Why CIOs Are Choosing ABT for Microsoft 365 Licenses
The Hidden Risks Lurking in “Set-and-Forget” Security Many organizations assume that once they’ve purchased Microsoft 365 or Azure licenses and...
11 min read
Justin Kirsch : Updated on February 25, 2026
In this article:
Here's a number that should bother every CFO at a financial institution: 15-30% of your Microsoft 365 spend is probably wasted. Not "could be optimized." Wasted. Paying for licenses no one uses, features no one configured, and tiers no one needs.
We see this every time we run a Microsoft 365 license audit for a bank, credit union, or mortgage company. A 300-person organization paying for 320 licenses because 20 departed employees were never deprovisioned. An entire company on E5 when 80% of the staff only needs Business Premium. Security features that justified the E5 price tag sitting unconfigured for two years.
Microsoft 365 licensing for financial services carries extra complexity because compliance requirements dictate specific security features. You can't just downgrade everyone to the cheapest plan. But you also shouldn't be paying E5 rates for your entire workforce when only your security team and compliance officers need E5 capabilities.
This guide walks through the most common licensing waste, how to tell which plan each role actually needs, and how to run an M365 license review without accidentally breaking your security posture.
Microsoft 365 overspending at financial institutions follows a predictable pattern. Someone made a licensing decision three years ago. It was probably the right call at the time. Then the organization grew, Microsoft changed its plan structure, employees came and went, and nobody revisited the original decision.
The result is licensing sprawl. Consider what a typical 250-person mortgage company's license inventory looks like when we audit it:
At current E5 per-user pricing, the gap between what this company pays and what it should pay is $8,000-$12,000 per month. That's $96,000-$144,000 per year in Microsoft 365 overspending on licensing alone.
Multiply that across an institution with 500 or 1,000 users, and you're looking at six figures in annual waste that nobody has flagged because the monthly invoice just auto-renews.
After auditing Microsoft 365 environments for hundreds of financial institutions, these are the five mistakes we find in almost every engagement.
This is the biggest single source of waste. The IT Director picks one plan for the whole company because it's easier to manage. Usually it's E3 or E5, and usually it's based on what the most demanding department needs.
Your loan officers don't need the same license as your chief information security officer (CISO). A teller processing transactions needs email, Teams, and basic Office apps. Your compliance team needs Purview eDiscovery, Advanced Audit, and Information Barriers. Those are different license tiers at different price points.
This sounds like it should be easy to catch. It isn't. Offboarding at financial institutions often involves regulatory holds on mailbox content, which means accounts stay active longer than at other companies. The problem is when "active for compliance hold" turns into "still paying for a full E5 license 14 months after the employee left."
A shared mailbox or inactive mailbox with litigation hold doesn't require a paid license in most cases. Your offboarding process should convert these accounts rather than leaving them on full licenses.
Microsoft's licensing matrix is genuinely confusing. We regularly find organizations paying separately for:
Each of these duplicates adds $5-$12 per user per month. Across 200 users, one duplicate add-on costs $12,000-$28,800 per year.
Bulk license purchases often leave unassigned licenses sitting idle. You bought 300 Business Premium licenses when you had 280 employees, expecting growth. The growth happened, but you bought E3 licenses for the new hires instead. Those 20 unassigned Business Premium licenses keep renewing.
This is the most expensive mistake because it combines overspending with a false sense of security. Many financial institutions upgraded to E5 specifically for the advanced security and compliance features. Then nobody configured them.
Buying E5 for Microsoft Defender for Office 365 Plan 2 doesn't protect you from phishing attacks if you haven't set up Safe Attachments policies and anti-phishing rules. Paying for Purview Information Barriers doesn't satisfy your examiner if the barriers aren't actually in place. You're paying the premium and getting none of the protection.
The licensing decision in financial services comes down to one question: which users need advanced security and compliance features, and which users just need to do their jobs?
Business Premium includes the Office apps, email, Teams, SharePoint, OneDrive, Intune device management, and Defender for Business. For tellers, loan processors, administrative staff, and most operational roles, this is more than enough.
Business Premium also includes Conditional Access (through Entra ID P1), which means you can enforce MFA, block legacy authentication, and require compliant devices. These are the security controls that satisfy most day-to-day compliance requirements.
The limitation: Business Premium caps at 300 users per tenant and doesn't include the advanced compliance tools (eDiscovery, Information Barriers, Advanced Audit) that regulated institutions sometimes need. If you have more than 300 users or need those compliance features for specific roles, you'll need E3 or E5 for at least part of your workforce.
