Microsoft Office 365 is a cloud-based service that offers robust security, reliability, and user productivity. Office 365 includes Microsoft Office 2016, Microsoft SharePoint, OneDrive Skype for Business, Microsoft Teams. Office 365 Security & Compliance is designed to help you manage compliance features across Office 365 for your organisation.
- Office 365 Real-Time Co-Authoring (Word, Excel, PowerPoint)
- One Office 365 license covers devices
- Desktop version of Office 2016 Included in Office 365
- Office 365 Includes Rights management, data loss prevention, and encryption
- 50GB email storage Standard in Office 365 Essentials and Premium.
- 1TB storage & sharing Standard in Office 365 Essentials/Premium.
- Dedicated Office 365 Team and Service Desk
- 24/7 Service support for Office 365
- Cost efficiency using Office 365.
- Office 365 offers Rapid Elasticity and scalability.
- Backup and Recovery availabe on Office 365.
- Office 365 Software updates as standard.
- Office 365 Mobility, work from anywhere and with any device.
- Office 365 Collaboration and Sharing included.
- Additional High level Security available on Office 365.
- Office 365 offers the benefits of Operational Expenditure.
£3.80 to £30.50 per user per month
- Education pricing available
GC 11 Enquiries Team
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
5 different options ,
Exchange Online (Plan 1) (Government Pricing)
No Compliance and information protection
No File storage and sharing
No fully installed Office
No Enterprise management
Exchange Online (Plan 2) (Government Pricing)
No File storage and sharing
No fully installed Office
No Enterprise management
Office 365 Enterprise E1 (Government Pricing)
Office 365 Enterprise E3 (Government Pricing)
Office 365 Enterprise E4 (Government Pricing)
Full Detail Visit https://products.office.com/en-gb/government/compare-office-365-government-plans
|System requirements||Stable broadband connectivity|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
24/7 technical support. Average Speed of Answers (ASA) ensures
call and chats will be answered within 120 seconds or less, with an 80
percent success rate of resolving on first contact
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Web|
|Web chat accessibility testing||NA|
|Onsite support||Onsite support|
Billing support is provided in English from 9 AM–5 PM Monday–Friday.
Technical support is provided in English 24 hours a day, 7 days a week.
Unrestricted fast, effective onsite support field service technicians. At £250 for the first hour and £100 thereafter per hour.
|Support available to third parties||Yes|
Onboarding and offboarding
Standard and Premium on-board : Efficiently set up and on-board organization-wide users with guided walk through from a personal advisor, removing technical hurdles and enabling end-users to use the technology immediately.
Migration Services: Easily move data from one environment to another in Office 365, minimizing downtime and data loss while maintaining legacy file structures.
End User Training: Instruct up to 25 remote users on the functionalities of Office 365 through a remote, web-based meeting tool, delivering a far lower cost than hiring external consultants.
|End-of-contract data extraction||Multi tool applications can be use or Microsoft built in tools|
|End-of-contract process||The Agreement shall continue in force indefinitely, subject to termination in accordance with Clause 20 of our agreement|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Mobile Apps offer View, edit, and create documents with the familiar Office interface optimized for mobile phones and tablets.|
|Accessibility standards||None or don’t know|
|Description of accessibility||NA|
|What users can and can't do using the API||
You can create custom solutions that access and interact with all the richness of a user’s Office 365 data—and you can build those solutions across all mobile, web, and desktop platforms. The new Office 365 APIs enable you to provide access to Office 365 data, including their mail, calendars, contacts, files, and folders. All right from within your app itself.
