Standard
Browser threat enforcement without retained event logs.
- Defender IOC sync and browser enforcement
- Leanest commercial entry point
- Best when only deterministic blocking is required
All plans include browser-level URL enforcement. Higher plans add retention, operational visibility, threat intelligence, and investigation support so you can choose the right fit for your Microsoft Defender workflow.
Browser threat enforcement without retained event logs.
Adds operational event visibility and short-term investigations.
Adds curated threat intelligence and deeper investigation capability.
Compliance-grade retention with included analyst-backed investigations.
This table shows exactly what changes across the Cybereinforce plan ladder.
| Capability | Standard | SME | Corporate | Enterprise+ |
|---|---|---|---|---|
| Browser URL enforcement | Yes | Yes | Yes | Yes |
| Defender IOC sync | Yes | Yes | Yes | Yes |
| Retained event logs | No | Yes | Yes | Yes |
| Retention period | 0 days | 30 days | 90 days | 365 days |
| Maximum event logs | None | Up to 500 | Up to 1,000 | Up to 2,000 |
| Rule limit | 500 | 1,000 | 2,000 | 5,000 |
| Log Analytics Workspace support | No | Yes | Yes | Yes |
| Analytics rules | No | Yes | Yes | Yes |
| Incident creation | No | Yes | Yes | Yes |
| Sentinel / Defender workbook support | No | Yes | Yes | Yes |
| Cybereinforce curated threat intelligence | No | No | Yes | Yes |
| Included analyst-backed investigations | No | No | No | Up to 50 / year |
| Best fit | Enforcement only | SOC visibility | XDR investigations | Enterprise compliance + investigations |
you want browser-level URL enforcement with the lowest commercial entry point and do not need retained event history, export, or investigation workflows.
you want retained event logs, incident creation, analytics rules, and a practical 30-day investigation window for everyday SOC operations.
you want deeper investigations, curated CTI, more retained visibility, and the strongest overall operational coverage across your Defender environment.
Start with Standard for pure enforcement, SOC for visibility, XDR for stronger threat intelligence coverage, or Enterprise+ for the longest retention and investigation support.