Microsoft 365 leicht gemacht - techdata-cloud.de · deal profitability Difficulty differentiating...
Transcript of Microsoft 365 leicht gemacht - techdata-cloud.de · deal profitability Difficulty differentiating...
Microsoft 365 leicht gemacht Alexander Waldhaus, European Technical Solution Manager, Microsoft
Tech Data Europe
Tech Data empfiehlt Original Microsoft® Software
Local Logins /MSA
New PCs bought adhoc
PCs refreshed when dead
Employees using personal mobile devices
IT purchasing decisions
made “on the spot”
What does today look like for your customers?
“Good
enough”
platforms
No
technology
strategy
Legacy
back office
Fragmented
end-point
solutions
What does today look like for you?
Greater effort to maintain
customer base
Race to the bottom pricing impacts
deal profitability
Difficulty differentiating
brand
Cross-platform device management
requirements
Increased security exposure
Custom solutions required for
interoperability
Need to source best of breed
solutions
Increased implementation
and management
complexity Multiple technology vendors servicing
single client
Increasingly complex customer demands
Multiple tech products
Tougher competitive environment
4
Microsoft Vision
5
Microsoft Vision
6
Office 365
Business Premium
Office Applications Word, Excel, PowerPoint, Outlook,
OneNote, Publisher, and Access
Online Services Exchange, OneDrive (1TB), Skype for
Business, SharePoint, Teams
Business Apps Bookings, Outlook Customer Manager
Enhanced Security
Cross-platform
Consistent Security configuration across
Windows 10, Android and iOS devices
Rights Management, Sensitivity labeling
and intelligent Data Loss Prevention tips
Enforced device and documents encryption
Network protection from malware exploits
Remote wipe of business data from
lost or stolen devices
Device Management &
Simplified Admin
Mobile Device Management for Windows
10, Android and iOS with Microsoft Intune
Always up-to-date Office, Windows
and Windows Defender anti virus
Streamlined deployment of PCs
with Windows AutoPilot
Single admin console to setup and
manage users and devices
Auto-installation of Office apps
+ +
Includes upgrade benefits from Windows 7 Professional or Windows 8.1 Pro to Windows 10 Pro at no additional cost
Microsoft 365 Business
Microsoft 365 as basic tool for the MSP approach
7
Microsoft 365
Combination of: Office 365, Enterprise Mobility + Security,
Windows 10
Microsoft 365 Enterprise
Designed for SMB
Office 365 + Windows
Microsoft 365 Business
Microsoft 365 Flavor
8
Features (new in blue) O365 Business
Premium
Microsoft 365
Business
ERP (user/month) $12.50 $20
Get More Done
Collaboration Tools Email, Groups, Teams, Yammer
Online Meetings & HD Conferencing IM, Meetings, Audio & Video Conferencing
Online Document Storage OneDrive for Business
Content Creation Client Office apps on PC, Mac, Android & iOS
Build Your Business
Customer Management Lightweight CRM, Bookings, Listings, Connections
Business and Expense Management Invoicing, MileIQ, Business Center
Safe Guard Your Business
Simplified Device Setup Windows Auto-pilot, Automatic Office Install
Device Management Intune MDM for Windows, MacOS, iOS & Android
Windows Management and Advanced Device Security Enabling management of Win 10 Pro, BitLocker encryption, Upgrade rights to Windows 10 Pro for 7/8.1 Pro licenses
Data Security and Policies Selective data wipe, Azure Information Protection P1+, Intune app protection
Email and Document Security Data Loss Prevention*+, Office 365 ATP+, Exchange Online Archiving, Litigation Hold, eDiscovery
*Data Loss Prevention Features will be available Summer 2018 +Office client support for ATP, DLP, and Information Protection features will be available summer 2018
Comparison of Microsoft 365 Business and Office 365 Business Premium
9
Features (new in blue) Office 365
BP
Microsoft 365
Business
Microsoft 365
E3
Microsoft 365
E5
Estimated retail price per user per month $USD (with annual commitment) $12.50 $20 $32 $57
Maximum number of users 300 300 unlimited unlimited
Office Apps Install Office on up to 5 PCs/Macs + 5 tablets + 5 smartphones per user (Word, Excel, PowerPoint, OneNote,
Access), Office Online Business Business ProPlus ProPlus
