Overview
Editions & Pricing
Overview
Editions & Pricing
 
 

Greater visibility and control over your Office 365 environment


Threat detection

 

Helps you identify high-risk and abnormal usage, and security incidents

Enhanced control

 

Shapes your Office 365 environment leveraging granular controls and security policies

Discovery and insights

 

Get enhanced visibility into your Office 365 usage and shadow IT without installing an endpoint agent


Threat detection

Advanced Security Management enables you to set up anomaly detection policies, so you can be alerted to potential breaches of your network. Anomaly detection works by scanning user activities and evaluating their risk against over 70 different indicators, including sign-in failures, administratoractivityand inactive accounts. For example, you can be alerted to impossible travel scenarios, such as if a user signs in to the service to check their mail from New York and then two minutes later is downloading a document from SharePoint Online in Tokyo.


Enhanced control

Advanced Security Management lets you set up activity policies that can track specific activities. With out-of-the-box templates, IT can easily create policies that flag when someone is downloading an unusually large amount of data, has multiple failed sign-in attempts or signs in from a risky IP address. Policies can also be customized to your environment. Using activity filters, IT can look for the location of a user, device type, IP address or if someone is granted admin rights. Alerts can be created to notify an IT lead immediately via email or text message.


Discovery and insights

Advanced Security Management also provides an app discovery dashboard that allows IT Pros to visualize your organization’s usage of Office 365 and other productivity cloud services, so you can maximize investments in IT-approved solutions. With the ability to discover about 1,000 applications in categories like collaboration, cloud storage,webmailand others, IT can better determine the extent to which shadow IT is occurring in your organization. Advanced Security Management will also give you details about the top apps in each category. For example, you can see how much data is being sent to OneDrive for Business, Box, Dropbox and other cloud storage providers.














Support Options
Phone Support:
Email Support:
Knowledge base URL:
Support Details