Skip links

Microsoft 365 Enterprise Plans

Microsoft 365 E3
Microsoft 365 E5
Microsoft 365 Apps
Install Office client apps (Word, Excel, PowerPoint, OneNote, Publisher (PC only), and Access (PC only)) on up to 5 PCs/Macs, 5 tablets, and 5 mobile devices per person.
Office on the web and mobile
Email and calendar
Outlook
Exchange
Microsoft Bookings
Meetings and voice
Microsoft Teams
Phone System, Audio Conferencing
Device and app management
Windows 11 for enterprise
Windows Autopilot, fine-tuned user experience, and Universal Print
Microsoft 365 Admin Center
Microsoft Intune
Microsoft Endpoint Configuration Manager
Social and intranet
SharePoint
Yammer
Microsoft Viva Connections
Files and content
Microsoft OneDrive for work
Microsoft Lists
Microsoft Forms
Microsoft Stream
Sway for Microsoft 365
Work management
Power Apps for Microsoft 365
Power Automate for Microsoft 365
Power Virtual Agents for Teams
Dataverse for Teams
Planner
To Do
Advanced analytics
Viva Insights

Personal insights

Personal insights
Power BI Pro
Identity and access management
Windows Hello, Credential Guard, and Direct Access
Azure Active Directory Premium plan 1
Azure Active Directory Premium plan 2
Threat protection
Microsoft Advanced Threat Analytics
Microsoft Defender Antivirus and Device Guard
Microsoft 365 Defender
Microsoft Defender for Endpoint P1(coming soon)
Microsoft Defender for Endpoint P2
Microsoft Defender for Office 365
Microsoft Defender for Identity
Information protection
Data Loss Prevention for email and files
Windows Information Protection and BitLocker
Azure Information Protection P1
Azure Information Protection P2
Microsoft Defender for Cloud Apps
Security management
Microsoft Secure Score
Microsoft Security and Compliance Center
Compliance management
Manual retention labels, content search, basic audit
Basic org-wide or location-wide retention policies, Teams retention policies, core eDiscovery, litigation hold
Rules-based automatic retention policies, machine learning-based retention, records management
Advanced eDiscovery, advanced audit
Insider Risk Management, communication compliance, information barriers, customer Lockbox, privileged access management
Built-in third-party connections