Microsoft 365 Enterprise Licensing
Features | Office 365 E3 | Office 365 E5 | EMS E3 | EMS E5 | Windows 10 E3 | Windows 10 E5 | Microsoft 365 E3 | Microsoft 365 E5 |
---|---|---|---|---|---|---|---|---|
Alert Policies | Y | Y | N | N | N | N | Y | Y |
Audit Logging | Y | Y | N | N | N | N | Y | Y |
Bookings | Y | Y | N | N | N | N | Y | Y |
Data Loss Prevention | Y | Y | N | N | N | N | Y | Y |
Delve | Y | Y | N | N | N | N | Y | Y |
eDiscovery | Y | Y | N | N | N | N | Y | Y |
Exchange Online Plan 2 | Y | Y | N | N | N | N | Y | Y |
Exchange Online Protection | Y | Y | N | N | N | N | Y | Y |
InfoPath App | Y | Y | N | N | N | N | Y | Y |
Information Protection (Office 365) | Y | Y | N | N | N | N | Y | Y |
Insights by MyAnalytics | Y | Y | N | N | N | N | Y | Y |
Kaizala Pro (retiring) | Y | Y | N | N | N | Y | Y | |
Live Events | Y | Y | N | N | N | N | Y | Y |
Microsoft 365 Apps for Enterprise | Y | Y | N | N | N | N | Y | Y |
Microsoft Dataverse for Teams | Y | Y | N | N | N | N | Y | Y |
Microsoft Forms | Y | Y | N | N | N | N | Y | Y |
Microsoft Lists | Y | Y | N | N | N | N | Y | Y |
Microsoft Teams | Y | Y | N | N | N | N | Y | Y |
Microsoft To-Do | Y | Y | N | N | N | N | Y | Y |
Microsoft Whiteboard | Y | Y | N | N | N | N | Y | Y |
Office for the Web | Y | Y | N | N | N | N | Y | Y |
Office Mobile Apps | Y | Y | N | N | N | N | Y | Y |
OneDrive for Business Plan 2 | Y | Y | N | N | N | N | Y | Y |
Planner | Y | Y | N | N | N | N | Y | Y |
Power Apps for Office 365 | Y | Y | N | N | N | N | Y | Y |
Power Automate for Office 365 | Y | Y | N | N | N | N | Y | Y |
Power Virtual Agents for Teams | Y | Y | N | N | N | N | Y | Y |
Retention Policy | Y | Y | N | N | N | N | Y | Y |
Skype for Business Plan 2 (retiring) | Y | Y | N | N | N | N | Y | Y |
Stream for Office 365 | Y | Y | N | N | N | N | Y | Y |
Sway | Y | Y | N | N | N | N | Y | Y |
Yammer Enterprise | Y | Y | N | N | N | N | Y | Y |
Audio Conferencing | N | Y | N | N | N | N | N | Y |
MyAnalytics (Full) | N | Y | N | N | N | N | N | Y |
Office 365 Cloud App Security | N | Y | N | N | N | N | N | Y |
Power BI Pro | N | Y | N | N | N | N | N | Y |
Phone System | N | Y | N | N | N | N | N | Y |
Advanced Audit | N | Y | N | N | N | N | N | Y |
Advanced eDiscovery | N | Y | N | N | N | N | N | Y |
Comm Compliance | N | Y | N | N | N | N | N | Y |
Customer Lockbox | N | Y | N | N | N | N | N | Y |
Information Barriers | N | Y | N | N | N | N | N | Y |
Privileged Access Management | N | Y | N | N | N | N | N | Y |
Advanced Message Encryption | N | Y | N | N | N | N | N | Y |
Customer Key | N | Y | N | N | N | N | N | Y |
Double Key Encryption | N | Y | N | N | N | N | N | Y |
Information Governance | N | Y | N | N | N | N | N | Y |
Records Management | N | Y | N | N | N | N | N | Y |
Rules-Based Classification (Office 365) | N | Y | N | N | N | N | N | Y |
Teams Data Loss Prevention | N | Y | N | N | N | N | N | Y |
Microsoft Defender for Office 365 Plan 2 | ||||||||
Attack Simulator | N | Y | N | N | N | N | N | Y |
Automated Investigation & Response | N | Y | N | N | N | N | N | Y |
Campaign Views | N | Y | N | N | N | N | N | Y |
Compromised User Detection | N | Y | N | N | N | N | N | Y |
Threat Explorer | N | Y | N | N | N | N | N | Y |
Threat Trackers | N | Y | N | N | N | N | N | Y |
Microsoft Defender for Office 365 Plan 1 | ||||||||
Safe Links | N | Y | N | N | N | N | Y | Y |
Safe Attachments | N | Y | N | N | N | N | Y | Y |
Anti-Phishing | N | Y | N | N | N | N | Y | Y |
Active Directory & Azure AD RMS | N | N | Y | Y | N | N | Y | Y |
Advanced Threat Analytics (retiring) | N | N | Y | Y | N | N | Y | Y |
Endpoint Analytics | N | N | Y | Y | N | N | Y | Y |
Information Protection | N | N | Y | Y | N | N | Y | Y |
Intune MDM & MAM | N | N | Y | Y | N | N | Y | Y |
Microsoft Endpoint Config Manager | N | N | Y | Y | N | N | Y | Y |
System Center Endpoint Protection | N | N | Y | Y | N | N | Y | Y |
Windows Server CAL Rights | N | N | Y | Y | N | N | Y | Y |
Azure AD Premium Plan 1 | ||||||||
Advanced Security Reports & Alerts | N | N | Y | Y | N | N | Y | Y |
App Proxy, including PingAccess | N | N | Y | Y | N | N | Y | Y |
