Did you know: Effective June 1, 2020, Microsoft will automatically enable Microsoft Threat Protection features

Did you know: Effective June 1, 2020, Microsoft will automatically enable Microsoft Threat Protection features when eligible customers visit Microsoft 365 security center. This change will apply to customers with corresponding licenses for one of the following Microsoft 365 security products:

– Microsoft Threat Protection
– Microsoft Defender Advanced Threat Protection
– Office 365 Advanced Threat Protection
– Microsoft Cloud App Security
– Azure Advanced Threat Protection

This also applies to customers with one of the following licenses by June 1, 2020:

– Microsoft 365 E5
– Microsoft 365 E5 Security
– Windows 10 Enterprise E5
– Enterprise Mobility + Security (EMS) E5
– Office 365 E5
– Microsoft Defender Advanced Threat Protection
– Azure Advanced Threat Protection
– Microsoft Cloud App Security
– Office 365 Advanced Threat Protection (Plan 2)

How does this affect you?

Beginning June 1, when you visit the the Microsoft 365 security center you will have access to the Microsoft Threat Protection features.

Microsoft Threat Protection enables coordinated defenses across email, endpoints, identities, and applications. It orchestrates defenses to detect, block, and prevent sophisticated attacks and automatically heal affected assets.

With Microsoft Threat Protection, you get:

– Correlation of security data and alerts across all Microsoft 365 security products into cross-product incidents.
– Automated self-healing for endpoint, mailbox and identities affected by security incidents.
– Centralized data store that enables proactive threat hunting capabilities and behavior-based custom detection rules over email, endpoints and identity data.

If you’d like to schedule a free one hour consultation on Microsoft 365 roadmap planning with someone from our Microsoft 365 roadmap services team please contact us

Share:

Facebook
Twitter
LinkedIn

Contact Us

Name
=
On Key

More Posts

Endpoint Management

How to Prevent a Stryker Attack

The Stryker breach did not happen because of advanced hacking. It happened because one privileged account was enough to take control. A compromised global administrator can: Shut down access Push malicious changes Wipe devices Lock users

Read More »