Visit our online shop now for the full range - www.e365.com.au. Head Office - Suite 2408 Tower 2 Commercial, 5 Lawson Street Southport QLD 4215 Australia. Select Office 365 apps to begin the installation. The 64-bit version is installed by default unless Office detects you already have a 32-bit version of Office (or a stand-alone Office app such as Project or Visio) installed. In this case, the 32-bit version of Office will be installed instead.

-->

Important

The improved Microsoft 365 security center is now available. This new experience brings Defender for Endpoint, Defender for Office 365, Microsoft 365 Defender, and more into the Microsoft 365 security center. Learn what's new.

Important

Microsoft Defender for Office 365 evaluation is in public preview. This preview version is provided without a service level agreement. Certain features might not be supported or might have constrained capabilities.

Conducting a thorough security product evaluation can help give you informed decisions on upgrades and purchases. It helps to try out the security product's capabilities to assess how it can help your security operations team in their daily tasks.

The Microsoft Defender for Office 365 evaluation experience is designed to eliminate the complexities of device and environment configuration so that you can focus on evaluating the capabilities of Microsoft Defender for Office 365. With evaluation mode, all messages sent to Exchange Online mailboxes can be evaluated without pointing MX records to Microsoft. The feature only applies to email protection and not to Office Clients like Word, SharePoint, or Teams.

If you don't already have a license that supports Microsoft Defender for Office 365, you can start a free 30-day evaluation and test the capabilities in the Office 365 Security & Compliance center (https://protection.office.com/homepage). You'll enjoy the quick set-up and you can easily turn it off if necessary.

Note

If you're in the unified Microsoft 365 security portal (security.microsoft.com) you can start a Defender for Office 365 evaluation here: Email & Collaboration > Policies & Rules > Threat Policies > Additional Policies.

How the evaluation works

Defender for Office 365 in evaluation mode creates Defender for Office 365 email policies that log verdicts, such as malware, but don't act on messages. You are not required to change your MX record configuration.

With evaluation mode, Safe Attachments, Safe Links, and mailbox intelligence based impersonation policies are set up on your behalf. All Defender for Office 365 policies are created in non-enforcement mode in the background and are not visible to you.

As part of the setup, evaluation mode also configures Enhanced Filtering for Connectors. It improves filtering accuracy by preserving IP address and sender information, which are otherwise lost when mail passes through an email security gateway (ESG) in front of Defender for Office 365. Enhanced Filtering for Connectors also improves the filtering accuracy for your existing Exchange Online Protection (EOP) anti-spam and anti-phishing policies.

Enabled Enhanced Filtering for Connectors improves filtering accuracy but may alter deliverability for certain messages if you have an ESG in front of Defender for Office 365, and currently do not bypass EOP filtering. The impact is limited to EOP policies; MDO policies setup as part of the evaluation are created in non-enforcement mode. To minimize potential production impact, you can bypass all EOP filtering by creating a transport rule to set the Spam Confidence Level (SCL) to -1. See Use the EAC to create a mail flow rule that sets the SCL of a message for details.

When the evaluation mode is set up, you will have a report updated daily with up to 90 days of data quantifying the messages that would have been blocked if the policies were implemented (for example, delete, send to junk, quarantine). Reports are generated for all Defender for Office 365 and EOP detections. They are aggregated per detection technology (for example, impersonation) and can be filtered by time range. Additionally, message reports can be created on-demand to create custom pivots or to deep dive messages using Threat Explorer.

With the simplified set-up experience, you can focus on: Drivers radisys laptops & desktops.

  • Running the evaluation
  • Getting a detailed report
  • Analyzing the report for action
  • Presenting the evaluation outcome

Before you begin

Licensing

To access the evaluation, you'll need to meet the licensing requirements. Any of the following licenses will work:

  • Microsoft Defender for Office 365 Plan 1
  • Microsoft Defender for Office 365 Plan 2
  • Microsoft 365 E5, Microsoft 365 E5 Security
  • Office 365 E5
Office 365 for students

If you don't have one of those licenses, then you'll need to obtain a trial license.

Trial

To obtain a trial license for Microsoft Defender for Office 365, you need to have the Billing admin role or Global admin role. Request permission from someone that has the Global admin role. Learn about subscriptions and licenses

Once you have the proper role, the recommended path is to obtain a trial license for Microsoft Defender for Office 365 (Plan 2) in the Microsoft 365 admin center by going to Billing > Purchase services. The trial includes a 30-day free trial for 25 licenses. Get a trial for Microsoft Defender for Office 365 (Plan 2).

