{"id":246,"date":"2026-05-03T18:32:20","date_gmt":"2026-05-04T02:32:20","guid":{"rendered":"https:\/\/rainier-it.com\/blog\/?p=246"},"modified":"2026-05-03T22:49:04","modified_gmt":"2026-05-04T06:49:04","slug":"what-huntress-edr-actually-does-in-plain-english-then-under-the-hood","status":"publish","type":"post","link":"https:\/\/rainier-it.com\/blog\/what-huntress-edr-actually-does-in-plain-english-then-under-the-hood\/","title":{"rendered":"What Huntress EDR Actually Does"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>One of the most common questions we get: <em>what&#8217;s the difference between the antivirus built into Windows and the extra security tools we recommend?<\/em> The short answer is <strong>Huntress Managed EDR<\/strong>, and the long answer is below: first in plain English, then under the hood for the technically curious.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Why this isn&#8217;t optional anymore<\/h2>\n\n\n\n<p>Cybersecurity guides love big numbers, but the ones that actually matter for a small business are the ones that show up on a cyber-insurance renewal. Here&#8217;s the 2026 reality, pulled from the same sources we hand to our clients&#8217; insurance carriers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>88%<\/strong> of SMB breaches in 2025 involved <strong>ransomware<\/strong> \u2014 versus 39% at large organizations. Small businesses are the target, not collateral damage. <em>(Verizon 2025 DBIR, SMB Snapshot)<\/em><\/li>\n\n\n\n<li><strong>$115,000<\/strong> median ransom payment in 2025 \u2014 <em>before<\/em> recovery, downtime, or legal costs. <em>(Verizon DBIR)<\/em><\/li>\n\n\n\n<li><strong>81%<\/strong> of SMB ransomware claims involve <strong>operational shutdown<\/strong> \u2014 not just data loss, lost revenue. <em>(NetDiligence 15th Annual Cyber Claims Study, n=10,402)<\/em><\/li>\n\n\n\n<li><strong>$84,000<\/strong> average ransomware claim for businesses under $25M revenue. Small enough to feel real. Large enough to be fatal. <em>(Coalition 2025 Cyber Claims Report)<\/em><\/li>\n\n\n\n<li><strong>82%<\/strong> of denied cyber-insurance claims lacked basic MFA and EDR. <em>The same controls that prevent breaches are the ones that get claims paid.<\/em> <em>(Coalition 2024 data, via Marsh McLennan, Aug 2025)<\/em><\/li>\n<\/ul>\n\n\n\n<p>That last one is the kicker: even when something is covered, carriers are denying claims when the basics aren&#8217;t there. EDR \u2014 the kind of EDR a real human watches 24\/7 \u2014 is on every modern insurance application. Huntress is how we say <em>yes<\/em> to that question without flinching.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What is &#8220;EDR,&#8221; and how is it different from antivirus?<\/h2>\n\n\n\n<p>Old-school antivirus is a <strong>bouncer at the door<\/strong>. It checks every file against a list of known troublemakers (signatures). If the file&#8217;s name and fingerprint are on the list, it gets turned away. Useful \u2014 but it only catches threats that have already been seen and catalogued. A new variant, an obfuscated payload, or an attacker using <em>your own legitimate tools<\/em> against you (PowerShell, Microsoft Office macros, scheduled tasks) walks right in.<\/p>\n\n\n\n<p><strong>EDR \u2014 Endpoint Detection &amp; Response \u2014 is a security camera with a guard watching the feed.<\/strong> Instead of just checking the door, it watches what processes <em>do<\/em> after they&#8217;re running. A program that quietly creates a registry key to launch itself at boot. A spreadsheet macro that spawns PowerShell. A scheduled task added at 2 a.m. on a Saturday. None of these are necessarily &#8220;a virus&#8221; \u2014 but together they&#8217;re a hacker&#8217;s playbook, and EDR catches the pattern.<\/p>\n\n\n\n<p><strong>Managed EDR<\/strong> means there is a real human on the other end of that camera feed. That&#8217;s the part that matters most for a small business: you do not need a security analyst on staff. Huntress provides one \u2014 actually, <em>a whole 24\/7 team of them<\/em> \u2014 for less than what one would cost you for a single afternoon.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">What Huntress actually does for you<\/h2>\n\n\n\n<p>There are three pieces, and they all run quietly in the background:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. A lightweight agent on every PC and server<\/h3>\n\n\n\n<p>It installs in seconds, uses negligible resources, and starts collecting the specific kinds of activity that hackers leave behind. It is not flashy \u2014 there is no big icon in your system tray, no scary popups, no &#8220;your computer is at risk!&#8221; nags. It is invisible until something is actually wrong.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. A 24\/7 team of human security analysts in Maryland (and around the globe)<\/h3>\n\n\n\n<p>This is the part competitors can&#8217;t fake. When the agent sees something suspicious, it gets escalated to a real Huntress security analyst \u2014 within <strong>8 minutes on average<\/strong> (the industry standard is hours, sometimes days). They investigate, confirm whether it&#8217;s a real attack, and either remediate it for you with a single click or send a plain-English report explaining what to do next. False positive rate is <strong>under 1%<\/strong> \u2014 meaning when Huntress sends a ticket, it&#8217;s almost always real, so we (and you) don&#8217;t get alert-fatigued.