| Alert Policies | Y | Y | N | N | N | N | Y | Y |
| Audit Logging | Y | Y | N | N | N | N | Y | Y |
| Bookings | Y | Y | N | N | N | N | Y | Y |
| Data Loss Prevention | Y | Y | N | N | N | N | Y | Y |
| Delve | Y | Y | N | N | N | N | Y | Y |
| eDiscovery | Y | Y | N | N | N | N | Y | Y |
| Exchange Online Plan 2 | Y | Y | N | N | N | N | Y | Y |
| Exchange Online Protection | Y | Y | N | N | N | N | Y | Y |
| InfoPath App | Y | Y | N | N | N | N | Y | Y |
| Information Protection (Office 365) | Y | Y | N | N | N | N | Y | Y |
| Insights by MyAnalytics | Y | Y | N | N | N | N | Y | Y |
| Kaizala Pro (retiring) | Y | Y | N | N | N | | Y | Y |
| Live Events | Y | Y | N | N | N | N | Y | Y |
| Microsoft 365 Apps for Enterprise | Y | Y | N | N | N | N | Y | Y |
| Microsoft Dataverse for Teams | Y | Y | N | N | N | N | Y | Y |
| Microsoft Forms | Y | Y | N | N | N | N | Y | Y |
| Microsoft Lists | Y | Y | N | N | N | N | Y | Y |
| Microsoft Teams | Y | Y | N | N | N | N | Y | Y |
| Microsoft To-Do | Y | Y | N | N | N | N | Y | Y |
| Microsoft Whiteboard | Y | Y | N | N | N | N | Y | Y |
| Office for the Web | Y | Y | N | N | N | N | Y | Y |
| Office Mobile Apps | Y | Y | N | N | N | N | Y | Y |
| OneDrive for Business Plan 2 | Y | Y | N | N | N | N | Y | Y |
| Planner | Y | Y | N | N | N | N | Y | Y |
| Power Apps for Office 365 | Y | Y | N | N | N | N | Y | Y |
| Power Automate for Office 365 | Y | Y | N | N | N | N | Y | Y |
| Power Virtual Agents for Teams | Y | Y | N | N | N | N | Y | Y |
| Retention Policy | Y | Y | N | N | N | N | Y | Y |
| Skype for Business Plan 2 (retiring) | Y | Y | N | N | N | N | Y | Y |
| Stream for Office 365 | Y | Y | N | N | N | N | Y | Y |
| Sway | Y | Y | N | N | N | N | Y | Y |
| Yammer Enterprise | Y | Y | N | N | N | N | Y | Y |
| | | | | | | | |
| Audio Conferencing | N | Y | N | N | N | N | N | Y |
| MyAnalytics (Full) | N | Y | N | N | N | N | N | Y |
| Office 365 Cloud App Security | N | Y | N | N | N | N | N | Y |
| Power BI Pro | N | Y | N | N | N | N | N | Y |
| Phone System | N | Y | N | N | N | N | N | Y |
| Advanced Audit | N | Y | N | N | N | N | N | Y |
| Advanced eDiscovery | N | Y | N | N | N | N | N | Y |
| Comm Compliance | N | Y | N | N | N | N | N | Y |
| Customer Lockbox | N | Y | N | N | N | N | N | Y |
| Information Barriers | N | Y | N | N | N | N | N | Y |
| Privileged Access Management | N | Y | N | N | N | N | N | Y |
| Advanced Message Encryption | N | Y | N | N | N | N | N | Y |
| Customer Key | N | Y | N | N | N | N | N | Y |
| Double Key Encryption | N | Y | N | N | N | N | N | Y |
| Information Governance | N | Y | N | N | N | N | N | Y |
| Records Management | N | Y | N | N | N | N | N | Y |
| Rules-Based Classification (Office 365) | N | Y | N | N | N | N | N | Y |
| Teams Data Loss Prevention | N | Y | N | N | N | N | N | Y |
| Microsoft Defender for Office 365 Plan 2 | | | | | | | | |
| Attack Simulator | N | Y | N | N | N | N | N | Y |
| Automated Investigation & Response | N | Y | N | N | N | N | N | Y |
| Campaign Views | N | Y | N | N | N | N | N | Y |
| Compromised User Detection | N | Y | N | N | N | N | N | Y |
| Threat Explorer | N | Y | N | N | N | N | N | Y |
| Threat Trackers | N | Y | N | N | N | N | N | Y |
| Microsoft Defender for Office 365 Plan 1 | | | | | | | | |
| Safe Links | N | Y | N | N | N | N | Y | Y |
| Safe Attachments | N | Y | N | N | N | N | Y | Y |
| Anti-Phishing | N | Y | N | N | N | N | Y | Y |
| | | | | | | | |
| Active Directory & Azure AD RMS | N | N | Y | Y | N | N | Y | Y |
| Advanced Threat Analytics (retiring) | N | N | Y | Y | N | N | Y | Y |
| Endpoint Analytics | N | N | Y | Y | N | N | Y | Y |
| Information Protection | N | N | Y | Y | N | N | Y | Y |
| Intune MDM & MAM | N | N | Y | Y | N | N | Y | Y |
| Microsoft Endpoint Config Manager | N | N | Y | Y | N | N | Y | Y |
| System Center Endpoint Protection | N | N | Y | Y | N | N | Y | Y |
| Windows Server CAL Rights | N | N | Y | Y | N | N | Y | Y |
| Azure AD Premium Plan 1 | | | | | | | | |
| Advanced Security Reports & Alerts | N | N | Y | Y | N | N | Y | Y |
| App Proxy, including PingAccess | N | N | Y | Y | N | N | Y | Y |
| Azure AD B2B | N | N | Y | Y | N | N | Y | Y |
