Microsoft 365

    Securing Microsoft 365 without E3 or E5 Licenses

    Mimecast Incydr now has a Microsoft 365 Email Exfiltration Detector that can protect your investments without the costly E3/E5 licenses.

    Key Points

    • This blog was originally posted on the Aware website, but with the acquisition of Aware by Mimecast, we are ensuring it is also available to visitors to the Mimecast website.
    • Businesses can secure Microsoft 365 email accounts against data leaks with the cost-effective Email Exfiltration Detector, avoiding expensive E3/E5 licensing.
    • Mimecast Incydr offers seamless integration and real-time data protection, reducing security risks without disrupting users or increasing workloads.

    Customers are increasingly looking to protect their Microsoft 365 investments without having to upgrade to E3/E5 licenses. And while you may have been convinced that this was somehow “free” (in case you already live in E3/E5 world), nothing truly is. 

    To access and use Microsoft Insider Risk Management, organizations must have one of the following subscriptions or add-ons:

    • Microsoft 365 E5 subscription (paid or trial version)
    • Microsoft 365 E3 subscription + the Microsoft 365 E5 Compliance add-on
    • Microsoft 365 E3 subscription + the Microsoft 365 E5 Insider Risk Management add-on
    • Microsoft 365 A5 subscription (paid or trial version)
    • Microsoft 365 A3 subscription + the Microsoft 365 A5 Compliance add-on
    • Microsoft 365 A3 subscription + the Microsoft 365 A5 Insider Risk Management add-on

    You get the gist. Costs can spiral, and if you’re one of the lucky few to have invested in E3/E5, maybe you’ve been convinced this is free. And perhaps, leadership (the CFO in particular) is convincing you this is a “no-brainer” yet you know there is a platform beyond Microsoft you need to think about. Users looking to Microsoft or other Insider Risk Management (IRM) solutions have often been swayed away due to the costs associated with having a Microsoft license that supports “Audit (Premium)”, Microsoft’s cornerstone logging product. The problem is, businesses need IRM and a cost effective way to achieve it. Naturally, the Code42 team got to work and here’s what we came up with.

    A new Microsoft 365 Email Exfiltration Detector that can be used without expensive E3/E5 licensing

    What does this mean? 

    • The new Microsoft 365 Email Exfiltration Detector will only require that customers have a Microsoft 365 License that includes Exchange/Outlook online.
    • Customers who have purchased a Microsoft subscription which includes email accounts hosted in the Microsoft cloud will be eligible.
    • Nearly all customers with OneDrive should be able to take advantage of the Microsoft 365 Email Exfiltration Detector with no additional Microsoft licensing.

    Customers now have a cost effective way to mitigate data leaks through Microsoft 365 corporate email accounts. And of course, you can expect the same level of functionality across the following:

    1. Comprehensive monitoring

    Bring untrusted data risk that occurs over Microsoft 365 into focus with exposure events involving other cloud, endpoint and email exfiltration vectors to quickly detect when files are exfiltrated.


    2. Native integration

    Incydr’s Microsoft 365 Email Exfiltration Detector is tied directly into Microsoft and conducts the file monitoring there. This means that whether emails with attachments are sent from Outlook Web App or a local email client, Code42 will monitor this activity regardless and without complex proxy or network monitoring.


    3. Built to work with Microsoft Advanced

    The Incydr Microsoft 365 Email Exfiltration Detector is available for all Microsoft users that have enabled cloud-based email accounts within Microsoft through Outlook and Exchange.

    Mimecast Incydr’s Approach

    Respond confidently to data theft before damage is done

    Incydr, a data protection solution, allows security teams to detect data theft by monitoring cloud & endpoint exfiltration, and accurately tailor responses to each offense. Let’s work together  to protect IP without disrupting users or causing more work for your security team.

    Subscribe to Cyber Resilience Insights for more articles like these

    Get all the latest news and cybersecurity industry analysis delivered right to your inbox

    Sign up successful

    Thank you for signing up to receive updates from our blog

    We will be in touch!

    Back to Top