Email & Calendar Outlook, Exchange Online 50GB 50GB unlimited unlimited
Chat-based
Workspace, Meetings Microsoft Teams, Skype For Business
File Storage OneDrive for Business 1 TB 1 TB unlimited unlimited
Social, Video, Sites Yammer, SharePoint Online, Planner
Stream
Business Apps Scheduling Apps – Booking, StaffHub
Business Apps – Outlook Customer Manager, MileIQ1 Business center2, Listings2, Connections2, Invoicing2
Threat Protection Microsoft Advanced Threat Analytics, Device Guard, Credential Guard, App Locker, Enterprise Data Protection,
Office 365 Advanced Threat Protection
Windows Defender Advanced Threat Protection
Office 365 Threat Intelligence
Identity & Access
Management
Azure Active Directory - SSPR Cloud Identities, MFA, SSO >10 Apps
Azure Active Directory - Conditional Access, SSPR Hybrid Identities, Cloud App Discovery, AAD Connect Health
Credential Guard and Direct Access
Azure Active Directory Plan 2
Device & App
Management
Microsoft Intune, Windows AutoPilot
Microsoft Desktop Optimization Package, VDA
Information
Protection
Unlimited Exchange Archiving3, Office 365 Data Loss Prevention*, Azure Information Protection Plan 1
Azure Information Protection Plan 2, Microsoft Cloud App Security, O365 Cloud App Security
On-Prem CAL Rights ECAL Suite (Exchange, SharePoint, Skype, Windows, SCCM, Win. Rights Management)
Compliance Litigation Hold, eDiscovery, Compliance Manager, Data Subject Requests
Advanced eDiscovery, Customer Lockbox, Advanced Data Governance
Analytics Power BI Pro, MyAnalytics
Voice PSTN Conferencing, Cloud PBX
[1] Available in US, UK, Canada; [2] Currently in public preview in US, UK, Canada; [3] Unlimited when auto-expanding turned on *Data Loss Prevention Features will be available summer 2018
Detailed comparison of plans
10
AutoPilot and Added Value
What is Windows 10 AutoPilot? The Windows 10 Auto Pilot optimizes the device deployment and represents the next step of evolution of device setup. The goal is, to drop ship every device directly to the end customer, whereas the partner deploys the device remotely within the M365 Backend.
What added value provides Auto Pilot for the reseller? With Microsoft Auto Pilot the reseller is able, to sell device setup as a service. Auto Pilot helps the reseller to optimize the time needed for new devices and defines a standard for deployment scenarios without the need for high priced software solutions.
11
12
AutoPilot Admin View
13
Auto Pilot - Setup
14
Auto Pilot - Setup
15
Auto Pilot - Setup
16
Device Serial Number: Hardware Serial Windows Product ID: Windows Key Hardware Hash: Hardware ID
Auto Pilot – Device CSV File
17
Auto Pilot: Hardware ID auslesen
How to
Boot in “Audit Mode” (STRG+SHIFT+F3) Script Installation und Ausführung Sysprep zu OOBE, Shut down (Out of the Box Experience) Details zu Deployment und Boot Möglichkeiten: https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/boot-windows-to-audit-mode-or-oobe
18
Auto Pilot - Setup
19
*click*
Auto Pilot - Setup
20
Auto Pilot - Setup
21
Disable Privacy Settings
Default features (always on)
Auto Pilot - Setup
22
AutoPilot: User Point of View
23
Auto Pilot – User based deployment
24
Auto Pilot – User based deployment
25
Auto Pilot – User based deployment
26
Auto Pilot – User based deployment
27
Auto Pilot – User based deployment
28
Auto Pilot – User based deployment
29
Auto Pilot – User based deployment
30
Auto Pilot – User based deployment
31
Auto Pilot – User based deployment
32
Auto Pilot – User based deployment
33
Auto Pilot – User based deployment
34
Auto Pilot – User based deployment
35
Auto Pilot – User based deployment
36
Auto Pilot – User based deployment
37
38
GDPR
Security Features
Why Microsoft 365 Enterprise is the Hero SKU right now
Data Policies and Labeling
Identity as the Security Key
Microsoft 365 Enterprise
39
Protect personal data - GDPR
40
Mit dem Ziel, personenbezogene Daten (Informationen) aller zu schützen, müssen Unternehmen (und Regierungen) gleichermaßen wertvolle Zeit und Ressourcen in Ihre Bemühungen investieren: Sie müssen definieren, wie: personenbezogene Daten erlangt, vorgehalten und verarbeitet werden physische und digitale Sicherheitsmaßnahmen ergriffen und unterhalten werden Pflege von notwendigen Dokumentationen im Bezug auf Einwilligung, berechtigtes Interesse, etc. Koordination von sicherer Zerstärung der Daten Risikomanagement Meldung wenn Daten “abhanden” gekommen sind (“Breach”)
