Did you know: Effective June 1, 2020, Microsoft will automatically enable Microsoft Threat Protection features

Did you know: Effective June 1, 2020, Microsoft will automatically enable Microsoft Threat Protection features when eligible customers visit Microsoft 365 security center. This change will apply to customers with corresponding licenses for one of the following Microsoft 365 security products:

– Microsoft Threat Protection
– Microsoft Defender Advanced Threat Protection
– Office 365 Advanced Threat Protection
– Microsoft Cloud App Security
– Azure Advanced Threat Protection

This also applies to customers with one of the following licenses by June 1, 2020:

– Microsoft 365 E5
– Microsoft 365 E5 Security
– Windows 10 Enterprise E5
– Enterprise Mobility + Security (EMS) E5
– Office 365 E5
– Microsoft Defender Advanced Threat Protection
– Azure Advanced Threat Protection
– Microsoft Cloud App Security
– Office 365 Advanced Threat Protection (Plan 2)

How does this affect you?

Beginning June 1, when you visit the the Microsoft 365 security center you will have access to the Microsoft Threat Protection features.

Microsoft Threat Protection enables coordinated defenses across email, endpoints, identities, and applications. It orchestrates defenses to detect, block, and prevent sophisticated attacks and automatically heal affected assets.

With Microsoft Threat Protection, you get:

– Correlation of security data and alerts across all Microsoft 365 security products into cross-product incidents.
– Automated self-healing for endpoint, mailbox and identities affected by security incidents.
– Centralized data store that enables proactive threat hunting capabilities and behavior-based custom detection rules over email, endpoints and identity data.

If you’d like to schedule a free one hour consultation on Microsoft 365 roadmap planning with someone from our Microsoft 365 roadmap services team please contact us

Share:

Facebook
Twitter
LinkedIn

Contact Us

=
On Key

More Posts

WME Security Briefing 27 May 2024

Kinsing Hacker Group Exploits Docker Vulnerabilities Overview Recent investigations have shown that the hacker group Kinsing is actively exploiting Docker vulnerabilities to gain unauthorized access to systems. The modified hacker group targets misconfigured Docker API ports deployed with cryptocurrency mining malware.

Read More »
WME Cybersecurity Briefings No. 010
Cyber Security

WME Security Briefing 20 May 2024

Advanced Persistent Threats: North Korean Hackers Launch Golang Malware Overview A new malware strain, called Titan Stealer, is currently actively circulating in the threat landscape, targeting a variety of personal data and linked to North Korean state-sponsored cyber espionage

Read More »
WME Cybersecurity Briefings No. 009
Cyber Security

WME Security Briefing 08 May 2024

Exploitable vulnerability in Microsoft Internet Explorer, used to deploy VBA Malware Overview Cybersecurity researchers discovered a severe exploitation targeting a bug that had already been patched in the Microsoft Internet Explorer browser. Their report added that

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=