Azure Information Protection content creation by using work or school accounts
|
✓ |
Office 365 Message Encryption | ✓ |
Administrative control
![]() Includes activating/deactivating the service, onboarding controls for a phased deployment, usage logging, super user capability for eDiscovery and data recovery, bulk protect/unprotect of files.
|
✓ |
Customer Lockbox
![]() Control how a Microsoft support engineer accesses your data
|
✓ |
Additional services | |
![]() |
![]() |
eDiscovery
![]() Integrated solutions for data governance, encryption, access control, eDiscovery, and auditing
|
✓ |
Office 365 Privileged Access Management
![]() Use an approval workflow that's scoped to your high-risk tasks within Office 365
|
✓ |