Microsoft 365 Pricing & Feature Updates Coming July 1, 2026: What It Means for You
Why This Matters
New Features Included
-
Office 365 E1, Business Basic, Business Standard
- Safe Links (URL Checks) for phishing protection.
-
Office 365 E3
- Defender for Office 365 Plan 1 (previously $2/user/month add-on).
-
Microsoft 365 E3
- Intune Remote Help ($3.50/user/month)
- Intune Advanced Analytics ($5/user/month)
- Intune Plan 2 ($4/user/month)
-
Microsoft 365 E5
- Intune Endpoint Privilege Management ($3/user/month)
- Enterprise Application Management ($2/user/month)
- Cloud PKI ($2/user/month)
- Security Copilot Agents (previously SCU-based pricing)
Visual Comparison: Current vs. Future Features

Impact
- If you currently pay for Defender for Office 365 Plan 1 or Intune add-ons, these costs disappear post-July 2026.
- Organizations not using these features gain access without extra licensing complexity.
- Security Copilot becomes embedded in E5—huge value for security teams.
Actionable Steps
- Audit your current add-ons: Calculate what you’re paying for Defender and Intune extras.
- Model future costs: Compare new base prices vs. eliminated add-ons.
- Plan adoption: Enable these advanced features now to maximize ROI.
Bottom Line

Chris Hinch
Microsoft Practice Director
Why Traditional ZTNA Falls Short and What to Do About It
Zero Trust isn’t new. Most IT leaders have already started down this path, often by replacing legacy VPNs with ZTNA solutions. But here’s the issue: many organizations are finding that “ZTNA” alone isn’t solving the problem they thought it would. The pace of change is...
The CA/B Forum Is Rewriting the Rules of Digital Certificates. Are You Ready?
For decades, X.509 digital certificates have quietly underpinned trust on the internet. They authenticate websites, encrypt traffic, secure devices, protect applications, and enable machine-to-machine communication. But that foundation is now undergoing its biggest...
Identity Is Now Your First Line of Defense. Are You Treating It That Way?
For years, security strategies were built around the network. Firewalls, segmentation, and perimeter controls defined how organizations protected access to systems and data. That model doesn’t hold up anymore. Today, identity is the control plane. It determines who...