Azure AD B2B | N | N | Y | Y | N | N | Y | Y |
Azure AD Connect Health | N | N | Y | Y | N | N | Y | Y |
Azure AD Password Protection | N | N | Y | Y | N | N | Y | Y |
Cloud App Discovery | N | N | Y | Y | N | N | Y | Y |
Conditional Access | N | N | Y | Y | N | N | Y | Y |
Enterprise State Roaming | N | N | Y | Y | N | N | Y | Y |
Microsoft Identity Manager | N | N | Y | Y | N | N | Y | Y |
Multi-Factor Auth (MFA) | N | N | Y | Y | N | N | Y | Y |
Self-Service Password Reset in AD | N | N | Y | Y | N | N | Y | Y |
Self-Service Group Management | N | N | Y | Y | N | N | Y | Y |
Shared Account Password Roll-Over | N | N | Y | Y | N | N | Y | Y |
Single-Sign- On to other SaaS | N | N | Y | Y | N | N | Y | Y |
Terms of Use | N | N | Y | Y | N | N | Y | Y |
3rd Party MFA Integration | N | N | Y | Y | N | N | Y | Y |
Rules-Based Classification (AIP Client & Scanner) | N | N | N | Y | N | N | N | Y |
Microsoft Cloud App Security | N | N | N | Y | N | N | N | Y |
Microsoft Defender for Identity | N | N | N | Y | N | N | N | Y |
Azure AD Premium Plan 2 (includes Plan 1 features) | ||||||||
Access Reviews | N | N | N | Y | N | N | N | Y |
Azure Identity Protection | N | N | N | Y | N | N | N | Y |
Entitlement Management | N | N | N | Y | N | N | N | Y |
Privileged Identity Management | N | N | N | Y | N | N | N | Y |
Risk-Based Conditional Access | N | N | N | Y | N | N | N | Y |
Always On VPN | N | N | N | N | Y | Y | Y | Y |
Application Control | N | N | N | N | Y | Y | Y | Y |
Application Guard | N | N | N | N | Y | Y | Y | Y |
AppLocker | N | N | N | N | Y | Y | Y | Y |
App Assure | N | N | N | N | Y | Y | Y | Y |
App-V | N | N | N | N | Y | Y | Y | Y |
Azure AD & Domain Join | N | N | N | N | Y | Y | Y | Y |
BitLocker & BitLocker to Go | N | N | N | N | Y | Y | Y | Y |
BranchCache | N | N | N | N | Y | Y | Y | Y |
Conditional Access | N | N | N | N | Y | Y | Y | Y |
Cortana | N | N | N | N | Y | Y | Y | Y |
Credential Guard | N | N | N | N | Y | Y | Y | Y |
Desktop Analytics | N | N | N | N | Y | Y | Y | Y |
Device Guard | N | N | N | N | Y | Y | Y | Y |
DirectAccess | N | N | N | N | Y | Y | Y | Y |
Edge for Business | N | N | N | N | Y | Y | Y | Y |
Long Term Servicing Channel | N | N | N | N | Y | Y | Y | Y |
MDM | N | N | N | N | Y | Y | Y | Y |
MDOP | N | N | N | N | Y | Y | Y | Y |
Microsoft Defender Antivirus | N | N | N | N | Y | Y | Y | Y |
Microsoft Store for Business | N | N | N | N | Y | Y | Y | Y |
Persistent Memory | N | N | N | N | Y | Y | Y | Y |
Resilient File System (ReFS) | N | N | N | N | Y | Y | Y | Y |
SMB Direct | N | N | N | N | Y | Y | Y | Y |
Unified Write Filter | N | N | N | N | Y | Y | Y | Y |
Universal Print | N | N | N | N | Y | Y | Y | Y |
User Experience Virtualisation | N | N | N | N | Y | Y | Y | Y |
Voice, Pen, Touch, Ink, and Gesture | N | N | N | N | Y | Y | Y | Y |
Windows Autopilot | N | N | N | N | Y | Y | Y | Y |
Windows Firewall | N | N | N | N | Y | Y | Y | Y |
Windows Hello for Business | N | N | N | N | Y | Y | Y | Y |
Windows Information Protection | N | N | N | N | Y | Y | Y | Y |
Windows to Go | N | N | N | N | Y | Y | Y | Y |
Windows Update for Business | N | N | N | N | Y | Y | Y | Y |
Windows Virtual Desktop | N | N | N | N | Y | Y | Y | Y |
Microsoft Defender for Endpoint | ||||||||
Advanced Hunting | N | N | N | N | N | Y | N | Y |
Automated Investigation & Response | N | N | N | N | N | Y | N | Y |
Block at First Sight | N | N | N | N | N | Y | N | Y |
Cloud App Security Integration | N | N | N | N | N | Y | N | Y |
Defender for Endpoint (Android) | N | N | N | N | N | Y | N | Y |
Defender for Endpoint (iOS) | N | N | N | N | N | Y | N | Y |
Endpoint Detection & Response | N | N | N | N | N | Y | N | Y |
Evaluation Lab | N | N | N | N | N | Y | N | Y |
Microsoft Threat Experts | N | N | N | N | N | Y | N | Y |
MIP Integration | N | N | N | N | N | Y | N | Y |
Tamper Protection | N | N | N | N | N | Y | N | Y |
Threat Analytics | N | N | N | N | N | Y | N | Y |
Threat & Vulnerability Management | N | N | N | N | N | Y | N | Y |
Web Content Filtering | N | N | N | N | N | Y | N | Y |