Both Overe Assess and Overe Protect offer comprehensive security solutions for Microsoft 365 environments. However, each service operates with different levels of permissions and capabilities, catering to different stages of security management. Below is a breakdown of how these two services differ and what permissions are required to make them function optimally.
Overe Assess: Limited Permissions, Rapid Security Assessment
Overe Assess is designed to give MSPs and businesses a quick and insightful look into the security posture of their Microsoft 365 environment, using a lower set of permissions. It is an excellent tool for baseline security assessments without the need for heavy administrative access.
Key Permissions for Overe Assess:
Permission | Area | What it is for |
Posture assessment | Read users lists to identify risky accounts. | |
Posture assessment | Access secure scores for posture assessment. | |
Management | Allows Overe to remove its own application when offboarding a tenant. | |
Posture assessment | Read licensing information to assess security posture. | |
Posture assessment | Read user registration details for security posture assessment. |
These permissions are focused on providing insights into:
MFA usage and misconfigurations
Microsoft security policies
External app integrations
Inactive accounts
While Overe Assess helps you understand potential risks, its ability to mitigate these risks is limited without the higher-level permissions and functionalities that come with Overe Protect (Free 14-day trial)
Overe Protect: Full-Scale SaaS Security with Advanced Permissions
Overe Protect is the premium offering that goes beyond assessment by implementing security policies and automatically responding to threats in real time. It requires a broader set of permissions to provide the necessary oversight and automated remediation for your Microsoft 365 environment.
Key Permissions for Overe Protect:
Permission | Area | What it is for |
Policies | Mange policy controls related to Exchange Online. | |
Policies | Verify policies are being applied as expected. | |
Policies | Used by policy controls that manage Microsoft Conditional Policies. | |
Policies | Required by the policy control managing the application consent settings. | |
Policies | Needed by the policy controls related to MFA. | |
Policies | Required by the policy control managing the user application consent settings. | |
Policies | Used by policy controls dealing with app permissions.
Also used to uninstall Overe itself from the tenant when offboarding a Protect integration. | |
Posture assessment, Policies | Used for the admin users application consent request approval policy control. | |
Policies | Used to manage the Password expiration and validity policy control. | |
Posture assessment, Policies | Used by the policy controls related to Exchange Online related Policy controls.
Also to retrieve licensing information for license assessment. | |
Posture assessment, | Access links expiration time. | |
Remediation | Used in remediation to disable accounts and revoke sessions. | |
Anomalies, Posture assessment | Review audit logs for a detailed history of user actions, making it easier to trace back malicious activity.
Read user registration details for security posture assessment. | |
Anomalies | Review audit logs for a detailed history of user actions, making it easier to trace back malicious activity. | |
Anomalies | Review audit logs for a detailed history of user actions, making it easier to trace back malicious activity. | |
Anomalies | Review audit logs for a detailed history of user actions, making it easier to trace back malicious activity. | |
Posture assessment | Access secure scores for posture assessment. | |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
| |
Future use |
|
These extended permissions unlock features such as:
Real-time anomaly and adversarial behavior detection
Automated policy enforcement (e.g., MFA enforcement, user lockdowns)
Continuous monitoring of connected apps and devices
Response to identified threats by automatically adjusting security settings
How to re-consent to Microsoft Permissions
Some scenarios might require you to re-consent the permissions granted to the Overe app. Find out how to complete this process in the following article: Giving consent to missing Microsoft permissions.
Conclusion: Tailoring Permissions to Your Needs
Overe Assess is a lightweight, limited-permission service that offers essential insights into your Microsoft 365 environment. It's an excellent tool for quickly identifying security gaps without requiring heavy administrative privileges.
On the other hand, Overe Protect provides full-scale security management, including automated threat detection and response. With its advanced permissions, it allows MSPs to not only identify risks but also take immediate actions to mitigate them, ensuring a secure and compliant Microsoft 365 environment.
For those just getting started, Overe Assess offers a valuable entry point, but upgrading to Overe Protect ensures comprehensive protection with minimal manual intervention.