Configuration of user messages about potentially dangerous actions.
Providing users with rights to perform tasks that compliant with demands of the organization security policies only.
Control and management of mobile devices access to data, protection from data loss and protection of electronic mails from spam, phishing and malicious software in attachments.
Email data import from other systems, activation of archived mailboxes and configuration of data storage policies.
Content search and users’ data activity review in any Office 365 services, detection of corporate policy violation.
Review of Office 365 usage: report on user authentication and activities of both users and administrators; device management reports and reports from data loss prevention service.