Microsoft Defender for Office 365

Advanced email and Teams threat protection

Publisher

Microsoft

Average rating

Deze score is berekend door AI op basis van publiek beschikbare informatie.
4.4 / 5

About this software

Cloud-based email and collaboration threat protection for Microsoft 365 that filters malicious messages, links, attachments, and collaboration content in Teams, SharePoint, and OneDrive. Plan 1 provides prevention features such as Safe Links and Safe Attachments; Plan 2 adds automated investigation and response, advanced hunting, incident management, and attack simulation training. Integrates with the Microsoft Defender XDR portal for unified detection, investigation, and cross-domain hunting across email, endpoints, and identities.

Licenses & prices

Plan 1

Plan 1 delivers core Defender for Office 365 protections, including Safe Links, Safe Attachments, and anti-phishing policies.

Plan 2

Plan 2 adds advanced investigation, automated remediation, threat hunting, and attack simulation to Defender for Office 365.

Defender o365 p1

Defender o365 p1 provides core email protections including anti-phishing, Safe Links, Safe Attachments, and real-time detection.

Defender o365 p2

Defender o365 p2 delivers full Defender for Office 365 capabilities including automated investigation, threat hunting, and attack simulation.

Office 365 advanced threat protect plan 1

Office 365 advanced threat protect plan 1 equals Defender for Office 365 Plan 1 with core anti-phishing and Safe Attachments.

Office 365 advanced threat protect plan 2

Office 365 advanced threat protect plan 2 equals Defender for Office 365 Plan 2 with automated investigation and threat hunting.

Purchase

Microsoft Defender for Office 365

Microsoft Defender for Office 365
In Stock
Delivery: 1 working day
Loading...
€1.83
Free and without obligation

Do you need more information or looking for another license?

Benefits

  • Email protection: Filters phishing, malware, malicious links, and dangerous attachments before delivery.
  • Collaboration coverage: Scans Teams, SharePoint, OneDrive, and Office apps for malicious content.
  • Threat investigation: Provides advanced hunting and Threat Explorer tools for incident analysis and triage.
  • Automated response: Includes automated investigation and remediation workflows in Plan 2.
  • XDR integration: Integrates with Microsoft Defender XDR for cross-domain detection and response.

Available languages

  • English
  • Spanish
  • French
  • German
  • & more supported languages

Support information

  • Documentation: Comprehensive technical documentation and configuration guidance are available on Microsoft Learn.
  • Admin guides: Step-by-step admin and deployment guides explain policy setup, Safe Links, and Safe Attachments configuration.
  • Product blog: Microsoft security blog and Defender updates announce feature changes and transparency notices.
  • Training resources: Official learning paths and trainings for Defender for Office 365 are available on Microsoft Learn.
  • Community forums: Microsoft Tech Community and Q&A forums provide peer discussions and product assistance.

Frequently asked questions

What workloads does Defender for Office 365 protect?
It protects Microsoft 365 email and collaboration workloads, including Exchange Online, Microsoft Teams, SharePoint, and OneDrive, by scanning messages, links, and attachments.
What is the difference between Plan 1 and Plan 2?
Plan 1 focuses on prevention features like Safe Links and Safe Attachments; Plan 2 adds automated investigation and response, advanced hunting, incidents, and attack simulation training.
How does it integrate with Microsoft Defender XDR?
Email and collaboration signals surface in the Microsoft Defender portal to correlate incidents across endpoints, identities, and cloud apps for unified investigations.
Where do administrators manage policies and reports?
Administrators use the Microsoft 365 Defender security portal (security.microsoft.com) to configure policies, view quarantine, run reports, and use Threat Explorer.
Can Defender for Office 365 act after threats are delivered?
Post-delivery actions include URL detonation, removal of malicious items from mailboxes, automated investigations, and remediation when licensed for Plan 2.