Proactive monitoring, alerting and security management for your Microsoft environment.

Many organisations already have impressive security features built into their Microsoft 365 A5 and E5 software plans, but aren’t getting the most value out of existing license investments because their security hasn’t been properly configured.

Policies often haven’t been set up, alerts might not be in place, monitoring isn’t being conducted and new security patching isn’t being rolled out.

Novus’ Security-as-a-Service solution for Microsoft environments helps you to extract all the value from your licenses so that you get the most out of your IT investment.

For onsite workspaces and cloud tenant environments.

Tailored for Microsoft 365 environments.

Proactive monitoring and testing.



We initially conduct an assessment of your IT estate – both cloud and on-premise, to understand your security landscape and identify any gaps, and compare that with our best practice processes.


We put in place a strong foundation of security measures; across policy and software configuration, alerts and monitoring to give you a resilient security baseline.


Once your security foundation is in place, our expert team monitors your environment for any alerts or unusual activity. For straightforward alerts, our team will resolve these issues and alerts on your behalf.

Download the Security-as-a-Service Product Brief for more info.


Proactive monitoring, alerting and security management for your Microsoft environment.

Protecting your organisation isn’t just about buying security solutions or antivirus software.

It’s also about monitoring activity across your IT operations to spot breaches before they have an impact on your business and staff.

It’s about applying real-life human thinking to complex security situations to ensure you maintain a balance between staff having the IT freedom to carry out their jobs effectively, and the necessary checks and restrictions being in place to prevent unwanted users gaining access to your valuable data and technology. We deliver this through Novus Security: Cloud Tenant.

For increased protection, it’s about digging deeper into the security underpinning your on-premise and cloud environments to ensure that you’re covered, wherever your applications and data reside – through
Novus Security: Everything.

Ultimately, it’s also about having a Plan B if things do go wrong: with all your data backed up safely, combined with the ability to get back up and running as quickly as possible through our disaster recovery service, NSure.

Configuring Microsoft Licenses

Did you know your Microsoft 365 E5 and A5 licenses already come with a number of comprehensive security technologies included?

As part of the Novus Security as a Service: Cloud Tenant solution, we start by configuring your existing Microsoft licenses to achieve a resilient security baseline:

  • Microsoft Defender for Identify – This leverages your on-premise Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organisation.
  • Microsoft Cloud App Security – Provides rich visibility, control over data travel, and sophisticated analytics to identity and combat cyber threats across all your Microsoft and third-party cloud services.
  • Microsoft Defender for Endpoint – An enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.
  • Microsoft 365 Defender – Provides the capability for security teams to manage all endpoint, email and collaboration tools, cross-product investigation, configuration, and remediation activities within a single unified dashboard.
  • Microsoft Multi-factor Authentication (MFA) – Extra security to check users accessing systems from unknown networks.
  • Conditional Access – Security group policies that incorporate Microsoft Security Baselines and guidance from the NCSC.
  • Office 365 Advanced Threat Protection – A cloud-based email filtering service that helps protect against phishing, business email compromise, and malware attacks.­

Talk to us to find out more.