41
Mit dem Ziel, personenbezogene Daten (Informationen) aller zu schützen, müssen Unternehmen (und Regierungen) gleichermaßen wertvolle Zeit und Ressourcen in Ihre Bemühungen investieren: Sie müssen definieren, wie: personenbezogene Daten erlangt, vorgehalten und verarbeitet werden
physische und digitale Sicherheitsmaßnahmen ergriffen und
unterhalten werden Pflege von von notwendigen Dokumentationen um Bezug auf Einwilligung, berechtigtes Interesse, etc Koordination von sicherer Zerstärung der Daten Risikomanagement Meldung wenn Daten “abhanden” gekommen sind (“Breach”)
42
Zu 80% besteht GDPR (DSGVO) aus den Formalvorgaben zu beschreiben, wie und warum Daten erlang werden und was wir mit ihn tun, solange wir sie haben. Jedoch sollten alle Security Ausgaben gegen Geschäftsziele und durch notwendigen Schutz gerechtfertigt sein, nichtg aufgrund von juristischer Normen. Es gibt keine Cyber Versicherung die for Verlust von Reputation, oder Pönalen durch Datenlecks schützt. Jeder Security Hersteller der “GDPR Compliance” anbietet, erzählt nicht die komplette Story. GDPR (DSGVO) ist zu80% juristische und prozessuale Arbeit durch den Endkunden, zu 20% “Security” durch den Reseller.
43
a DETECT SENSITIVE INFORMATION
CLOUD & SaaS APPS
MCAS
AIP scanner
Information Protection / Rights Management
44
HIGHLY CONFIDENTIAL
CONFIDENTIAL
GENERAL
PUBLIC
PERSONAL
Business-lead policies & rules;
configured by IT Automatic classification
Policies can be set by IT Admins for automatically
applying classification and protection to data
Recommended classification
Based on the content you’re working on, you can be
prompted with suggested classification
Manual reclassification
You can override a classification and optionally be
required to provide a justification
User-specified classification
Users can choose to apply a sensitivity label to the email
or file they are working on with a single click
CLASSIFY INFORMATION BASED ON SENSITIVITY
Information Protection / Rights Management
45
FINANCE
CONFIDENTIAL
SENSITIVITY LABELS PERSIST WITH THE DOCUMENT
Document labeling – what is it? Metadata written into document files
Travels with the document as it moves
In clear text so that other systems such as a DLP engine
can read it
Used for the purpose of apply a protection action or data
governance action – determined by policy
Can be customized per the organization’s needs
Information Protection / Rights Management
46
Labels are persistent and readable by other systems e.g. DLP engine
Label is metadata written to data
Sensitive data is automatically detected
CLASSIFICATION & LABELING EXAMPLE – SENSITIVE DATA Discover personal data and apply persistent labels
Information Protection / Rights Management
47
Labeling can be end-user driven
or automatically applied
CLASSIFICATION & LABELING EXAMPLE – DATA GOVERNANCE
Information Protection / Rights Management
48
PROTECTION EXAMPLE: DLP POLICY TO LIMIT DOCUMENT SHARING
Policy tips to
warn end users
Restrict or block sharing –
internally or externally
Across Office client applications –
mobile, desktop & tablets
Information Protection / Rights Management
49
Retention
Retain content in sites, mailboxes, and public folders
indefinitely or for a specific duration
In-place
Data remains in its original location in Office 365 and
users can continue to work with their documents or
mail, but a copy of the content as it existed when you
initiated the policy is preserved
Delete data
A retention policy can both retain and then delete data,
or simply delete old data without retaining it
AUTOMATICALLY RETAIN AND DELETE DOCUMENTS IN OFFICE 365 WITH DATA GOVERNANCE
Information Protection / Rights Management
50
User browses
to a website
User runs a
program
Office 365 ATP Email protection
User receives
an email
Opens an
attachment
Clicks on a URL
+
Windows Defender ATP End Point protection
Brute force
an account
Reconnaissance
Lateral
Movement
Domain
Dominance
Azure ATP Identity protection
!
!
!
