Home | Connectors | Microsoft 365 | Microsoft 365 - OpenText Webroot Unity Integration and Automation
Data flow: OpenText Webroot Unity ? Microsoft 365
When Webroot Unity detects malware, phishing, or ransomware activity on an endpoint, it can send alerts into Microsoft Teams channels and Outlook mailboxes used by IT operations and security teams. This gives responders immediate visibility into affected users, devices, and threat severity without logging into multiple consoles.
Data flow: OpenText Webroot Unity ? Microsoft 365
When a device is quarantined or flagged for remediation, Microsoft 365 can be used to automatically notify the user with next steps, expected downtime, and support contacts. This reduces confusion and helps employees continue working with minimal disruption.
Data flow: OpenText Webroot Unity ? Microsoft 365
Threat and endpoint protection data from Webroot Unity can be surfaced in Power BI dashboards for IT leadership, compliance teams, and operations managers. This supports reporting on infection trends, response times, device risk levels, and recurring attack patterns across the organization.
Data flow: Bi-directional
Microsoft Teams and SharePoint can serve as the collaboration layer for incident response, while Webroot Unity provides the endpoint security context. Security analysts, help desk staff, and managers can coordinate containment, investigation, and recovery using shared channels, files, and task updates.
Data flow: Microsoft 365 ? OpenText Webroot Unity
Organizations can use Microsoft 365 to manage approval workflows for security exceptions, such as allowing a business-critical application or device to bypass a specific control. Requests can be submitted through Microsoft Forms or Power Automate, reviewed in Teams, and documented in SharePoint before being applied in Webroot Unity.
Data flow: OpenText Webroot Unity ? Microsoft 365
When Webroot Unity identifies a phishing-related threat on a device, Microsoft 365 can be used to trigger awareness actions such as notifying the user, assigning follow-up training, or alerting the security awareness team. This helps convert incidents into targeted education and reduces repeat exposure.
Data flow: Bi-directional
Microsoft 365 can store and organize evidence such as incident reports, remediation approvals, and policy acknowledgments, while Webroot Unity provides endpoint protection logs and threat detection records. Together, they support audits, internal controls, and regulatory reporting.
Data flow: OpenText Webroot Unity ? Microsoft 365
Threat detections in Webroot Unity can automatically create or update service desk cases that are coordinated through Microsoft 365 collaboration tools. This ensures that endpoint incidents are tracked, assigned, and resolved through a structured workflow rather than handled informally.