Effective January 1, 2024, new Microsoft Frontline Worker licenses are available. The new licenses are:

  • Microsoft Defender for Identity F1
  • Microsoft Defender for Office 365 F1 & F2
  • Microsoft Defender for Endpoint F1 & F2
  • Microsoft Defender for Cloud Apps F1

These changes have been announced in the Product Terms as of January 1, 2024.

 

License Eligibility for Frontline Worker Licenses

These new Frontline Worker licenses may only be assigned to users who satisfy one or more of the following conditions:

  • Uses a primary work device with a single screen smaller than 10.9″
  • Shares their primary work device with other qualifying [Defender for Identity or Defender for Identity Frontline Worker] | [Defender for Office 365 or Defender for Office 365 Frontline Worker] | [Defender for Endpoint or Defender for Endpoint Frontline Worker] | [Defender for Cloud Apps or Defender for Cloud Apps Frontline Worker] licensed users, during or across shifts.
    • Other licensed Microsoft Frontline Worker users must also use the device as their primary work device.
    • Any software or services accessed from the shared device requires the device or users to be assigned a license that includes use of those software or services.

 

Comparing the new Frontline Worker products

Here is a table comparing the four new Defender products for Frontline Workers:

Product Definition Product functions Example use case
Microsoft Defender for Identity A cloud-based security solution that helps you protect your identity infrastructure from advanced threats
  • Detects suspicious activities in the cyberattack kill chain
  • Provides identity security posture assessments and recommendations
  • Enables manual response actions on compromised identities
  • Provides identity security posture assessments and recommendations
  • Integrates with Microsoft Defender XDR for cross-domain visibility
  • Enables manual response actions on compromised identities
Monitor and secure on-premises Active Directory and cloud identities from identity-based attacks
Microsoft Defender for Office 365 A cloud-based email filtering service that helps protect your organization against advanced threats to email and collaboration tools
  • Provides protection from zero-day malware, phishing, and business email compromise
  • Offers Safe Attachments and Safe Links features to block malicious content
  • Applies advanced anti-phishing policies and impersonation protection
  • Offers Safe Attachments and Safe Links features to block malicious content
  • Enables post-breach investigation, hunting, and response, as well as automation and simulation (for Plan 2 only)
  • Applies advanced anti-phishing policies and impersonation protection
Safeguard email and online platforms from cyberattacks and data breaches
Microsoft Defender for Endpoint A security platform for enterprise endpoints that helps you prevent, detect, investigate, and respond to advanced threats
  • Provides next-generation protection with behavioral, heuristic, and real-time antivirus protection
  • Reduces attack surface with features that harden devices, prevent zero-day attacks, and enforce granular control over endpoint access and behavior
  • Supports manual response actions, such as quarantining a file, that your security team can perform on devices or files
  • Reduces attack surface with features that harden devices, prevent zero-day attacks, and enforce granular control over endpoint access and behavior
  • Offers advanced cyberthreat hunting, automation, cyberattack simulation training, and cross-domain XDR capabilities (for Plan 2 only)
  • Supports manual response actions, such as quarantining a file, that your security team can perform on devices or files
Enhance endpoint security and gain visibility into malicious activities across the network
Microsoft Defender for Cloud Apps A cloud access security broker (CASB) solution that helps you discover and control the use of cloud apps in your organization
  • Detects all your cloud services, assigns each a risk ranking, and identifies all the users and third-party apps able to sign in
  • Evaluates discovered apps for more than 90 risk indicators, allowing you to assess your org’s security and compliance posture
  • Applies data loss prevention (DLP) policies to protect sensitive information in cloud apps
  • Evaluates discovered apps for more than 90 risk indicators, allowing you to assess your org’s security and compliance posture
  • Extends protection beyond the traditional CASB scope to strengthen app posture and protect against malicious cloud apps
  • Applies data loss prevention (DLP) policies to protect sensitive information in cloud apps
Monitor and regulate the use of cloud apps by employees and ensure compliance with data privacy regulations

 

More information

For the latest Product Terms, please visit: https://www.microsoft.com/licensing/terms/product/changes/all.

For the product page of Microsoft Defender for Identity, please visit: https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-for-identity.

For the product page of Microsoft Defender for Office 365, please visit: https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-office-365.

For the product page of Microsoft Endpoint Security, please visit: https://www.microsoft.com/en/security/business/endpoint-security/microsoft-defender-endpoint.

For the product page of Microsoft Defender for Cloud Apps, please visit: https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-cloud-apps.

For more information on Microsoft licensing, please visit: https://www.schneider.im/software/microsoft.

Please contact us for expert services on your specific Microsoft software and online services requirements and to request a quote today.

Share article