| India Information Technology Act Assessment (refer Microsoft Purview) | Audit and Compliance | No | Yes | Yes | Conducting assessments to ensure compliance with the India Information Technology Act. | Annually |
| India DPDPA (refer Microsoft Purview) | Audit and Compliance | No | Yes | Yes | Conducting assessments to ensure compliance with the India Data Protection and Privacy Act (DPDPA). | Annually |
| Daily Review | Threat Protection | Yes | Yes | Yes | Regular monitoring and review of threat protection measures. | Daily |
| Monthly Reports based on the Managed Services Plan | Information Protection | Yes | Yes | Yes | Providing monthly reports on the status and performance of managed services. | Monthly |
| Device Lifecycle Management | Device Management | No | Yes | Yes | Managing the lifecycle of devices, including provisioning, maintenance, and decommissioning. | As Needed |
| Monthly Review and Update “Deployment Status” Sheet using “SecureIT 365 Plan of Action” Template | Audit and Compliance | No | Yes | Yes | Regularly reviewing and updating the deployment status sheet using the SecureIT 365 Plan of Action template. | Monthly |
| Multi-Factor Authentication (MFA) Setup | Identity and Access | Yes | Yes | Yes | Setting up MFA for enhanced security. | One-Time |
| Conditional Access Policies | Identity and Access | No | Yes | Yes | Implementing conditional access policies to enhance security. | As Needed |
| Self-Service Password Reset | Identity and Access | No | Yes | Yes | Enabling self-service password reset for users. | One-Time |
| Identity Protection Policies | Identity and Access | No | Yes | Yes | Setting up identity protection policies. | As Needed |
| Advanced Threat Protection | Threat Protection | No | No | Yes | Enhanced monitoring and response to advanced threats. | Continuous |
| Data Loss Prevention (DLP) Policies | Information Protection | No | No | Yes | Implementing DLP policies to prevent data breaches. | As Needed |
| Advanced Compliance Management | Audit and Compliance | No | No | Yes | Comprehensive compliance management and reporting. | Quarterly |
| Custom Security Policies | Security Management | No | No | Yes | Developing and implementing custom security policies tailored to the customer’s needs. | As Needed |
| Endpoint Detection and Response (EDR) | Threat Protection | No | No | Yes | Continuous monitoring and response to endpoint threats. | Continuous |
| Secure Email Gateway | Email Security | No | Yes | Yes | Protecting against email-based threats such as phishing and malware. | Continuous |
| Mobile Device Management (MDM) | Device Management | No | Yes | Yes | Managing and securing mobile devices used within the organization. | Continuous |
| Backup and Disaster Recovery | Data Protection | No | No | Yes | Ensuring data is backed up and can be recovered in case of a disaster. | Daily/Weekly |
| Security Awareness Training | User Training | No | Yes | Yes | Training users on security best practices and threat awareness. | Quarterly |
| Application Whitelisting | Application Security | No | No | Yes | Allowing only approved applications to run on devices. | As Needed |