Reading time:
4 min

9 Ways to Optimize Your M365 E5 License

Twitter
LinkedIn
Facebook

There are many M365 licenses to choose from, with the high-end E5 standing out as the Cadillac of offerings. At $35 a month or $420 annually, an E5 is not cheap. However, if you maximize the value of an E5, it pays for itself rather easily.

Microsoft believes in the value of E5 and has an E5 ROI calculator to prove it. “On average, organizations that implement M365 E5 licenses can achieve an ROI of 123% and a payback of 10 months after they “go live” according to a 2018 Forrester Consulting TEI study,” Microsoft argues.

Getting this kind of payback is not as easy as just buying the license. You must put it to full, productive use. And here, CoreView offers dramatic help. Our value proposition for M365 E5 licenses centers on the following unique capabilities for Microsoft 365. 

Here are nine ways CoreView optimizes M365 E5 license use and provides quicker time-to-value for E5 and G5 licenses.

9 Ways to Optimize Your M365 E5 License

Robust Security

CoreView surfaces Advanced Threat Protection (ATP) Reports for the entire organization. This functionality makes them searchable – by department or user – with one-year retention. And extends the Customer Lockbox functionality to all administrators, internally and externally. For example, the delegation of just shared mailbox creation with a single checkbox.

Advanced Information Protection (AIP)

 Enhanced AIP encryption and DLP actions by surfacing historical actions and alerts based on users, groups, and files. Microsoft protects the files and reports on sharing and access options – CoreView surfaces AIP and combines it with comprehensive views of the user activities and devices.

Threat Intelligence

CoreView maps threat events surfaced by M365 E5 licenses, and then links these events with configuration information. Such as if the user has MFA, what conditional access policies were applied (if any), and which methods are being used to attack accounts. This leads to higher MFA and Conditional Access deployments. And when measures fail, a complete forensic analysis of exactly what happened.

Intelligent Compliance Solutions

Augment Advanced eDiscovery AI searches for emails and files. With reports it shows user actions such as file access, sharing, user creation, password changes, and email forwarding events. Providing you with the complete picture – beyond just relevant content.

Online Meetings

 Reports on meeting activity and includes devices, users, and all Azure AD information. For example, what users are still using Skype for Business, say on an iPhone, to attend and schedule meetings. With that information you can then target those users with specific information on installing Teams on iPhone, and how to schedule meetings on Teams vs. how this was done on Skype.

File Storage and Sharing

Extensive OneDrive reports on activity, sharing, and access, as well as data-driven adoption campaigns. For example, CoreView can bubble up instances like the marketing department sending large attachments through email instead of using OneDrive, and end them OneDrive storage videos to elicit change.

Enterprise Video Service

Targeted adoption campaigns based on data that can incorporate and surface customers’ Stream content, Microsoft content, and partner content. A workflow engine detects new user creation and targets them with information on Exchange Online, Teams, OneDrive, etc., as well as customer-specific information for acceptable use, VPN configuration, and the employee handbook.

Optimize Power BI

This shows what users are viewing and creating views in Power BI, and who is using the software. Currently, M365 shows that some clicked on Power BI, but it cannot show which users are creating the most reports, and who are just reading reports, nor can the native Admin Center show what those Power BI reports are, and how widespread their impact is across the user community.

Enhancing E5 eDiscovery

M365 E5 licenses come with advanced eDiscovery features that are deeply enhanced by CoreView features. In particular, how CoreView can forensically show everything that happened with a file that may be the subject of an eDiscovery investigation.

The CoreView Benefit

CoreView can show that the user accessed a file, copied it locally, and shared it via OneDrive to specific groups of people. CoreView shows the full discovery chain of events that occurred with the asset the organization was looking for. In addition, CoreView can show admin activities, such as creating a user, changing a password, and deleting the user. If an admin deletes a user seven hours after created them, it could raise flags.

Sharing a file anonymously on OneDrive could also raise eyebrows. With CoreView, IT knows who accessed that file, the IP address, etc.

In conclusion, M365 E5 licenses surface critical security information and additional voice and video functions. CoreView provides a cost-efficient solution that eases deployment, makes M365 E5 security data actionable, and enhances compliance.

See how CoreView can help you with this

Learn more about securing and optimizing your M365 and other SaaS applications.