Whether you're building web applications using .NET, PHP, Java, Python, or Ruby on Rails, or creating apps for Windows 8, Universal Apps, iOS, Android, or on another device platform. It's your choice.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||
Admin - Customize the Office 365 theme for your organization
Integration with MS Flow
Users - Change your Office 365 start app, Limited flow integration. IE sync of Dropbox and onedrive
|Independence of resources||Microsoft stored and process your data in various data center around the world which offer agility and prevents over subscribing to any particular region. Microsoft performs any such transfer of Customer Data to any such country and to store and process Customer Data in order to provide the Self-Service Online Services. Microsoft abides by the EU Safe Harbor and the Swiss Safe Harbor frameworks as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of data from the European Union, the European Economic Area, and Switzerland.|
|Service usage metrics||No|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||IngramMicro|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||You export items by creating a .pst file, which is an Outlook Data File that contains your messages and other Outlook items and is saved on your computer. Glemnet will assist with this services in accordance with our Services contract changes|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||PST|
|Data protection between buyer and supplier networks||Other|
|Other protection between networks||Office 365 uses service-side technologies that encrypt customer data at rest and in transit. For customer data at rest, Office 365 uses volume-level and file-level encryption. For customer data in transit, Office 365 uses multiple encryption technologies for communications between datacenters and between clients and servers, such as Transport Layer Security (TLS) and Internet Protocol Security (IPsec). Office 365 also includes customer-managed encryption features. Customer data stored within Office 365 is protected in all configurations. Validation of Microsoft cryptographic policy and its enforcement is independently verified through multiple third-party auditors.|
|Data protection within supplier network||
|Other protection within supplier network||Office 365 uses service-side technologies that encrypt customer data at rest and in transit. For customer data at rest, Office 365 uses volume-level and file-level encryption. For customer data in transit, Office 365 uses multiple encryption technologies for communications between datacenters and between clients and servers, such as Transport Layer Security (TLS) and Internet Protocol Security (IPsec). Office 365 also includes customer-managed encryption features. Customer data stored within Office 365 is protected in all configurations. Validation of Microsoft cryptographic policy and its enforcement is independently verified through multiple third-party auditors.|
Availability and resilience
|Guaranteed availability||99.9% SLA|
|Approach to resilience||https://docs.microsoft.com/en-us/azure/architecture/resiliency/|
Monitoring Office 365 Connectivity
Getting notified of new Office 365 endpoints
If you're managing Office 365 endpoints, you'll want to receive notifications when we publish new endpoints, you can subscribe to our RSS feed using your favorite RSS reader. Here is how to subscribe via Outlook or you can have the RSS feed updates emailed to you.
Use System Center to Monitor Office 365
If you're using Microsoft System Center, you can download the System Center Management Pack for Office 365 to begin monitoring Office 365 today. For more detailed guidance, please see the management pack operations guide or this blog post Office365 Monitoring using System Centre Operations Manager
Monitoring the health of Azure ExpressRoute
If you are connecting to Office 365 using Azure ExpressRoute for Office 365, you'll want to ensure that you're using both the Office 365 Service Health Dashboard as well as the Azure Reducing troubleshooting time with Azure Resource health
Using Azure AD Connect Health with AD FS
If you're using AD FS for Single Sign-On with Office 365, you'll want to begin using Azure AD Connect Health to monitor your AD FS infrastructure.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||https://support.office.com/en-gb/article/Security-and-Compliance-in-Office-365-for-business-Admin-Help-7fe448f7-49bd-4d3e-919d-0a6d1cf675bb?ui=en-US&rs=en-GB&ad=GB|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||https://www.microsoft.com/online/legal/v2/en-us/MOS_PTC_Security_Audit.htm|
|ISO/IEC 27001 accreditation date||https://www.microsoft.com/online/legal/v2/en-us/MOS_PTC_Security_Audit.htm|
|What the ISO/IEC 27001 doesn’t cover||https://www.microsoft.com/online/legal/v2/en-us/MOS_PTC_Security_Audit.htm|
|ISO 28000:2007 certification||Yes|
|Who accredited the ISO 28000:2007||https://www.microsoft.com/online/legal/v2/en-us/MOS_PTC_Security_Audit.htm|
|ISO 28000:2007 accreditation date||Current|
|What the ISO 28000:2007 doesn’t cover||https://www.microsoft.com/online/legal/v2/en-us/MOS_PTC_Security_Audit.htm|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||https://www.microsoft.com/online/legal/v2/en-us/MOS_PTC_Security_Audit.htm|
|Named board-level person responsible for service security||No|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||https://support.office.com/en-gb/article/Data-governance-in-the-Office-365-Security-Compliance-Center-5fe09846-41b6-4168-9c48-2eb491b69dc2?ui=en-US&rs=en-GB&ad=GB|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||https://support.office.com/en-gb/article/Management-tools-for-Office-365-8e715d2a-c20e-492b-a9cb-60f3708f9241?ui=en-US&rs=en-GB&ad=GB|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||https://support.office.com/en-gb/article/Management-tools-for-Office-365-8e715d2a-c20e-492b-a9cb-60f3708f9241?ui=en-US&rs=en-GB&ad=GB|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||https://support.office.com/en-gb/article/Security-and-Compliance-in-Office-365-for-business-Admin-Help-7fe448f7-49bd-4d3e-919d-0a6d1cf675bb?ui=en-US&rs=en-GB&ad=GB|
|Incident management type||Undisclosed|
|Incident management approach||https://support.office.com/en-gb/article/Security-and-Compliance-in-Office-365-for-business-Admin-Help-7fe448f7-49bd-4d3e-919d-0a6d1cf675bb?ui=en-US&rs=en-GB&ad=GB|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£3.80 to £30.50 per user per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
Office 365 trial includes
Installed Office 2016 of Word, Excel, PowerPoint, Outlook, and more.Installation on up to 5 PCs or Macs.
Office mobile apps on up to 5 tablets and 5 phones.
1 TB of OneDrive cloud storage per user, for up to 5 users.
|Link to free trial||https://products.office.com/en-gb/try|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|