Search
Close this search box.
Search
Close this search box.
Search
Close this search box.

Microsoft Defender for Office 365 (Plan 2) Student

Product Attributes: , ,

Cost and Price

Determined by Usage

$1.50

Prices exclude tax (GST, VAT, etc)

Billing Model: ill Ahead
Billing Unit: User
Trial: No
Partner Shell: No
Support: Bill Ahead
Microsoft Defender for Office 365 (Plan 2) Student provides information on security threats using data from various sources that is based on billions of data points from Microsoft global data centers, Office clients, email, user authentications, signals from the Windows and Azure ecosystems and other incidents that impact the Office 365 ecosystem. Microsoft Defender for Office 365 (Plan 2) Student can be used for analyzing the organization’s Office 365 environment to proactively find and eliminate threats. Threat Intelligence appears as a set of tools and dashboards in the Security & Compliance Center to the organization understand and respond to threats.  Faculty/Students  In order to purchase Microsoft education SKUs, customers must meet the qualifications described in the Microsoft Qualified Education User Definition document. There are separate versions for academic customers in the Canada. and Canada.  Administrators can use the Threat dashboard to see threats that have already been handled, and as a handy tool for reporting out to business decision makers on what Threat Intelligence has already done to secure the business.  Businesses investigating or experiencing an attack against their Office 365 environment can use the Threat explorer to analyze threats. Threat explorer shows the volume of attacks over time and enables the analysis of this data by threat families, attacker infrastructure, and more. You can also mark any suspicious email for the Incidents list.  Important Change of Channel Information  Partners who are moving customers and subscriptions from another distributor to Pax8 should review the Pax8 Change of Channel Guide for importing customers and subscriptions.

Features

  • Interactive threat analysis tools
  • Real-time, customizable threat alert notifications
  • Remediation capabilities for suspicious content

Benefits

  • Helps safeguard against threats
  • Bolsters compliance capabilities
  • Provides actionable insights on global attack threats