Security vendor Huntress has put its managed antivirus solution for Microsoft Defender into general availability.
The new service, which has been in public beta since January, went into full-scale production today alongside new host isolation functionality and the official unveiling of global threat analysis and response capabilities. It’s the vendor’s first prevention-focused offering, and joins a portfolio that already includes threat hunting services, ransomware detection and removal software, and an “external recon” solution that identifies attack surfaces and exposed entry points in a customer’s infrastructure.
Provided at no additional cost to all Huntress partners, Huntress Managed Antivirus lets MSPs administer Microsoft Defender implementations across all of the customers they support through a multi-tenant interface, rather than rely on the single-tenant console Microsoft provides. New features added to the system since the start of the year include integration with the Huntress ThreatOps team’s incident response workflow that automatically flows detected incidents into the queue for investigation.
“From there, the analysts will take a look and then do an incident report with actionable remediation,” says Dina Bruzek, Huntress’s senior vice president of product and engineering. The vendor can put those remediation measures into effect itself for users as well through its “assisted remediation” feature.
Other features added in recent months include a revised interface with consolidated status views; support for performing bulk actions on one, several, or all of an MSP’s clients; and the ability to receive notifications when endpoints have outdated signature files, haven’t been scanned recently, or are otherwise in an “unhealthy” state. Users who wish to can then automatically enforce compliance with default configurations.
Huntress plans to augment the system’s functionality further on a continuous basis. A new feature set to arrive within the next few weeks, for example, will notify users if integration issues are preventing them from getting alerts in their PSA solution.
According to Bruzek, channel pros are increasingly relying on Microsoft Defender, which is a free component of the Windows operating system, rather than third-party endpoint protection software to keep clients safe. “The efficacy of [Microsoft] Defender has been increasing over the years,” she says. “It’s just as good as if not better than many of the next-gen AV products on the market today, because it leverages all of the intelligence that Windows gets from all of those endpoints.”
The new host isolation functionality Huntress highlighted today lets users automatically or manually separate a breached or infected device from the rest of a customer’s environment. “It’s very important to be able to isolate that host from the network as quickly as you can to prevent lateral movement,” Bruzek notes.
Huntress will then either send an incident report with remediation guidance or perform assisted remediation on the user’s behalf. Users can also isolate all of the endpoints at one customer or every customer they support through the new feature.
The global ThreatOps expansion Huntress announced today adds analysts in the U.K. and Australia to the North American team the company has operated since its founding. According to Bruzek, those new resources, who are on duty overnight and on weekends rather than simply on call, will benefit partners in the U.S. as well as overseas.