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Ransomware tripwires, identity protection, and security awareness training<\/h3>\n\n\n\n<p>On top of the EDR core, Huntress quietly drops <strong>canary files<\/strong> across your endpoints \u2014 fake decoy documents that look like &#8220;Q4-Financials.xlsx&#8221; but exist only to get encrypted first. The moment one of them is touched, the SOC knows ransomware is running and starts isolating the machine \u2014 <em>often before the attacker finishes encrypting the actual share<\/em>. Their <strong>Managed ITDR<\/strong> service watches your Microsoft 365 logins for the same kinds of attacks (stolen tokens, malicious OAuth apps, hidden mail-forwarding rules). And their <strong>Managed Security Awareness Training<\/strong> sends bite-sized phishing simulations and three-minute training videos to your team every month \u2014 the same training your insurer is asking you to provide.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd2c Now the technical part<\/h2>\n\n\n\n<p>If you stopped reading at the end of the last section, you have the gist. If you want to know <em>how<\/em> Huntress finds things antivirus misses, keep going.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How the agent decides something is suspicious<\/h2>\n\n\n\n<p>Huntress&#8217;s core EDR engine, called <strong>Process Insights<\/strong>, watches every process at creation time and maps its behavior against the <strong>MITRE ATT&amp;CK Framework<\/strong> \u2014 the industry-standard catalog of every known attacker technique. It does not rely on file hashes or signatures, which is why it catches zero-days and heavily obfuscated payloads that traditional AV misses entirely.<\/p>\n\n\n\n<p>On top of that, the agent collects targeted telemetry from the exact places attackers love to hide for long-term access \u2014 what the security industry calls <strong>persistence mechanisms<\/strong>. There are roughly a dozen common ones, and Huntress watches all of them:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Registry Run keys<\/strong> \u2014 the autostart locations under <code>HKCU\\<wbr>Software\\<wbr>Microsoft\\<wbr>Windows\\<wbr>CurrentVersion\\<wbr>Run<\/code> and a half-dozen siblings<\/li>\n\n\n\n<li><strong>Scheduled tasks<\/strong> \u2014 created via <code>schtasks.exe<\/code>, often with innocent-looking names like <code>GoogleUpdateTaskMachineCore<\/code><\/li>\n\n\n\n<li><strong>Windows services<\/strong> \u2014 installed via <code>sc create<\/code> or PowerShell, configured to run as SYSTEM<\/li>\n\n\n\n<li><strong>Browser extensions<\/strong> \u2014 modern attackers ship malicious Chrome\/Edge extensions that exfiltrate session cookies<\/li>\n\n\n\n<li><strong>WMI event subscriptions<\/strong> \u2014 fileless persistence that survives reboots and most cleanup tools<\/li>\n\n\n\n<li><strong>DLL search-order hijacks<\/strong>, BITS jobs, AppInit DLLs, IFEO debuggers, and several more obscure techniques<\/li>\n<\/ul>\n\n\n\n<p>Here&#8217;s an example of what an attacker plants and what Huntress sees on the next agent check-in:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#2e3440ff\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" style=\"color:#d8dee9ff;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" tabindex=\"-1\" aria-hidden=\"true\" readonly># Adversary plants a Run key \u2014 survives reboot, no file dropped\n$payload = \"powershell -nop -w hidden -enc &lt;base64>\"\nNew-ItemProperty `\n  -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" `\n  -Name \"OneDriveSync\" `        # blends in with real Microsoft entries\n  -Value $payload -PropertyType String -Force\n\n# Huntress collects this exact registry path on every check-in.\n# An analyst sees \"OneDriveSync\" pointing at encoded PowerShell \u2192 ticket opens.<\/textarea><\/pre><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki nord\" style=\"background-color: #2e3440ff\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #616E88\"># Adversary plants a Run key \u2014 survives reboot, no file dropped<\/span><\/span>\n<span class=\"line\"><span style=\"color: #81A1C1\">$<\/span><span style=\"color: #D8DEE9\">payload<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #81A1C1\">=<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">powershell -nop -w hidden -enc &lt;base64&gt;<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88C0D0\">New-ItemProperty<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #81A1C1\">`<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">Path <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #81A1C1\">`<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">Name <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">OneDriveSync<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #81A1C1\">`<\/span><span style=\"color: #D8DEE9FF\">        <\/span><span style=\"color: #616E88\"># blends in with real Microsoft entries<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">Value <\/span><span style=\"color: #81A1C1\">$<\/span><span style=\"color: #D8DEE9\">payload<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">PropertyType String <\/span><span style=\"color: #81A1C1\">-<\/span><span style=\"color: #D8DEE9FF\">Force<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #616E88\"># Huntress collects this exact registry path on every check-in.<\/span><\/span>\n<span class=\"line\"><span style=\"color: #616E88\"># An analyst sees &quot;OneDriveSync&quot; pointing at encoded PowerShell \u2192 ticket opens.<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>Antivirus would not flag this \u2014 there is no malicious file on disk. PowerShell is a legitimate Windows tool. The Run key is a legitimate Windows feature. Only by collecting that specific registry path and letting a human (or a model trained by humans) look at the value would you ever notice the encoded payload pointing somewhere it shouldn&#8217;t.