Microsoft Defender for Office 365 Plan 1 Is Now in E3: What You Actually Get

Security & Compliance · Microsoft Defender · Email Protection · 2026
Microsoft Defender for Office 365 Plan 1 is being added to Office 365 E3 and Microsoft 365 E3 with the July 2026 pricing update. Here is exactly what you are getting, what it changes in your tenant, and the three things to configure before it is worth anything.
📅 Rolling out from July 2026 — verify tenant availability 🛡️ Safe Links · Safe Attachments · Anti-phishing 📧 Email · Teams · SharePoint · OneDrive

E3 has always had anti-spam, anti-malware, and Exchange Online Protection. What it has not had — until now — is the layer on top of that: the detonation chamber that opens suspicious attachments before they reach users, the time-of-click URL verification that catches links that were clean when they were sent but malicious when clicked, and the anti-phishing intelligence that looks beyond known signatures to detect impersonation and spoofing.

Microsoft is adding Defender for Office 365 Plan 1 to Office 365 E3 and Microsoft 365 E3 as part of the July 2026 licensing update. If you are already on E3 and paying for MDO Plan 1 as a separate add-on, that add-on becomes redundant from July 2026. If you have not had MDO Plan 1, you are getting a meaningful security layer — but only if you configure it.

Getting the licence is not the same as being protected. MDO Plan 1 ships with a Built-in Protection preset that provides a baseline — but it is minimal by design. This article covers what you are actually getting, what is different from Plan 2, what the Built-in Protection baseline does and does not cover, and the configuration you should apply before calling the deployment done.

!
Rollout timing: MDO Plan 1 is being added to O365 E3 and M365 E3 with the July 1, 2026 pricing update. Feature availability in your tenant will depend on Microsoft's rollout schedule — verify in the Microsoft 365 admin center or the MDO service description. Only remove standalone MDO Plan 1 add-ons after you have confirmed the bundled entitlement is active and policies remain assignable in your tenant.
1
URL checks for E1, Business Basic, Business Standard: These plans receive a basic URL check — a separate, simpler addition that is distinct from the full MDO Plan 1 being added to E3.
2
Business Premium already has MDO Plan 1. If your organisation is on Business Premium, nothing changes. MDO Plan 1 has been included in Business Premium for some time — this addition closes the gap between Business Premium and E3 at the enterprise tier.
3
Licence does not equal protection. The Built-in Protection preset activates a minimal baseline automatically. To get meaningful protection — impersonation detection, quarantine policies, custom thresholds — you need to configure Standard or Strict preset security policies, or build custom policies. The configuration section below covers what to do first.

What you are actually getting

MDO Plan 1 adds four distinct protection layers on top of Exchange Online Protection. Each one addresses a threat class that EOP's signature-based scanning does not fully cover.

🔗
Safe Links
URLs in email are rewritten at delivery time. When a user clicks a link, Safe Links checks the destination in real time — including against URLs that were clean when delivered but have since been weaponised. Covers email, Microsoft Teams, and supported Office apps (Word, Excel, PowerPoint, OneNote). QR code protection is also included.
📎
Safe Attachments
Attachments are opened in a cloud sandbox before delivery to the recipient. If the detonation finds malicious behaviour (malware, ransomware, phishing payload), the attachment is blocked or replaced. Adds 1–3 seconds of delivery latency in most cases. Also applies to files in SharePoint, OneDrive, and Teams.
🎭
Advanced anti-phishing
Detection for impersonation attacks — senders pretending to be your executives, your domains, or trusted partners. Uses machine learning models to evaluate message characteristics beyond what signature-based filtering catches. Configurable per user and per domain with impersonation protection rules.
📊
Real-time detections
A simplified version of Threat Explorer available in the Microsoft Defender portal. Shows malware and phishing detections in near real-time for the past 7 days. Allows investigation of specific messages, attachments, and URLs. Plan 2 gets the full Threat Explorer with longer retention and more views.
💡
All four features cover email, Teams, SharePoint, and OneDrive. Safe Links and Safe Attachments extend beyond email to protect files shared in Teams channels and documents stored in SharePoint and OneDrive. This is relevant for organisations where most threat vectors arrive via collaboration tools rather than traditional email attachments.

Plan 1 vs Plan 2 — what you still do not have

MDO Plan 2 (included in M365 E5) builds on Plan 1 with tools aimed at security operations teams. If you are on E3 with the new Plan 1 inclusion, you have the protection layer — you do not have the investigation and response layer.

