Managed IT & Security

Overview

Managed IT & Security is a monthly plan that takes the operational and security work off your plate — endpoint protection, patching, backups, user management, email security, and a real technician to call when something goes wrong. Currently offered at the Essentials tier; Pro and Elite tiers are in development and will come online as the practice grows.

Plan Tiers

AVAILABLE NOW

Essentials

Foundation coverage for sole proprietors, home offices, and small businesses up to a handful of users.

Request a Quote →

  • Huntress Managed EDR on each device — including SOC-level threat hunting
  • OS and application patching (Windows, macOS)
  • Device encryption (BitLocker / FileVault) with recovery-key escrow
  • Endpoint backup configuration
  • Microsoft 365 administration — MFA, user provisioning, license cleanup
  • SPF, DKIM, DMARC configuration and ongoing maintenance
  • Email and remote-session help desk, 1 business-day response
  • Monthly security health check
  • Annual live security awareness training
  • Hardware and software asset register

COMING SOON

Pro

Active support for growing small offices.

Get on the Pro waitlist →

Everything in Essentials, plus:

  • Huntress ITDR (Microsoft 365 identity threat detection)
  • Microsoft 365 backup (mailbox, OneDrive, SharePoint, Teams)
  • Quarterly backup restore testing
  • Huntress Managed SAT — phishing simulation + rotating micro-learning
  • Help desk with 4-hour business-hours response SLA
  • After-hours emergency support callable at standard rate
  • Onsite available at preferred per-visit rate within service area
  • Annual cyber posture snapshot
  • Monthly executive summary report

COMING SOON

Elite

Enhanced security operations for higher-stakes environments.

Get on the Elite waitlist →

Everything in Pro, plus:

  • Huntress Managed SIEM with weekly log review
  • File integrity monitoring on critical endpoints and servers
  • Vulnerability scanning with remediation tracking
  • Quarterly cyber posture review with written findings
  • Custom incident response runbook + annual IR tabletop
  • 1-hour priority after-hours callback
  • Quarterly business review (QBR)
  • Annual technology roadmap

Add-Ons

Available at any tier, priced separately per engagement. Quote depends on scope and environment.

Project Work

  • Onsite visits (per-visit fee + travel)
  • One-time site setup and provisioning
  • Migration projects (Microsoft 365, file servers, hosts, websites)
  • New office build-out or network installation
  • Hardware procurement scoping and vendor coordination
  • Custom security policy authoring (non-compliance)
  • Network or system documentation for handoff / diligence

Specialized Engagements

  • Penetration test scoping, vendor selection, and remediation oversight
  • Compromise assessment (when a breach is suspected or confirmed)
  • Forensic data preservation and analysis
  • Post-incident written report
  • Vendor security questionnaire response (one-off)
  • Secure asset disposal coordination (per NIST SP 800-88)
  • Additional users, devices, or DR exercises beyond plan cadence

Compliance Add-On

Documented policy sets, audit evidence collection, and framework-mapped posture reporting for regulated industries. Aligned to whichever framework applies to your sector. Quoted as a one-time project for initial documentation, plus an optional monthly retainer for ongoing maintenance as standards update. Available at any tier.