Managed IT & Security
Overview
Managed IT & Security is a monthly plan that takes the operational and security work off your plate — endpoint protection, patching, backups, user management, email security, and a real technician to call when something goes wrong. Currently offered at the Essentials tier; Pro and Elite tiers are in development and will come online as the practice grows.
Plan Tiers
AVAILABLE NOW
Essentials
Foundation coverage for sole proprietors, home offices, and small businesses up to a handful of users.
- Huntress Managed EDR on each device — including SOC-level threat hunting
- OS and application patching (Windows, macOS)
- Device encryption (BitLocker / FileVault) with recovery-key escrow
- Endpoint backup configuration
- Microsoft 365 administration — MFA, user provisioning, license cleanup
- SPF, DKIM, DMARC configuration and ongoing maintenance
- Email and remote-session help desk, 1 business-day response
- Monthly security health check
- Annual live security awareness training
- Hardware and software asset register
Everything in Essentials, plus:
- Huntress ITDR (Microsoft 365 identity threat detection)
- Microsoft 365 backup (mailbox, OneDrive, SharePoint, Teams)
- Quarterly backup restore testing
- Huntress Managed SAT — phishing simulation + rotating micro-learning
- Help desk with 4-hour business-hours response SLA
- After-hours emergency support callable at standard rate
- Onsite available at preferred per-visit rate within service area
- Annual cyber posture snapshot
- Monthly executive summary report
COMING SOON
Elite
Enhanced security operations for higher-stakes environments.
Everything in Pro, plus:
- Huntress Managed SIEM with weekly log review
- File integrity monitoring on critical endpoints and servers
- Vulnerability scanning with remediation tracking
- Quarterly cyber posture review with written findings
- Custom incident response runbook + annual IR tabletop
- 1-hour priority after-hours callback
- Quarterly business review (QBR)
- Annual technology roadmap
Add-Ons
Available at any tier, priced separately per engagement. Quote depends on scope and environment.
Project Work
- Onsite visits (per-visit fee + travel)
- One-time site setup and provisioning
- Migration projects (Microsoft 365, file servers, hosts, websites)
- New office build-out or network installation
- Hardware procurement scoping and vendor coordination
- Custom security policy authoring (non-compliance)
- Network or system documentation for handoff / diligence
Specialized Engagements
- Penetration test scoping, vendor selection, and remediation oversight
- Compromise assessment (when a breach is suspected or confirmed)
- Forensic data preservation and analysis
- Post-incident written report
- Vendor security questionnaire response (one-off)
- Secure asset disposal coordination (per NIST SP 800-88)
- Additional users, devices, or DR exercises beyond plan cadence
Compliance Add-On
Documented policy sets, audit evidence collection, and framework-mapped posture reporting for regulated industries. Aligned to whichever framework applies to your sector. Quoted as a one-time project for initial documentation, plus an optional monthly retainer for ongoing maintenance as standards update. Available at any tier.