Capability
EOP (E3 before)
MDO Plan 1 (E3 from July 2026)
MDO Plan 2 (E5)
Anti-spam / anti-malware
Safe Links (email, Teams, Office apps)
NEW
Safe Attachments (email, SharePoint, OneDrive, Teams)
NEW
Advanced anti-phishing (impersonation)
NEW
Real-time detections
NEW
✓ Included, with broader investigation experience in Plan 2
Threat Explorer (extended, all views)
Automated investigation & response (AIR)
Attack simulation training
Advanced hunting (KQL)
Priority account protection

What Built-in Protection does — and does not do

When MDO Plan 1 is provisioned in a tenant, the Built-in Protection preset security policy activates automatically. It applies Safe Links and Safe Attachments protection to all recipients who are not already covered by a Standard, Strict, or custom policy. This is the baseline — it is active without any admin action.

But Built-in Protection is deliberately minimal. It is designed as a safety net for organisations that have not configured anything else, not as a production security posture. Specifically:

  • Built-in Protection does not configure impersonation protection. Impersonation protection for users and domains is part of the anti-phishing policy scope in the Standard and Strict presets — it is not part of the Built-in baseline at all. You must apply a Standard, Strict, or custom anti-phishing policy to get this protection.
  • Built-in Protection does not configure quarantine notification policies. Users will not receive notifications about quarantined messages unless you configure quarantine policies explicitly.
  • Built-in Protection applies to users not covered by other policies. If you apply a Standard or Strict policy to all users, Built-in Protection becomes redundant for those users.
  • Built-in Protection settings cannot be modified. To customise behaviour, you must create a Standard, Strict, or custom policy that overrides it.
💡
The Standard preset is the practical starting point for most E3 organisations. It applies Microsoft-recommended settings for Safe Links, Safe Attachments, and anti-phishing in a single policy. It is designed to balance protection and user experience — it does not produce excessive false positives. Apply it to all users, review quarantine for two weeks, and tune from there.

What to configure after the licence is active

Three things to do immediately. In order of impact.

1
Apply the Standard preset security policy to all users
Microsoft Defender portal (security.microsoft.com) → Email & Collaboration → Policies & Rules → Threat policies → Preset security policies. Enable the Standard protection preset and assign it to all users. This configures Safe Links, Safe Attachments, and anti-phishing in a single action with Microsoft-recommended settings. You can run it in audit mode first to assess impact before enabling enforcement. The Strict preset is available for users who handle sensitive data or are high-value targets (executives, finance, IT admins).
2
Configure impersonation protection for key users and domains
The Standard preset activates anti-phishing, but impersonation protection for specific users (executives, finance) and custom domains requires explicit configuration. In the anti-phishing policy, add your most impersonated users (CEO, CFO, IT admin accounts) under Enable users to protect, and add your domain and any partner domains under Enable domains to protect. This is the most effective defence against Business Email Compromise (BEC) attacks.
3
Configure quarantine policies and notifications
By default, messages quarantined by Safe Attachments or anti-phishing are held silently — users receive no notification. Configure a quarantine policy that sends users periodic notifications about quarantined messages so they can request release of legitimate messages. Navigate to Threat policies → Quarantine policies and review the default policy. Enable quarantine notifications for end users, but keep admin-only access for messages quarantined as malware — users cannot release these regardless of policy, but notifications reduce helpdesk tickets about missing messages.
⚠️
Verify email authentication (SPF, DKIM, DMARC) before enabling anti-phishing. Anti-phishing and impersonation protection work best when outbound email from your domain is correctly authenticated. If SPF, DKIM, or DMARC are misconfigured, legitimate messages may be caught by anti-phishing policies. Verify authentication for every domain you send from before enabling enforcement-mode policies.

What Exchange Online Protection already covers

Understanding what EOP provides — and where it stops — helps you understand the gap that MDO Plan 1 fills. EOP is not basic protection. It is a mature, multi-layer filtering system that handles the overwhelming majority of email threats by volume.

  • Anti-spam: Connection filtering, content filtering, backscatter protection, bulk mail handling. EOP blocks the vast majority of spam before it reaches mailboxes.
  • Anti-malware: Multi-engine signature scanning of email attachments for known malware. Catches known threats — but not zero-day or polymorphic malware that changes signatures to evade detection.
  • Spoof intelligence: Detects spoofed sender domains using DMARC, DKIM, and SPF alignment. Handles the most common spoofing patterns.
  • Zero-hour auto purge (ZAP): Retrospectively removes messages from mailboxes after delivery if they are later identified as spam, phishing, or malware. ZAP for all three categories is part of EOP in organisations with cloud mailboxes. MDO Plan 1 adds stronger pre-delivery and time-of-click protection — not ZAP itself, which is already present.

