1 |
Seat Capacity |
|
|
2 |
Office Online supports |
Yes |
Yes |
3 |
Fully installed office app supports |
web or mobile |
Desktop Client & Web+Mobile |
4 |
Android, iOS, Windows & smartphone apps |
Supported |
Supported |
5 |
Simplified access management and security |
Yes |
Yes |
6 |
Centrally manage single sign-on across devices, your datacentre, and the cloud. |
Yes |
Yes |
7 |
Multi-factor authentication |
Yes |
Yes |
8 |
Strengthen sign-in authentication with verification options, including phone calls, text messages, or mobile app notifications, and use security monitoring to identify inconsistencies. |
Yes |
Yes |
9 |
Conditional access |
Yes |
Yes |
10 |
Define policies that provide contextual controls at the user, location, device, and app levels to allow, block, or challenge user access. |
Yes |
Yes |
11 |
Advanced security reporting |
Yes |
Yes |
12 |
Monitor suspicious activity with reporting, auditing, and alerts, and mitigate potential security issues using focused recommendations |
Yes |
Yes |
13 |
Windows Server Client Access License (CAL)* |
Yes |
Yes |
14 |
Provide each user access to server functions from multiple devices for a single fee. |
Yes |
Yes |
15 |
Mobile device management |
Yes |
Yes |
16 |
Enroll corporate and personal devices to provision settings, enforce compliance, and protect your corporate data. |
Yes |
Yes |
17 |
Mobile application management |
Yes |
Yes |
18 |
Publish, configure, and update mobile apps on enrolled and unenrolled devices, and secure or remove app-associated corporate data. |
Yes |
Yes |
19 |
Advanced Microsoft Office 365 data protection |
Yes |
Yes |
20 |
Extend management and security capabilities across users, devices, apps, and data, while preserving a rich, productive end-user experience. |
Yes |
Yes |
21 |
Integrated PC management |
Yes |
Yes |
22 |
Centralise management of PCs, laptops, and mobile devices from a single administrative console, and produce detailed hardware and software configuration reporting |
Yes |
Yes |
23 |
Integrated on-premises management |
Yes |
Yes |
24 |
Extend your on-premises management to the cloud from a single console with Microsoft System Center Configuration Manager and Microsoft System Center Endpoint Protection integration for enhanced PC, Mac, Unix/Linux server, and mobile device administration. |
Yes |
Yes |
25 |
Persistent data protection |
Yes |
Yes |
26 |
Encrypt sensitive data and define usage rights for persistent protection regardless of where data is stored or shared. |
Yes |
Yes |
27 |
Document tracking and revocation |
Yes |
Yes |
28 |
Monitor activities on shared data and revoke access in case of unexpected events. |
Yes |
Yes |
29 |
Encryption key management per regulatory needs |
Yes |
Yes |
30 |
Choose default key management options or deploy and manage your own keys to comply with regulations. |
Yes |
Yes |
31 |
Microsoft Advanced Threat Analytics |
Yes |
Yes |
32 |
Detect abnormal behavior in on-premises systems and identify advanced targeted attacks and insider threats before they cause damage. |
Yes |
Yes |
33 |
Risk-based conditional access |
Yes |
Yes |
34 |
Protect apps and critical data in real time using machine learning and the Microsoft Intelligent Security Graph to block access when risk is detected. |
Yes |
Yes |
35 |
Privileged identity management |
Yes |
Yes |
36 |
Provide timely, on-demand administrative access to online services with access-related reporting and alerts. |
Yes |
Yes |
37 |
Intelligent data classification and labeling |
No |
Yes |
38 |
Configure policies to automatically classify and label data based on sensitivity and then apply persistent protection. |
No |
Yes |
39 |
Microsoft Cloud App Security |
No |
Yes |
40 |
Gain visibility, control, and protection for your cloud-based apps, while identifying threats, abnormal usage, and other cloud security issues. |
No |
Yes |