What Are E3 and E5?
Key Differences Explained Simply
1. Security and Compliance
2. Analytics and Insights
3. Phone System and Calling
4. Cost
Cybersecurity: Why E5 Stands Out
- Data Loss Prevention (DLP) to stop sensitive info from leaking
- Basic email filtering to catch spam and malware
- Sensitivity labels to classify documents
What E5 Adds:
- Microsoft Defender for Office 365: Scans emails, attachments, and links in real time. It blocks phishing, malware, and ransomware before they reach users.
- Defender for Endpoint: Monitors devices for suspicious activity. If someone clicks something they shouldnβt, this helps contain the damage.
- Defender for Identity: Tracks unusual behaviour across your network, like someone trying to access files they shouldnβt.
- Cloud App Security: Keeps an eye on third-party apps connected to your Microsoft environment.
- Insider Risk Management: Detects risky behaviour from employees, whether accidental or intentional.
- Advanced eDiscovery & Audit: Helps legal and compliance teams investigate incidents thoroughly.
- Customer Lockbox: Adds a layer of control; Microsoft canβt access your data without your explicit approval.
Why It Matters:
Feature Comparison Table
Productivity & Collaboration
| Feature | E3 | E5 |
|---|---|---|
| Office apps (Word, Excel, PowerPoint) | β Yes | β Yes |
| Outlook (Email & Calendar) | β Yes | β Yes |
| Microsoft Teams | β Yes | β Yes |
| OneDrive for Business (1TB/user) | β Yes | β Yes |
| SharePoint | β Yes | β Yes |
| Microsoft Loop | β Yes | β Yes |
| Microsoft Forms, Planner, To Do | β Yes | β Yes |
| Microsoft Whiteboard | β Yes | β Yes |
| Microsoft Bookings | β Yes | β Yes |
| Microsoft Stream (on SharePoint) | β Yes | β Yes |
| Viva Connections & Engage | β Basic | β Enhanced |
Security & Identity Protection
| Feature | E3 | E5 |
|---|---|---|
| Multi-Factor Authentication | β Yes | β Yes |
| Azure AD Premium P1 | β Yes | β Yes |
| Azure AD Premium P2 | β No | β Yes |
| Microsoft Defender for Office 365 | β No | β Yes |
| Defender for Endpoint | β No | β Yes |
| Defender for Identity | β No | β Yes |
| Defender for Cloud Apps | β No | β Yes |
| Safe Attachments & Safe Links | β No | β Yes |
| Information Protection (Sensitivity Labels) | β Basic | β Auto-labelling |
| Data Loss Prevention (DLP) | β Basic | β Enhanced |
| Customer Lockbox | β No | β Yes |
| Privileged Access Management | β No | β Yes |
| Insider Risk Management | β No | β Yes |
Compliance & Legal
| Feature | E3 | E5 |
|---|---|---|
| Core eDiscovery | β Yes | β Yes |
| Advanced eDiscovery | β No | β Yes |
| Audit (Standard) | β Yes | β Yes |
| Audit (Advanced, 1-year retention) | β No | β Yes |
| Communication Compliance | β No | β Yes |
| Information Barriers | β No | β Yes |
| Compliance Manager | β Basic | β Full access |
Analytics & Insights
| Feature | E3 | E5 |
|---|---|---|
| Microsoft MyAnalytics | β Yes | β Yes |
| Viva Insights | β Basic | β Enhanced |
| Power BI Pro | β No | β Yes |
Voice & Calling
| Feature | E3 | E5 |
|---|---|---|
| Teams Phone System | β No | β Yes |
| Audio Conferencing | β No | β Yes |
| PSTN Calling (add-on required) | β No | β Optional |
Device & Endpoint Management
| Feature | E3 | E5 |
|---|---|---|
| Microsoft Intune | β Yes | β Yes |
| Windows Autopilot | β Yes | β Yes |
| Endpoint Configuration Manager | β Yes | β Yes |
| Universal Print | β Yes | β Yes |
managed it support articles
Related Blog Articles
Discover more insights to optimise your business with the latest IT trends and best practices. Stay ahead of the curve by learning how to leverage cutting-edge technology for success. Explore expert advice and valuable guidance to navigate the evolving world of IT solutions