What EOP does not cover: unknown/zero-day attachment threats (no detonation), time-of-click URL verification, impersonation detection beyond basic spoof checks, and real-time detection reporting. These are the gaps MDO Plan 1 closes.


Bottom line for E3 tenants
1 E3 gets real protection it did not have before. Safe Links, Safe Attachments, and advanced anti-phishing close the gap that EOP alone could not fill — zero-day attachments, weaponised URLs, and impersonation attacks.
2 The Built-in Protection baseline is not enough. It activates automatically but does not configure impersonation protection or quarantine notifications. Left on its own, users are only partially protected.
3 Standard preset + impersonation protection + quarantine policy is the real starting point. These three configuration steps are what turn the licence into actual security. The checklist below covers exactly what to do.

If you already have MDO Plan 1 as a standalone add-on

If your E3 tenant is already protected by a separate MDO Plan 1 add-on licence, verify the following once the bundled version is confirmed active in your tenant:

  • Do not remove the add-on before confirming the bundle is active. The bundled MDO Plan 1 rolls out with the July 2026 pricing update, but tenant provisioning timing may vary. Removing the standalone add-on before the bundle is confirmed active leaves users unprotected.
  • Your existing policies are not affected. Safe Links, Safe Attachments, and anti-phishing policies are tenant-level configurations — they persist regardless of which licence is providing the entitlement. You do not need to reconfigure anything when transitioning from add-on to bundled.
  • Remove the standalone add-on licence after confirming the bundle. Keeping both results in paying for the same capability twice. Verify in the Microsoft 365 admin center that MDO Plan 1 appears as an included feature of E3, then remove the standalone add-on.
💡
If you are also running a third-party email security solution (Proofpoint, Mimecast, or similar) alongside E3, the addition of MDO Plan 1 creates an opportunity to re-evaluate your email security stack. Running both MDO Plan 1 and a third-party gateway in parallel can create policy conflicts and complicate investigation. Review your architecture before enabling MDO enforcement-mode policies if a third-party gateway is still in the path.

Post-activation checklist

  • Confirm MDO Plan 1 is active in the tenantCheck your licence assignment in the Microsoft 365 admin center to confirm the bundled MDO Plan 1 entitlement is active. Then validate in the Microsoft Defender portal (security.microsoft.com) that Defender for Office 365 threat policies are available and assignable. Verify after July 1, 2026 — rollout timing varies by tenant.
  • Apply Standard preset security policy to all usersThreat policies → Preset security policies → Standard protection → assign to all users. This is the single highest-impact configuration action — it activates Safe Links, Safe Attachments, and anti-phishing with recommended settings in one step.
  • Add impersonation protection for executives and key domainsIn the anti-phishing policy, configure protected users (executives, IT admins, finance) and protected domains (your primary domain, partner domains). This is the most targeted defence against BEC attacks.
  • Verify SPF, DKIM, and DMARC for all sending domainsBefore enabling enforcement-mode anti-phishing, confirm email authentication is correctly configured for every domain. Use the Microsoft Defender portal → Email authentication settings, or check with an external DMARC analyser tool.
  • Configure quarantine notifications for end usersThreat policies → Quarantine policies. Enable notifications so users receive alerts about quarantined messages. Keep admin-only access for malware quarantine — users cannot release these, but notifications reduce helpdesk tickets.
  • Run the Configuration Analyzer and review gapsMicrosoft Defender portal → Email & Collaboration → Policies & Rules → Threat policies → Configuration analyzer. This tool compares your current policy settings against Standard and Strict recommendations and lists specific settings that need attention.
  • If you had a standalone MDO Plan 1 add-on — remove it after confirming the bundleDo not remove the standalone add-on until the bundled entitlement is confirmed active. Once confirmed, remove the add-on to avoid double-licensing. Existing policies are not affected by the licence change.
  • If running a third-party email gateway — review your architectureRunning MDO enforcement-mode policies alongside a third-party gateway can create policy conflicts. Review routing, SCL overrides, and advanced delivery policies before enabling MDO in blocking mode.

Get in touch
Questions about configuring MDO Plan 1 in your E3 tenant?
If you are working through the E3 security configuration or evaluating the E3 vs E5 decision for your organisation, get in touch.
Next
Next

Microsoft Purview DLP + Power Automate: Automated Response to Policy Violations