Add-On Managed Services for Microsoft CSP Clients
Extend your Microsoft ecosystem with end-to-end administration, proactive security operations, and zero-trust enforcement.
| Plan | Ideal For | AVASOFT Value |
|---|---|---|
|
Control Room
Visibility & Oversight |
CSP customers who need visibility and reporting | Provides on-demand insights into Microsoft 365 license usage, consumption trends, and compliance posture with minimal effort required. |
|
Care
Administrative Coverage |
SMBs requiring basic user and policy administration | Handles user management, MFA enforcement, policy updates, and routine license tasks so your team can focus on core operations. |
|
Shield
Security Hardening & Compliance |
Enterprises focused on strengthening security | Delivers advanced security configuration across Intune, Microsoft Defender, conditional access, and related governance controls. |
|
Hero (Recommended)
Full 24x7 Security Operations |
Security-mature organizations that require continuous operations | Extends into 24x7 incident response, proactive threat detection, and ongoing policy improvement backed by defined SLAs and dedicated security operations hours. |
|
Elite +
Custom Build & Zero-Trust Implementation |
Large enterprises needing fully customized implementations | Supports tailored projects including Sentinel or Purview deployments, zero-trust design, identity automation, and enterprise cloud modernization. |
Why Clients Choose AVASOFT
Microsoft CSP Clients
Provisioning and de-provisioning of licenses.
Regularly monitoring license utilization and providing usage reports.
Identifying opportunities for license optimization and cost savings.
Provisioning and de-provisioning of licenses.
Regularly monitoring license utilization and providing usage reports.
Identifying opportunities for license optimization and cost savings.
Provisioning and de-provisioning of licenses.
Regularly monitoring license utilization and providing usage reports.
Identifying opportunities for license optimization and cost savings.
Provisioning and de-provisioning of licenses.
Regularly monitoring license utilization and providing usage reports.
Identifying opportunities for license optimization and cost savings.
Provisioning and de-provisioning of licenses.
Regularly monitoring license utilization and providing usage reports.
Identifying opportunities for license optimization and cost savings.
| Basic Administration | Control Room | Care | Shield | Hero | Elite + |
|---|---|---|---|---|---|
| License Management | ✔ | ✔ | ✔ | ✔ | ✔ |
| Microsoft Escalations | ✔ | ✔ | ✔ | ✔ | ✔ |
| Onboarding/Offboarding Users | ✖ | ✔ | ✔ | ✔ | ✔ |
| Grant/Revoke Application/Admin Access | ✖ | ✔ | ✔ | ✔ | ✔ |
| Privileged Identity Management | ✖ | ✔ | ✔ | ✔ | ✔ |
| MFA/Password Enforcement/Reset | ✖ | ✔ | ✔ | ✔ | ✔ |
| Device Compliance Review | ✖ | ✔ | ✔ | ✔ | ✔ |
| Assign/Remove Security Policy | ✖ | ✔ | ✔ | ✔ | ✔ |
| Review Quarantine Emails | ✖ | ✔ | ✔ | ✔ | ✔ |
| Review Audit & Sign-in Logs | ✖ | ✔ | ✔ | ✔ | ✔ |
| Advanced Administration | |||||
| Conditional Access | ✖ | ✖ | ✔ | ✔ | ✔ |
| Transport Rule - Email Traffic Management | ✖ | ✖ | ✔ | ✔ | ✔ |
| Intune (MDM/MAM) Policies | ✖ | ✖ | ✔ | ✔ | ✔ |
| Defender Policies - Cloud Apps, Endpoints, Identity | ✖ | ✖ | ✔ | ✔ | ✔ |
| Compliance/Data Security Policies | ✖ | ✖ | ✔ | ✔ | ✔ |
| Microsoft Security Operations | |||||
| Incident Response | ✖ | ✖ | ✔ | ✔ | ✔ |
| Malware Removal & Containments | ✖ | ✖ | ✖ | ✔ | ✔ |
| Proactive Threat Detection & Hunting | ✖ | ✖ | ✖ | ✔ | ✔ |
| Periodical Policy Review & Improvement Plan | ✖ | ✖ | ✖ | ✔ | ✔ |
| Implementation | |||||
| Overall M365 Security Coverage - E3/E5 | ✖ | ✖ | ✖ | ✖ | ✔ |
| Intune Migration/Greenfield Implementation | ✖ | ✖ | ✖ | ✖ | ✔ |
| Application SSO & Provisioning | ✖ | ✖ | ✖ | ✖ | ✔ |
| Automation - User Life Cycle Management | ✖ | ✖ | ✖ | ✖ | ✔ |
| Sentinel Migration/Greenfield Implementation | ✖ | ✖ | ✖ | ✖ | ✔ |
| M365/Azure Purview/Data Governance | ✖ | ✖ | ✖ | ✖ | ✔ |
| MXDR/Zero Trust Security Implementation | ✖ | ✖ | ✖ | ✖ | ✔ |