| Azure AD Connect Health | N | N | Y | Y | N | N | Y | Y |
| Azure AD Password Protection | N | N | Y | Y | N | N | Y | Y |
| Cloud App Discovery | N | N | Y | Y | N | N | Y | Y |
| Conditional Access | N | N | Y | Y | N | N | Y | Y |
| Enterprise State Roaming | N | N | Y | Y | N | N | Y | Y |
| Microsoft Identity Manager | N | N | Y | Y | N | N | Y | Y |
| Multi-Factor Auth (MFA) | N | N | Y | Y | N | N | Y | Y |
| Self-Service Password Reset in AD | N | N | Y | Y | N | N | Y | Y |
| Self-Service Group Management | N | N | Y | Y | N | N | Y | Y |
| Shared Account Password Roll-Over | N | N | Y | Y | N | N | Y | Y |
| Single-Sign- On to other SaaS | N | N | Y | Y | N | N | Y | Y |
| Terms of Use | N | N | Y | Y | N | N | Y | Y |
| 3rd Party MFA Integration | N | N | Y | Y | N | N | Y | Y |
| Rules-Based Classification (AIP Client & Scanner) | N | N | N | Y | N | N | N | Y |
| Microsoft Cloud App Security | N | N | N | Y | N | N | N | Y |
| Microsoft Defender for Identity | N | N | N | Y | N | N | N | Y |
| Azure AD Premium Plan 2 (includes Plan 1 features) | | | | | | | | |
| Access Reviews | N | N | N | Y | N | N | N | Y |
| Azure Identity Protection | N | N | N | Y | N | N | N | Y |
| Entitlement Management | N | N | N | Y | N | N | N | Y |
| Privileged Identity Management | N | N | N | Y | N | N | N | Y |
| Risk-Based Conditional Access | N | N | N | Y | N | N | N | Y |
| Always On VPN | N | N | N | N | Y | Y | Y | Y |
| Application Control | N | N | N | N | Y | Y | Y | Y |
| Application Guard | N | N | N | N | Y | Y | Y | Y |
| AppLocker | N | N | N | N | Y | Y | Y | Y |
| App Assure | N | N | N | N | Y | Y | Y | Y |
| App-V | N | N | N | N | Y | Y | Y | Y |
| Azure AD & Domain Join | N | N | N | N | Y | Y | Y | Y |
| BitLocker & BitLocker to Go | N | N | N | N | Y | Y | Y | Y |
| BranchCache | N | N | N | N | Y | Y | Y | Y |
| Conditional Access | N | N | N | N | Y | Y | Y | Y |
| Cortana | N | N | N | N | Y | Y | Y | Y |
| Credential Guard | N | N | N | N | Y | Y | Y | Y |
| Desktop Analytics | N | N | N | N | Y | Y | Y | Y |
| Device Guard | N | N | N | N | Y | Y | Y | Y |
| DirectAccess | N | N | N | N | Y | Y | Y | Y |
| Edge for Business | N | N | N | N | Y | Y | Y | Y |
| Long Term Servicing Channel | N | N | N | N | Y | Y | Y | Y |
| MDM | N | N | N | N | Y | Y | Y | Y |
| MDOP | N | N | N | N | Y | Y | Y | Y |
| Microsoft Defender Antivirus | N | N | N | N | Y | Y | Y | Y |
| Microsoft Store for Business | N | N | N | N | Y | Y | Y | Y |
| Persistent Memory | N | N | N | N | Y | Y | Y | Y |
| Resilient File System (ReFS) | N | N | N | N | Y | Y | Y | Y |
| SMB Direct | N | N | N | N | Y | Y | Y | Y |
| Unified Write Filter | N | N | N | N | Y | Y | Y | Y |
| Universal Print | N | N | N | N | Y | Y | Y | Y |
| User Experience Virtualisation | N | N | N | N | Y | Y | Y | Y |
| Voice, Pen, Touch, Ink, and Gesture | N | N | N | N | Y | Y | Y | Y |
| Windows Autopilot | N | N | N | N | Y | Y | Y | Y |
| Windows Firewall | N | N | N | N | Y | Y | Y | Y |
| Windows Hello for Business | N | N | N | N | Y | Y | Y | Y |
| Windows Information Protection | N | N | N | N | Y | Y | Y | Y |
| Windows to Go | N | N | N | N | Y | Y | Y | Y |
| Windows Update for Business | N | N | N | N | Y | Y | Y | Y |
| Windows Virtual Desktop | N | N | N | N | Y | Y | Y | Y |
| Microsoft Defender for Endpoint | | | | | | | | |
| Advanced Hunting | N | N | N | N | N | Y | N | Y |
| Automated Investigation & Response | N | N | N | N | N | Y | N | Y |
| Block at First Sight | N | N | N | N | N | Y | N | Y |
| Cloud App Security Integration | N | N | N | N | N | Y | N | Y |
| Defender for Endpoint (Android) | N | N | N | N | N | Y | N | Y |
| Defender for Endpoint (iOS) | N | N | N | N | N | Y | N | Y |
| Endpoint Detection & Response | N | N | N | N | N | Y | N | Y |
| Evaluation Lab | N | N | N | N | N | Y | N | Y |
| Microsoft Threat Experts | N | N | N | N | N | Y | N | Y |
| MIP Integration | N | N | N | N | N | Y | N | Y |
| Tamper Protection | N | N | N | N | N | Y | N | Y |
| Threat Analytics | N | N | N | N | N | Y | N | Y |
| Threat & Vulnerability Management | N | N | N | N | N | Y | N | Y |
| Web Content Filtering | N | N | N | N | N | Y | N | Y |