E3 adds unlimited user count, larger mailboxes (100GB vs. 50GB), and some compliance features. For organizations over 300 users, E3 is the practical baseline. But E3 doesn't include the advanced security stack that makes E5 worth the price for your security and compliance teams.
E5 adds Defender for Office 365 Plan 2, Defender for Endpoint Plan 2, Entra ID P2, Microsoft Purview (advanced compliance), Power BI Pro, and Audio Conferencing. These features matter for:
The key insight for Microsoft 365 license optimization: E5 is worth the price for 15-25% of your workforce. The other 75-85% are on a more expensive plan than they need.
A proper license audit takes your current spend, maps it against actual usage, and produces a right-sizing plan. Here's how to do it.
In the Microsoft 365 Admin Center, go to Billing > Your products. Export the full list of purchased licenses, assigned licenses, and available licenses. This gives you the baseline: what you're paying for vs. what's been assigned.
Already you'll probably find unassigned licenses generating monthly charges.
In the Admin Center under Reports > Usage, pull the last 180 days of activity data. You're looking for:
Build a spreadsheet with every user, their current license, their actual usage, and their role. Assign the minimum license tier that covers their requirements:
Cross-reference your add-on subscriptions against what's included in each tier. Every add-on that duplicates a bundled feature is money thrown away.
Don't change 200 licenses on a Friday afternoon. License changes can affect Conditional Access policies, DLP rules, retention policies, and security configurations. A financial institution should phase these changes with testing, roll them department by department, and verify that all compliance-critical features remain functional after each change.
This is where many institutions get stuck. The audit identifies savings, but nobody wants to risk breaking security configurations. That's a valid concern, and it's why many banks and credit unions bring in a specialist for the migration itself. ABT's licensing team handles this for hundreds of financial institutions. They know which configurations break when you change tiers and how to preserve them.
Where you buy Microsoft 365 licenses affects what you pay. There are three purchasing channels, and they're not equal.
Buying directly from Microsoft.com is the most expensive option. There's no volume discount negotiation, no dedicated account team, and no license management support. You pay list price and manage everything yourself.
Many managed service providers (MSPs) resell Microsoft licenses as a Tier-2 or indirect CSP. They buy from a distributor (like Ingram Micro or TD SYNNEX), mark up the price, and pass it through. They have limited ability to negotiate pricing and no direct relationship with Microsoft for escalations.
Tier-1 Cloud Solution Providers like ABT have a direct billing relationship with Microsoft. No middleman distributor. This matters for three reasons:
The pricing difference between buying through a Tier-1 CSP and buying direct can be 5-15% on the same licenses. Combined with right-sizing from a license audit, the total savings are substantial.
The worst-case outcome of a Microsoft 365 license audit is saving $80,000 on licensing and then failing a regulatory examination because a critical security feature stopped working when you changed tiers.
Microsoft 365 licensing for financial services requires extra caution during any license change. Here's what to watch:
Some Conditional Access features require Entra ID P2 (included in E5, not in E3 or Business Premium). If your policies use Identity Protection risk-based conditions, sign-in risk policies, or Access Reviews, downgrading users from E5 to E3 will break those policies. The conditions stop evaluating. Users who should be blocked aren't.
Before downgrading any license, inventory every Conditional Access policy and verify which Entra ID features it depends on.
DLP policies in Microsoft Purview have different capabilities depending on the license tier. Advanced DLP features (Endpoint DLP, exact data matching) require E5 Compliance or E5. If you've configured these, downgrading the user's license silently disables the policy for them. No error message. No alert. The rule just stops applying.
Financial institutions use retention policies and legal holds for regulatory compliance. Some advanced retention features (adaptive scopes, auto-applying retention labels with trainable classifiers) require E5. Downgrading a user who's subject to these policies can cause data governance gaps your compliance team won't know about until an examiner asks for records that no longer exist.
Run your audit. Identify the savings. Then have someone who understands both Microsoft licensing and financial services compliance execute the changes. ABT runs a free security assessment that includes a license utilization review alongside your security configuration audit. It tells you where you're overspending and where changing licenses would create compliance risk.
Financial institutions should conduct a Microsoft 365 license audit at least twice per year, aligned with budget planning cycles and Microsoft renewal dates. Organizations experiencing rapid hiring, mergers, or regulatory changes should audit quarterly. Each audit should include license inventory, usage analysis, add-on deduplication, and a compliance impact assessment before making any changes.
