Are you buying for a business based in EU? Please enter your business VAT number to avail reverse charge. VAT will not be applied at checkout.
Note: VAT will be applicable for businesses based in the Netherlands.
A set of intelligent information protection and compliance solutions to protect and govern sensitive data across devices, apps and cloud services, along with integrated tools to assess risks and efficiently respond to regulatory requirements. A Microsoft 365 E3 subscription is a pre-requisite for this plan.
Included Partially Included Not included |
Microsoft 365 E5 Compliance |
---|---|
Accounts and security
Security comes standard in all Microsoft products. Use these resources to get secure today and protect against future threats.
|
|
Included apps | |
Cloud
app Security
Cloud app security discovery provides a comprehensive view into your cloud app usage, enabling you to address Shadow IT. To access the cloud app discovery features go to https://portal.cloudappsecurity.com/ and log in with your Azure
AD P1 credentials. Azure AD P2 customers will not need to enter credentials and will be automatically redirected.
|
✓ |
Discovered cloud apps | Cloud apps with similar functionality to Office 365 |
Deployment for discovery analysis | Manual log upload |
Data loss prevention (DLP) support | Available in Office E3 and above |
App permissions and ability to revoke access | ✓ |
Anomaly detection and behavioral analytics | Office 365 apps |
Manual and automatic alert remediation | ✓ |
SIEM connector | Office 365 alerts only |
Integration to Microsoft Intelligent Security Graph | ✓ |
Activity policies | ✓ |
Azure
Information Protection
Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection-no
matter where it's stored or who it's shared with.
|
Plan 2 |
Document classification
Manual, default, and mandatory document classification and consumption of classified documents
|
✓ |
Automated and recommended data classification
Automated and recommended data classification and administrative support for automated rule sets
|
✓ |
Hold your own key (HYOK)
Azure Information Protection scanner for automated classification, labeling, and protection of supported on-premises files
|
✓ |
Bring your own key (BYOK)
For customer-managed provisioning life cycle. Azure subscription required to use configured key for Bring Your Own Key (BYOK).
|
✓ |
Protection for content in Microsoft services
Including content in Microsoft Exchange Online, Microsoft SharePoint Online, and Microsoft OneDrive for Business.
|
✓ |
On-premises Windows Server file shares content protection
Azure Information Protection connector with on-premises Windows Server file shares by using the File Classification Infrastructure (FCI) connector
|
✓ |
On-premises Exchange and SharePoint content protection
Protection for on-premises Exchange and SharePoint content via Azure Information Protection connector
|
✓ |
On-premises automated classification
Azure Information Protection scanner for automated classification, labeling, and protection of supported on-premises files
|
✓ |
Custom templates
Custom templates, including departmental templates
|
✓ |
Azure Information Protection developer kit
Azure Information Protection software developer kit for all platforms- Windows, Windows Mobile, iOS, Mac OSX, and Android
|
✓ |
Document tracking and revocation | ✓ |
Protection for non-Microsoft Office file formats
Including PTXT, PJPG, and PFILE (generic protection)
|
✓ |
Protected content consumption for policy-aware apps
Azure Information Protection content creation by using work or school accounts
|
✓ |
Protected content creation
Azure Information Protection content creation by using work or school accounts
|
✓ |
Office 365 Message Encryption | ✓ |
Administrative control
Includes activating/deactivating the service, onboarding controls for a phased deployment, usage logging, super user capability for eDiscovery and data recovery, bulk protect/unprotect of files.
|
✓ |
Customer Lockbox
Control how a Microsoft support engineer accesses your data
|
✓ |
Additional services | |
Included apps | |
eDiscovery
Integrated solutions for data governance, encryption, access control, eDiscovery, and auditing
|
✓ |
Office 365 Privileged Access Management
Use an approval workflow that's scoped to your high-risk tasks within Office 365
|
✓ |