System Requirements

This section lists out the minimum system requirements that is required to install and work with M365 Security Plus.

Hardware requirements

Hardware Minimum Recommended
Processor 2.4 GHz 3 GHz
Number of cores 4 6 or more
RAM 8 GB 16 GB
Disk space 100 GB (SSD preferred) 200 GB (SSD preferred)
Disk throughput 5MB/s 20MB/s
Note:
  • The above values are subject to change based on customer requirement.
  • Choose the required disk space based on usage and future requirements.

Software Requirements

Supported Platforms

Supported Browsers

Supported databases

PostgreSQL

M365 Security Plus build number Supported database versions
4800 and above PostgreSQL 15.7
4400-4703 PostgreSQL 9.4-9.6 and 10.12
4000-4400 PostgreSQL 9.2-9.6

MS SQL

M365 Security Plus build number Supported database versions
4000 and above Microsoft SQL Server 2005 - 2022

Note: You can also configure M365 Security Plus to use Azure SQL Server.

Port requirements

M365 Security Plus uses port 80 for HTTP and port 443 for HTTPs communications.

Prerequisites

Before you configure a Microsoft 365 tenant, make sure that these prerequisites are satisfied:

Verify and install Microsoft .NET version 4.8 and PowerShell version 5.1

Microsoft .NET Framework

  1. To check if Microsoft .NET Framework is installed, open the Command Prompt from Run. Enter the following command:

    reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\full" /v version

  2. Check the displayed version. If the version is below 4.8, install Microsoft .NET Framework version 4.8 from here.

PowerShell

  1. To check if PowerShell is installed, type PowerShell from Run. If PowerShell is installed, check for its version number by running the following command:

    $PSVersionTable

  2. If the version is below 5.1 or if PowerShell is not installed, install PowerShell version 5.1 from here.

Firewall settings

The following endpoints must be allowed by the firewall for the seamless functioning of the tool.

General domains

The general domains that must be allowed through the firewall are as follows,

Domains URLs Use
*.zoho.com creator.zoho.com To update product and security patches, collect geolocation IP information, and send product and health metrics periodically
salesiq.zoho.com Used for the Live Chat feature in the Support tab
livedesk.zoho.com
manageengine.com https://www.manageengine.com/microsoft-365-security-protection/service-pack.html Used to download service packs during manual update processes
https://pitstop.manageengine.com Used to display the recent forum posts and announcements in the Support tab
https://adcommunity.manageengine.com Used to display the recent forum posts and announcements in the Support tab
updates.manageengine.com Used to import certificates required to verify the integrity of service packs.
https://identitymanager.manageengine.com/api/public/v1/oauth/redirect To enable Microsoft 365 authentication for M365 Security Plus by facilitating the OAuth authentication flow between Microsoft 365 and M365 Security Plus.

Note: This URL can be skipped if HTTPS is enabled in M365 Security Plus

https://www.manageengine.com/microsoft-365-security-protection/release-notes.html Product release notes
https://www.manageengine.com/microsoft-365-security-protection/help Product online admin guide
*.zohocorp.com uploads.zohocorp.com To download patch files, if any
https://bonitas.zohocorp.com/ To upload log files
api.bcti.brightcloud.com https://api.bcti.brightcloud.com/1.0/ip/getgeoinfo To get the country code based on the geolocation of an IP address in audit logs and reports dependent on the country code

For Japanese build users:

Domains URLs (besides the global URLs) Use
*manageengine.jp
adcommunity.manageengine.jp Support, forum, announcements, etc.
store.manageengine.jp To buy product licenses

For Chinese build users:

Domains URLs (besides the global URLs) Use
*manageengine.cn https://www.manageengine.cn/microsoft-365-security-protection/ For pricing, FAQ, features, help, etc.

Note: All the listed URLs are examples. Kindly use the wildcard domains in the firewall rule.

Microsoft Entra ID (global service)

Microsoft Entra ID (global service) users must ensure that the following domains are allowed by their firewall. Refer to the respective tables for Microsoft Entra China and Microsoft Entra ID for US Government users.

Note: Depending on your environment, you may need to allow additional URLs for Azure portal authentication. Refer to this document for more details on Azure portal endpoints.

Table 3: Domains to be allowed by Microsoft Entra ID (global service) users

Module Endpoints
REST API login.microsoftonline.com
graph.microsoft.com
manage.office.com
portal.office.com
*aadcdn.msftauth.net (or) *aadcdn.msauth.net
Exchange Online outlook.office.com
outlook.office365.com/powershell-liveid

Microsoft Entra China

Microsoft Entra China users must ensure that the following domains are allowed by their firewall:

Table 4: Domains to be allowed by Microsoft Entra China users

MODULE ENDPOINT
REST API login.partner.microsoftonline.cn
microsoftgraph.chinacloudapi.cn
manage.office.cn
portal.azure.cn
*.msauth.cn
*aadcdn.msftauth.cn
*.msftauth.net
Exchange Online partner.outlook.cn
partner.outlook.cn/PowerShell

Microsoft Entra ID for US Government

Microsoft Entra ID for US Government users must ensure that the following domains are allowed by their firewall:

Table 5: Domains to be allowed by Microsoft Entra ID for US Government users

MODULE ENDPOINT
REST API login.microsoftonline.us
graph.microsoft.us
manage.office.us
portal.azure.us
Exchange Online outlook.office365.us
outlook.office365.us/powershell-liveid

Don't see what you're looking for?

  •  

    Visit our community

    Post your questions in the forum.

     
  •  

    Request additional resources

    Send us your requirements.

     
  •  

    Need implementation assistance?

    Try onboarding

     

Copyright © 2023, ZOHO Corp. All Rights Reserved.