Microsoft Defender for Office 365 (Plan 2) GCC

Cost and Price

Determined by Usage

Prices exclude tax (GST, VAT, etc)

Billing Model: Bill Ahead
Billing Unit:User
Trail:No
Partner Shell:No
Support:Muttii Supported
Microsoft Defender for Office 365 (Plan 2) GCC provides information on security threats using data from various sources that is based on billions of data points from Microsoft global data centers, Office clients, email, user authentications, signals from the Windows and Azure ecosystems and other incidents that impact the Office 365 ecosystem. Microsoft Defender for Office 365 (Plan 2) GCC can be used for analyzing the organization’s Office 365 environment to proactively find and eliminate threats. Threat Intelligence appears as a set of tools and dashboards in the Security & Compliance Center to the organization understand and respond to threats. Microsoft Defender for Office 365 (Plan 2) GCC provides all the functionality of its enterprise counterpart (Microsoft Defender for Office 365 (Plan 2)) but is hosted in a separate, secured environment and adds compliance features like accreditations, personnel screening, and data residency that enable the service to meet the unique needs of US Government customers. State and local government customers that require compliance-level data protection and security can also take advantage of Microsoft Defender for Office 365 (Plan 2) GCC. Eligibility and Validation: Office 365 Government plans are available to (1) qualified government entities, including US federal, state, local, tribal, and territorial government entities, and (2) other entities (subject to validation of eligibility) who handle data subject to government regulations and requirements, where use of Office 365 Government is appropriate to meet these regulations and requirements. Click on the links below for more information about GCC customer Eligibility and Validation. When completing the GCC approval form, please ensure that the customer name on the form is no longer than 50 characters. Administrators can use the Threat dashboard to see threats that have already been handled, and as a handy tool for reporting out to business decision makers on what Threat Intelligence has already done to secure the business. Businesses investigating or experiencing an attack against their Office 365 environment can use the Threat explorer to analyze threats. Threat explorer shows the volume of attacks over time and enables the analysis of this data by threat families, attacker infrastructure, and more. You can also mark any suspicious email for the Incidents list. Important Change of Channel Information Partners who are moving customers and subscriptions from another distributor to Pax8 should review the Pax8 Change of Channel Guide for importing customers and subscriptions.

Features

  • Interactive threat analysis tools
  • Real-time, customizable threat alert notifications
  • Remediation capabilities for suspicious content

Benefits

  • Helps safeguard against threats
  • Bolsters compliance capabilities
  • Provides actionable insights on global attack threats

Subscribe for tips, news and occasional promotional offers