Exploitation Installation
Command and
Control channel
C:\
51
Microsoft Advanced Threat Protection for Office 365 (Focus Exchange Online)
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230
Identity as the control plane
On-premises
Windows Server Active Directory
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230
Identity as the control plane
On-premises
Windows Server Active Directory
VPN
BYO
SaaS Azure
Cloud
Public cloud
Customers
Partners
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230
Identity as the control plane
On-premises
Windows Server Active Directory
VPN
BYO
Microsoft Azure Active Directory
Azure
Cloud
Public cloud
Customers
Partners
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230
Customers
Azure AD as the control plane
On-premises
Partners
Azure
Cloud
Public cloud
Microsoft Azure Active Directory
BYO
Windows Server Active Directory
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230Microsoft Authenticator
A mobile authenticator application for all platforms
1000s OF APPS, 1 IDENTITY
Converges the existing Azure Authenticator and all consumer Authenticator applications.
MFA for any account, enterprise or consumer and 3rd party : Push Notifications/OTP
Device Registration (workplace join)
SSO to native mobile apps - Certificate-based SSO
Sign in to a device (Windows Hello), app, or website without a password
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230Identity-driven security
CLOUD-POWERED PROTECTION
Conditions
Allow access or
Block access
Actions
Enforce MFA per
user/per app
User, App sensitivity
Device state
Location User
NOTIFICATIONS, ANALYSIS, REMEDIATION, RISK-BASED POLICIES
CLOUD APP DISCOVERY PRIVILEGED IDENTITY MANAGEMENT
MFA
IDENTITY PROTECTION
Risk
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230
How to place Microsoft 365?
Lig
ht B
lue
R0 G
188 B
242
Gre
en
R16 G
124 B
16
Red
R232 G
17 B
35
Mag
en
taR
180 G
0 B
158
Pu
rple
R92 G
45 B
145
Blu
eR
0 G
120 B
215
Teal
R0 G
130 B
114
Yello
wR
255 G
185 B
0
Ora
ng
eR
216 G
59 B
1
Lig
ht Y
ello
wR
255 G
241 B
0Lig
ht O
ran
ge
R255 G
140 B
0Lig
ht M
ag
en
taR
227 G
0 B
140
Lig
ht P
urp
leR
180 G
160 B
255
Lig
ht T
eal
R0 G
178 B
148
Lig
ht G
reen
R186 G
216 B
10
Dark
Red
R168 G
0 B
0D
ark
Mag
en
ta
R92 G
0 B
92
Dark
Pu
rple
R50 G
20 B
90
Mid
Blu
eR
0 G
24 B
143
Dark
Teal
R0 G
75 B
80
Dark
Gre
en
R0 G
75 B
28
Dark
Blu
eR
0 G
32 B
80
Mid
Gra
yR
115 G
115 B
115
Dark
Gra
yR
80 G
80 B
80
Ric
h B
lack
R0 G
0 B
0
Wh
iteR
255 G
255 B
255
Gra
yR
210 G
210 B
210
Lig
ht G
ray
R230 G
230 B
230
Add your services to Microsoft 365 Business
Pro
fita
bili
ty
This page highlights typical services that partners add on to their sales of Microsoft 365 Business.
Review and select the services that are applicable to your offerings and customers.
Microsoft 365 Business Suggested Revenue $20 user/month
One-time project services Typical
Revenue
Typical
Margins
Premium Cloud Roadmap
Development &
Deployment
$35 - $70/ user 35-40%
Advanced IT Security Audits $20 - $30/ user
Basic Initial Setup &
Migration
$35 - $50/ user
Total price for offering all of the
above project services
$90-$150/user
Recurring managed services Typical
Revenue
Typical
Margins
Premium Key business process automation using flow & power apps
Desktop as a service (hosted desktop, virtual workspace, application management)
BI-driven automated dashboards (incidents logged, threats prevented)
Simplified control panels
$25 - $50
user/month
40-50%
Device as a service (hardware support) $75
user/month
Advanced Cyber-attack threat monitoring & prevention (virus, malware, ransomware, phishing, spam)
Endpoint security monitoring and remediation (laptops, PC’s, tablets, mobile phones)
Security protocol compliance monitoring, management, and remediation
Security admin based on remote portal score, and remote portal support
Automated archiving, compliance monitoring and remediation
Corrupt device quarantining and download prevention
BYOD control
Encryption monitoring and remediation
$15 - $25
user/month
Backup and DRaaS $10
user/month
Basic Help desk and remote user support (chat, phone, Skype)
Remote device monitoring and management
Identity & access (AD) monitoring, management and remediation
E-learning (online, self paced)
$10 - $15
user/month;
Total price for offering all of the above managed services $125-$175
user/month
Note: revenue and margins levels are typical for European and North American Partners interviewed, and may vary depending on local market conditions.
60
Q & A