There are many M365 licenses to choose from, with the high-end E5 standing out as the Cadillac of offerings. At $35 a month or $420 annually, an E5 is not cheap. However, if you maximize the value of an E5, it pays for itself rather easily.
Microsoft believes in the value of E5 and has an E5 ROI calculator to prove it. “On average, organizations that implement M365 E5 licenses can achieve an ROI of 123% and a payback of 10 months after they “go live” according to a 2018 Forrester Consulting TEI study,” Microsoft argues.
Getting this kind of payback is not as easy as just buying the license. You must put it to full, productive use. And here, CoreView offers dramatic help. Our value proposition for M365 E5 licenses centers on the following unique capabilities for Microsoft 365.
Here are nine ways CoreView optimizes M365 E5 license use and provides quicker time-to-value for E5 and G5 licenses.
CoreView surfaces Advanced Threat Protection (ATP) Reports for the entire organization. This functionality makes them searchable – by department or user – with one-year retention. And extends the Customer Lockbox functionality to all administrators, internally and externally. For example, the delegation of just shared mailbox creation with a single checkbox.
Enhanced AIP encryption and DLP actions by surfacing historical actions and alerts based on users, groups, and files. Microsoft protects the files and reports on sharing and access options – CoreView surfaces AIP and combines it with comprehensive views of the user activities and devices.
CoreView maps threat events surfaced by M365 E5 licenses, and then links these events with configuration information. Such as if the user has MFA, what conditional access policies were applied (if any), and which methods are being used to attack accounts. This leads to higher MFA and Conditional Access deployments. And when measures fail, a complete forensic analysis of exactly what happened.
Augment Advanced eDiscovery AI searches for emails and files. With reports, it shows user actions such as file access, sharing, user creation, password changes, and email forwarding events. Providing you with the complete picture – beyond just relevant content.
Reports on meeting activity and includes devices, users, and all Azure AD information. For example, what users are still using Skype for Business, say on an iPhone, to attend and schedule meetings. With that information you can then target those users with specific information on installing Microsoft Teams on iPhone, and how to schedule meetings on Microsoft Teams vs. how this was done on Skype.
Extensive OneDrive reports on activity, sharing, and access, as well as data-driven adoption campaigns. For example, CoreView can bubble up instances like the marketing department sending large attachments through email instead of using OneDrive, and end them OneDrive storage videos to elicit change.
Targeted adoption campaigns based on data that can incorporate and surface customers’ Stream content, Microsoft content, and partner content. A workflow engine detects new user creation and targets them with information on Exchange Online, Microsoft Teams, OneDrive, etc., as well as customer-specific information for acceptable use, VPN configuration, and the employee handbook.
This shows what users are viewing and creating views in Power BI, and who is using the software. Currently, M365 shows that some clicked on Power BI, but it cannot show which users are creating the most reports, and who are just reading reports, nor can the native Admin Center show what those Power BI reports are, and how widespread their impact is across the user community.
M365 E5 licenses come with advanced eDiscovery features that are deeply enhanced by CoreView features. In particular, how CoreView can forensically show everything that happened with a file that may be the subject of an eDiscovery investigation.
CoreView can show that the user accessed a file, copied it locally, and shared it via OneDrive to specific groups of people. CoreView shows the full discovery chain of events that occurred with the asset the organization was looking for. In addition, CoreView can show admin activities, such as creating a user, changing a password, and deleting the user. If an admin deletes a user seven hours after created them, it could raise flags.
Sharing a file anonymously on OneDrive could also raise eyebrows. With CoreView, IT knows who accessed that file, the IP address, etc.
In conclusion, M365 E5 licenses surface critical security information and additional voice and video functions. CoreView provides a cost-efficient solution that eases deployment, makes M365 E5 security data actionable, and enhances compliance.