GF 04 720x478 2x

Enhance Microsoft Office 365 Built-In Security Capabilities for Total Protection

Complement Microsoft’s threat intelligence-based defenses with precise, behavioral analysis-based protection against all email and account takeover attacks.

Comprehensive Email Security for Microsoft Office 365

Fastest Path to Complete Protection

Deploy in minutes at any scale. No configuration or custom policies required.

Works with Microsoft Defender for Office 365

More than half of Abnormal enterprise customers do not use a SEG.

Integrated Admin and End-User Experience

Single management pane for Microsoft and Abnormal, plus native Outlook experience for users.

Enhance, Not Replace, Microsoft’s Built-In Security Capabilities

Icons8 microsoft 1
Microsoft Threat Intel
  • Basic Spam
  • No Graymail
  • Malware
  • Phishing
Scans Known Bad outline 660x740 v2
Abnormal Behavioral AI
  • Behavioral Spam
  • Behavioral Graymail
  • Behavioral Malware Protection
  • Phishing Protection
  • Simplified URL Rewriting
  • Social Engineering Protection
  • Account Compromise Protection
Profiles Known Good outline 660x740 v2

Improve Employee Productivity and Email Experience

Provides complete protection for all your end users with minimal impact.
End User Experience blue x2 v2

Personalized End-User Email Experience

Abnormal observes each user’s behavior within their mailbox to learn their preferences, and automatically sorts their safe, spam, and promotional emails.

End users no longer need spam and quarantine email digests. Messages are delivered to their inbox, junk, and promotions folders.

MSO 03 smart rewriting blue x2

Smart URL Rewriting

Not all emails are malicious. So, why rewrite every single URL with them?

Abnormal judges every email to determine its risk profile, and only rewrites URLs within those emails that look like borderline attacks.

MSO 04 contextual Banner blue x2

Contextual Banners That Help End Users

Abnormal precisely assesses every email for threat and the type of threat, and if deliverable, automatically provides relevant information using banners.

End users, as a result, are better equipped to ensure that they do not fall victim.

Deploys in Minutes and Proven to Save You Time

Cloud-native API architecture simplifies deployment and improves response times.
MSO 05 Natively Integrates x2

Natively Integrates with Microsoft

Integrate within a minute via APIs, without any disruption to email flow. No changes to your email configuration or MX records are required.

Plus, there is no need to configure Abnormal or to set custom policies. It learns from existing emails to baseline good behavior and stops all bad email within hours.

Integrated Visibility Dashboard

Integrated Visibility and Control

With a single pane of glass, analysts no longer need to toggle between your native cloud email security dashboard and other email security solution dashboards.

With deep integration, you get unified visibility and control across Microsoft Office 365 and Abnormal, greatly simplifying investigation, remediation, follow-up, and reporting.

Defense In Depth v6

Simplify Your Email Security Stack

Eliminate the redundant secure email gateway layer, and re-enable and enhance cloud gateway capabilities built into Microsoft and Google.

Unify your entire inbound email security defenses, from email hygiene to zero-day advanced attacks.

How Microsoft and Abnormal Work Together

Defense in Depth Protection 02 msft 680pix

Inbound Email Protection

Precise behavioral analysis-based detection that blocks targeted email attacks and unwanted mail.


Account Takeover Protection

Automatically detects and resets access to accounts that show anomalous behavior and appear to be compromised.


SOC Automation

AI-assisted investigation, triage, and auto-remediation that is proven to supercharge your SOC workflows and save you time.

Integrated Cloud Email Security Platform

Integrate within minutes, recieve deep analysis and rich insights, and set fine-grained access controls to protect employee data.

Fully Automate Your SOC Workflows

Integrate with SIEM, SOAR, ITSM, and IAM solutions to enrich security insights and orchestrate workflows.


Augment your SIEM with metadata and risk scores for better attack correlation.


Trigger playbooks when users engage with bad email or compromised accounts.


Create tickets for compromised accounts or when users engage with bad emails.

Secure Email Gateways

Trigger automated post-delivery protection when gateways send alerts on missed attacks.

Phishing Training

Allow emails for training to pass inspections, and present reports on user engagement.

Identity Access Management

Log in to Abnormal via SSO, and to provide data to better detect account takeover attempts.


Our bi-directional architecture helps you set up your own custom integrations quickly and simply.

Trusted by Global Enterprises


See an Abnormal Product Demo

Related Resources

Webinar microsoft cover
The emergence and evolution of advanced socially-engineered cyber attacks, including business email compromise, supply chain fraud, and ransomware, has organizations rethinking their security strategies and tech stacks.
Read More
Microsoft whitepaper cover
In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of organizations globally now use Microsoft 365. See how Abnormal can help you augment your infrastructure to block the most dangerous attacks.
Read More
Abnormal microsoft data sheet cover
Complement Microsoft’s threat intelligence-based defenses with precise, behavioral analysis-based protection against all email and account takeover attacks.
Read More
Threat report 1
Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts.
Read More
Webinar cover 3
While you may be confident in your own email security, the truth is that your security is only as good as the security of your partners and vendors. Discover why vendor email compromise is such an important part of your security strategy.
Read More
B Gartner Highlights 1
The Gartner Market Guide for Email Security explains what integrated cloud email security (ICES) solutions are and why they’re essential for modern enterprises. Download a copy now to learn why enterprises are moving away from the SEG.
Read More
Blog door arches
When Abnormal Security was founded, our engineering and data science teams were focused on solving the toughest—and most expensive—email security problem for enterprises: business email compromise, or BEC. Fast-forward to today and Abnormal serves some of the largest enterprises...
Read More
Email security architectures cover
As organizations have moved their email servers from on-premise systems like Microsoft Exchange to cloud services like Microsoft 365, the range of permutations of email security solutions has also increased. See the range of security options available to organizations and how to solve for advanced threats.
Read More
Blog yellow microsoft squares
Security is now a $10 billion business for Microsoft, and the company is a leader in five Gartner Magic Quadrants—access management, endpoint management tools, cloud access security brokers, enterprise information archiving, and endpoint protection platforms. This validation proves that their customers...
Read More