At Overe, we take compliance, security, and data governance seriously. Our commitment is to provide a reliable and secure environment for our customers, ensuring data protection and regulatory compliance across all regions.
Overe connects to Microsoft 365 using a secure and least privilege model. The permissions we request are limited to what is required to assess configuration posture, monitor relevant activity, and apply security policy enforcement when customers choose to enable it.
We do not access customer emails, message bodies, documents, or file contents. We only collect the specific signals needed to deliver accurate assessments, continuous hardening, and threat detection across Microsoft 365 tenants.
Our Microsoft 365 integration uses an Azure AD enterprise application with a defined set of Graph API permissions. Each permission is documented with a clear explanation of why it is needed and how it is used within the platform.
You can review the full breakdown of required permissions here:
https://intercom.help/overe/en/articles/9815398-understanding-overe-microsoft-365-app-permissions
✅ Customer Personally Identifiable Information (PII)
Overe may process limited customer PII, such as administrator names and email addresses, solely for account setup, customer communication, and the delivery of security notifications or product updates. Overe does not store customer emails, documents, files, or any customer content.
✅ Employee Personally Identifiable Information (PII)
Overe may process limited employee PII, including usernames and email addresses from the customer’s Microsoft 365 environment, strictly for the purpose of detecting and reporting security anomalies. Overe does not store employee emails, documents, files, or any employee content.
❌ Credit Card Information
Overe does not access, process, or store any credit card or payment information.
❌ Personal Health Information (PHI)
Overe does not access, process, or store any personal health information or protected health records.
Overe is actively undergoing SOC 2 Type I & Type II compliance. Our controls and processes are being independently assessed, with certification targeted for completion in Q1 2026.
In the meantime, our security practices are aligned with SOC 2 principles and continuously reviewed as part of our operating model.
We conduct quarterly penetration tests and security reviews to proactively identify and mitigate vulnerabilities.
Access our last report here 👉
Want to learn more? Email us at hello@overe.io to get our last reports.
Overe provides customer support via the in-product support channel and email at hello@overe.io.
We aim to respond within the following timeframes:
• Critical issues (service unavailable or major impact): within 4 hours
• High priority issues (significant feature impact): within 1 business day
• Standard issues (general queries or minor issues): within 2 business days
Issue priority is determined based on impact to service availability and customer operations.
All support requests are tracked and managed through our ticketing system to ensure visibility and follow-through.
Business hours are Monday–Friday, 9:00–17:00 UK time (excluding public holidays).
Response times are targets and may vary depending on issue complexity. Critical issues are prioritised for continuous work until mitigated or resolved.