You'll have a 30-day window with the evaluation to monitor and report on advanced threats. You'll also have the option to buy a paid subscription if you want the full Defender for Office 365 capabilities.

Roles

Exchange Online roles are required to set up Defender for Office 365 in evaluation mode. Assigning a Microsoft 365 compliance or security admin role won't work.

The following roles are needed:

Microsoft office 365
TaskRole (in Exchange Online)
Get a free trial or buy Microsoft Defender for Office 365 (Plan 2)Billing admin role OR Global admin role
Create evaluation policyRemote and Accepted Domains role; Security admin role
Edit evaluation policyRemote and Accepted Domains role; Security admin role
Delete evaluation policyRemote and Accepted Domains role; Security admin role
View evaluation reportSecurity admin role OR Security reader role

Enhanced filtering

Your Exchange Online Protection policies, such as bulk and spam protection, will remain the same. However, the evaluation turns on enhanced filtering for connectors, which may impact your mail flow and Exchange Online Protection policies unless bypassed.

Enhanced filtering for connectors allows tenants to use anti-spoofing protection. Anti-spoofing is not supported if you're using an email security gateway (ESG) without having turned on Enhanced filtering for connectors.

URLs

URLs will be detonated during mail flow. If you don't want specific URLs detonated, manage your list of allowed URLs appropriately. See Manage the Tenant Allow/Block List for details.

URL links in the email message bodies won't wrap, to lessen customer impact.

Email routing

Prepare the corresponding details that you will need to set up how your email is currently routed, including the name of the inbound connector that routes your mail. If you are just using Exchange Online Protection, you won't have a connector. Learn about mail flow and email routing

Supported email routing scenarios include:

  • Third-party partner and/or on-premises service provider: The inbound connector that you want to evaluate uses a third-party provider and/or you're using a solution for email security on-premises.
  • Microsoft Exchange Online Protection only: The tenant that you want to evaluate uses Office 365 for email security and the Mail Exchange (MX) record points to Microsoft.

Email security gateway

If you're using a third-party email security gateway (ESG), you'll need to know the provider's name. If you're using an ESG on-premises or non-supported vendors, you'll need to know the public IP address(es) for the devices.

Supported third-party partners include:

  • Barracuda
  • IronPort
  • Mimecast
  • Proofpoint
  • Sophos
  • Symantec
  • Trend Micro

Scoping

You will be able to scope the evaluation to an inbound connector. If there's no connector configured, then the evaluation scope will allow admins to gather data from any user in your tenant to evaluate Defender for Office 365.

Get started with the evaluation

Find the Microsoft Defender for Office 365 evaluation set-up card in the Office 365 Security & Compliance center (https://protection.office.com/homepage) from three access points:

  • Threat management > Dashboard
  • Threat management > Policy
  • Reports > Dashboard

Setting up the evaluation

Once you start the set-up flow for your evaluation, you'll be given two routing options. Depending on your organization's mail routing setup and evaluation needs, you can select whether you are using a third-party and/or on-premises service provider or only Microsoft Exchange Online.

  • If you are using a third-party partner and/or on-premises service provider, you'll need to select the name of the vendor from the drop-down menu. Provide the other connector-related details.

  • Select Microsoft Exchange Online if the MX record points to Microsoft and you have an Exchange Online mailbox.

Review your settings and edit them if necessary. Then, select Create evaluation. You should get a confirmation message to indicate that your set-up is complete.

Your Microsoft Defender for Office 365 evaluation report is generated once per day. It may take up to 24 hours for the data to populate.

E365

Exchange rules (optional)

If you have an existing gateway, enabling evaluation mode will activate enhanced filtering for connectors. This improves filtering accuracy by altering the incoming sender IP address. This may change the filter verdicts and if you are not bypassing Exchange Online Protection this may alter deliverability for certain messages. In this case you might want to temporarily bypass filtering to analyze impact. To bypass, navigate to the Exchange admin center and create a policy of SCL -1 (if you don't already have one). For details on the rule components and how they work, see Mail flow rules (transport rules) in Exchange Online.

Evaluate capabilities

After the evaluation report has been generated, see how many advanced threat links, advanced threat attachments, and potential impersonations were identified in the emails and collaboration workspaces in your organization.

Once the trial has expired, you can continue to access the report for 90 days. However, it won't collect any more information. If you want to continue using Microsoft Defender for Office 365 after your trial has expired, make sure you buy a paid subscription for Microsoft Defender for Office 365 (Plan 2).

