Updated: August 5, 2024 (August 5, 2024)

  Charts & Illustrations

Decoding the Microsoft 365 E5 Security Suite

My Atlas / Charts & Illustrations

322 wordsTime to read: 2 min
Wes Miller by
Wes Miller

Wes Miller analyzes and writes about Microsoft’s security, identity management, and systems management technologies. Before joining Directions on Microsoft, Wes... more




Component Description Applies To
Microsoft Defender for Endpoint Endpoint detection and response (EDR) Builds on Microsoft Defender Antivirus, and adds additional security mitigations, detection, and some remediation capabilities. Client endpoints
Microsoft Defender for Office
365 P1
Online service that layers on top of Exchange Online Protection and adds an additional protection against unknown attachments or links. Office 365 clients
Microsoft Defender for Office
365 P2
Used to investigate the scope, nature, severity, and origin of attacks and suspicious activity against an organization’s Office 365 hosted services tenancy. Office 365 hosted services
Microsoft Defender for Identity Detects and identifies suspicious user and device activity on an organization’s network indicative of compromised Active Directory user accounts and breaches, as well as patterns indicating various forms of attacks in progress. On-premises Active Directory identities and infrastructure
Microsoft Defender for Cloud
Apps
An online

Atlas Members have full access

Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.

Membership Options

Already have an account? Login Now