Did you know: Effective June 1, 2020, Microsoft will automatically enable Microsoft Threat Protection features

Did you know: Effective June 1, 2020, Microsoft will automatically enable Microsoft Threat Protection features when eligible customers visit Microsoft 365 security center. This change will apply to customers with corresponding licenses for one of the following Microsoft 365 security products:

– Microsoft Threat Protection
– Microsoft Defender Advanced Threat Protection
– Office 365 Advanced Threat Protection
– Microsoft Cloud App Security
– Azure Advanced Threat Protection

This also applies to customers with one of the following licenses by June 1, 2020:

– Microsoft 365 E5
– Microsoft 365 E5 Security
– Windows 10 Enterprise E5
– Enterprise Mobility + Security (EMS) E5
– Office 365 E5
– Microsoft Defender Advanced Threat Protection
– Azure Advanced Threat Protection
– Microsoft Cloud App Security
– Office 365 Advanced Threat Protection (Plan 2)

How does this affect you?

Beginning June 1, when you visit the the Microsoft 365 security center you will have access to the Microsoft Threat Protection features.

Microsoft Threat Protection enables coordinated defenses across email, endpoints, identities, and applications. It orchestrates defenses to detect, block, and prevent sophisticated attacks and automatically heal affected assets.

With Microsoft Threat Protection, you get:

– Correlation of security data and alerts across all Microsoft 365 security products into cross-product incidents.
– Automated self-healing for endpoint, mailbox and identities affected by security incidents.
– Centralized data store that enables proactive threat hunting capabilities and behavior-based custom detection rules over email, endpoints and identity data.

If you’d like to schedule a free one hour consultation on Microsoft 365 roadmap planning with someone from our Microsoft 365 roadmap services team please contact us

Share:

Facebook
Twitter
LinkedIn
Picture of Matt Tinney

Matt Tinney

Professional IT executive & business leader having decades of experience with Microsoft technologies delivering modern-day cloud & security solutions.

Contact Us

=
On Key

More Posts

WME Cybersecurity Briefings No. 024
Cyber Security

WME Security Briefing 28 August 2024

GhostWrite Vulnerability in T-Head CPUs Exposes Devices to Unrestricted Access Overview A critical architectural flaw in T-Head’s XuanTie C910 and C920 RISC-V CPUs was uncovered by recent research from the CISPA Helmholtz Center for Information Security. Dubbed GhostWrite, the vulnerability

Click Here to Read Full Article »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=