Office 365 Home

You can go to Settings to update your routing or turn off your evaluation at any time. However, you need to go through the same set-up process again should you decide to continue your evaluation after having turned it off.

Provide feedback

Your feedback helps us get better at protecting your environment from advanced attacks. Share your experience and impressions of product capabilities and evaluation results.

Select Give feedback to let us know what you think.

-->

To meet the unique and evolving requirements of the United States Federal, State, Local, and Tribal governments, as well as contractors holding or processing data on behalf of the US Government, Microsoft offers the Office 365 Government GCC environment. Available through multiple channels including Volume Licensing, interested organizations go through a validation process to ensure eligibility before an environment is established. Trials are available to only US Government entities at this time.

Office E 365 Forwarding Email To Text

Engage your account team or preferred partner to learn more or initiate the validation process. Additional information can be found on the Compare Office 365 Government Plans page.

How to use this service description

The Office 365 Government GCC service description is designed to serve as an overlay to the general Office 365 service description. It defines the unique commitments and differences compared to Office 365 for enterprise offerings.

US Government community compliance

Office 365 Government supports the Federal Risk and Authorization Management Program (FedRAMP) accreditation at a High Impact level. FedRAMP artifacts are available for review by customers who are required to comply with FedRAMP. Federal agencies can review these artifacts in support of their review to issue an Authority to Operate (ATO).

Office 365 Government GCC environment screened personnel

Office 365 staff do not have standing access to customer content hosted in Office 365 Government GCC environment. Any staff who requests temporary permission elevation that would grant access to customer content must first have passed the following background checks.

Microsoft personnel screening and background checks1Description
U.S. citizenship
Verification of U.S. citizenship
Employment history check
Verification of seven (7) year employment history
Education verification
Verification of highest degree attained
Social Security Number (SSN) search
Verification that the provided SSN is valid
Criminal history check
A seven (7) year criminal record check for felony and misdemeanor offenses at the state, county, and local level and at the federal level
Office of Foreign Assets Control List (OFAC)
Validation against the Department of Treasury list of groups with whom U.S. persons are not allowed to engage in trade or financial transactions
Bureau of Industry and Security List (BIS)
Validation against the Department of Commerce list of individuals and entities barred from engaging in export activities
Office of Defense Trade Controls Debarred Persons List (DDTC)
Validation against the Department of State list of individuals and entities barred from engaging in export activities related to the defense industry
Fingerprinting Check
Fingerprint background check against FBI databases
CJIS background screening
State-adjudicated review of federal and state criminal history by state CSA appointed authority within each state that has signed up for the Microsoft CJIS IA program

1 Applies only to personnel with temporary or standing access to customer content hosted in Office 365 Government GCC environment.

Office 365 Government GCC and Yammer

Yammer for enterprise is not a component of Office 365 Government, but may be acquired at no cost as a standalone offer for each user licensed for Office 365 Government Plan E1 and E3. This offer is currently limited to customers who purchase Office 365 Government under Enterprise Agreement and Enterprise Subscription Agreements.

Currently, Yammer provides logical separation of customer data at the application layer. However, Yammer does not provide the same data location and data access features as Office 365 Government, does not support FedRAMP accreditation, and is subject to different contract terms from Office 365 services. It is recommended that you review the Yammer service description and privacy terms when assessing the appropriate use of Yammer for your organization. To learn which Office 365 Government plans include Yammer, see Office 365 Government.

If you decide that the use of Yammer is appropriate for your organization as part of your Office 365 Government subscription and you have purchased one of the above-mentioned plans that includes Yammer, under your Enterprise Enrollment, you can request an amendment to enable your Yammer for enterprise subscription.

Outlook 365

Office 365 Government GCC customer support

Office 365 Sign In

Office 365 GCC customer support is provided under the same terms and conditions offered to Worldwide versions of Office 365, including no support agent physical location or citizenship assurances. Office 365 GCC operates in conjunction with Azure Public Cloud, which is supported under the following terms and conditions.

Microsoft reminds you not to share any controlled, sensitive, or confidential information with Support Personnel as part of your Office 365 GCC related support incident, until you confirm their authorization to view or access such data. Microsoft is committed to protecting your privacy. Office 365 GCC Customer Support is not included in the service accreditation boundary and does not provide FedRAMP, SRG, ITAR, IRS 1075, or CJIS data handling and/or compliance assurances.