Financial institutions typically overspend on Microsoft 365 licensing by 15 to 30 percent. Common causes include departed employees retaining active licenses, uniform E5 assignments regardless of role, duplicate add-on subscriptions for features already bundled in existing plans, and unassigned licenses continuing to renew. A thorough audit identifies these issues and produces a right-sizing plan.
Downgrading a Microsoft 365 license does not delete user data, but it can disable features that depend on the higher-tier license. Conditional Access policies, Data Loss Prevention rules, and retention policies may stop functioning for affected users. Financial institutions should document all active security and compliance configurations before any tier change and verify each one remains operational afterward.
A Tier-1 Cloud Solution Provider has a direct billing and support relationship with Microsoft, enabling better pricing and faster issue resolution. A Tier-2 CSP purchases licenses through a distributor, which adds cost and an extra support layer between the customer and Microsoft. For financial institutions, working with a Tier-1 CSP also provides access to direct Microsoft engineering escalation paths.
ABT conducts Microsoft 365 license audits for banks, credit unions, mortgage companies, and other regulated financial institutions. As a Tier-1 Microsoft CSP with SOC 2 Type II certification, ABT provides license utilization analysis, right-sizing recommendations, and compliance-safe migration execution. The process includes a free security assessment that covers both licensing and security configuration.
Before changing license tiers, financial institutions should inventory all Conditional Access policies that use Entra ID P2 features — including Identity Protection risk-based conditions, sign-in risk policies, and Access Reviews — because downgrading from E5 to E3 disables these controls silently. Data Loss Prevention (DLP) rules using advanced capabilities like Endpoint DLP and exact data matching also require E5 or E5 Compliance licenses. Institutions should document every active policy, verify which license tier each policy depends on, and test changes in a pilot group before rolling out organization-wide. DMARC email authentication settings are license-independent but should be verified as part of any security configuration review.
Every month you wait to run a Microsoft 365 license audit is another month of paying for licenses, features, and tiers your institution doesn't need. The savings are real and the process doesn't have to put your compliance posture at risk.
Get your free security grade. ABT's security assessment reviews your Microsoft 365 environment, including license utilization, against 100+ security benchmarks. You'll see exactly where you're overspending and where your security configuration stands. Get your grade at getmygrade.myabt.com
Talk to a licensing specialist. If you already know your licensing needs attention, skip straight to a conversation with ABT's team. As a Tier-1 Microsoft CSP managing licenses for 750+ financial institutions, we've seen your exact situation before. Schedule a conversation at myabt.com/talk-to-an-expert
The following tables define the Microsoft 365 licensing terms and compliance frameworks referenced in this article.
| Term | Definition |
|---|---|
| CISO | Chief Information Security Officer — the executive responsible for an organization's information security strategy and program. |
| Conditional Access | Microsoft Entra ID policies that enforce login requirements — such as multi-factor authentication, device compliance, and location-based restrictions — before granting access to Microsoft 365 resources. |
| CSP (Cloud Solution Provider) | Microsoft's partner program for selling and managing cloud licenses. Tier-1 CSPs have a direct billing relationship with Microsoft; Tier-2 CSPs purchase through a distributor. |
| DLP (Data Loss Prevention) | Microsoft Purview rules that detect and block sharing of sensitive data — such as Social Security numbers, account numbers, and loan data — outside the organization. Advanced DLP features require E5 licensing. |
| DMARC | Domain-based Message Authentication, Reporting, and Conformance — an email authentication standard that prevents attackers from spoofing your organization's email domain. |
| EDR (Endpoint Detection and Response) | Security software that continuously monitors devices for threats and provides automated investigation and remediation capabilities. Microsoft Defender for Endpoint Plan 2 (E5) includes advanced EDR. |
| Entra ID (formerly Azure AD) | Microsoft's cloud identity platform that manages user authentication, Conditional Access policies, and identity protection. P1 is included in Business Premium and E3; P2 is included in E5. |
| Microsoft Purview | Microsoft's compliance and data governance platform, including DLP, eDiscovery, Information Barriers, retention policies, and audit logging. Advanced features require E5 or E5 Compliance add-on. |
| SOC 2 Type II | An independent audit verifying that a service provider's security controls are designed properly and operating effectively over a sustained period (typically 6-12 months). |
The Hidden Risks Lurking in “Set-and-Forget” Security Many organizations assume that once they’ve purchased Microsoft 365 or Azure licenses and...
9 min read
In this article: What NCUA Examiners Actually Check The Most Common IT Findings Building Your Evidence Package How to Pass Your NCUA IT Exam:...
You wouldn’t buy a Porsche just to drive three blocks to the grocery store at 15 miles per hour. Yet, that is exactly what thousands of businesses do...