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Canaries: the tripwire model<\/h2>\n\n\n\n<p>Most security tools try to detect ransomware by recognizing the malware itself. That is a losing arms race \u2014 there are dozens of new ransomware families per quarter and any of them can recompile in an afternoon to evade signatures. Huntress takes a different angle: <strong>detect the behavior, not the binary<\/strong>.<\/p>\n\n\n\n<p>On every protected endpoint, Huntress drops small, hidden, lightweight files into directories ransomware typically targets first \u2014 Documents, Desktop, network shares. They look like ordinary documents but are watched continuously by the agent. They have three states:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Armed<\/strong> \u2014 successfully deployed, monitored, untouched<\/li>\n\n\n\n<li><strong>Pending<\/strong> \u2014 queued to be placed on a newly-onboarded endpoint<\/li>\n\n\n\n<li><strong>Tripped<\/strong> \u2014 modified, renamed, or deleted (i.e., a ransomware operator just hit them)<\/li>\n<\/ul>\n\n\n\n<p>The instant a canary is tripped, the agent fires an incident report to the SOC, who confirm whether it&#8217;s real ransomware (and not, say, you running a backup tool that touched the file). If it&#8217;s real, isolation begins:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#2e3440ff\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" style=\"color:#d8dee9ff;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" tabindex=\"-1\" aria-hidden=\"true\" readonly># Ransomware encrypts everything it can see, including our tripwires\n$ tree -L 1 ~\/Documents | head\n\u251c\u2500\u2500 ImportantFile.docx.locked        \u2190 encrypted by ransomware\n\u251c\u2500\u2500 budget-2026.xlsx.locked          \u2190 encrypted by ransomware\n\u2514\u2500\u2500 .huntress_canary_4f3a.txt.locked \u2190 canary file modified\n\n# The Huntress agent notices the canary changed \u2192 SOC opens an incident\n# within minutes \u2014 usually before the operator finishes encrypting the share.<\/textarea><\/pre><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki nord\" style=\"background-color: #2e3440ff\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #616E88\"># Ransomware encrypts everything it can see, including our tripwires<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88C0D0\">$<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">tree<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">-L<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #B48EAD\">1<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">~\/Documents<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #81A1C1\">|<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #88C0D0\">head<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88C0D0\">\u251c\u2500\u2500<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">ImportantFile.docx.locked<\/span><span style=\"color: #D8DEE9FF\">        <\/span><span style=\"color: #A3BE8C\">\u2190<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">encrypted<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">by<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">ransomware<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88C0D0\">\u251c\u2500\u2500<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">budget-2026.xlsx.locked<\/span><span style=\"color: #D8DEE9FF\">          <\/span><span style=\"color: #A3BE8C\">\u2190<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">encrypted<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">by<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">ransomware<\/span><\/span>\n<span class=\"line\"><span style=\"color: #88C0D0\">\u2514\u2500\u2500<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">.huntress_canary_4f3a.txt.locked<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">\u2190<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">canary<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">file<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #A3BE8C\">modified<\/span><\/span>\n<span class=\"line\"><\/span>\n<span class=\"line\"><span style=\"color: #616E88\"># The Huntress agent notices the canary changed \u2192 SOC opens an incident<\/span><\/span>\n<span class=\"line\"><span style=\"color: #616E88\"># within minutes \u2014 usually before the operator finishes encrypting the share.<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>This works because ransomware operators don&#8217;t read the file system carefully \u2014 they recursively encrypt everything they can. The same blunt-force behavior that makes ransomware destructive also makes it impossible to avoid the canaries. By the time the operator finishes the run, the SOC has been alerted and is already pulling the network plug.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Managed ITDR: identity is the new endpoint<\/h2>\n\n\n\n<p>Huntress&#8217;s biggest 2025 expansion was <strong>Managed ITDR<\/strong> \u2014 Identity Threat Detection &amp; Response \u2014 which extends the same SOC model to your Microsoft 365 tenant. The reason is simple: in 2026, attackers don&#8217;t break into your laptop, they steal your <strong>session token<\/strong> and log in as you from somewhere else, bypassing MFA entirely. Endpoint EDR can&#8217;t see that. ITDR can.<\/p>\n\n\n\n<p>It runs three detection engines in parallel:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unwanted Access<\/strong> \u2014 account takeovers, impossible-travel logins, VPN-laundered sessions, session hijacking<\/li>\n\n\n\n<li><strong>Shadow Workflows<\/strong> \u2014 malicious inbox rules and mail forwarding (the #1 BEC technique: silently forward all mail with the word &#8220;invoice&#8221; to attacker.com)<\/li>\n\n\n\n<li><strong>Rogue Apps<\/strong> \u2014 malicious or risky OAuth applications that piggyback on legitimate consent flows (industry-first capability \u2014 Huntress analyzed over 20 million OAuth apps to build the baseline)<\/li>\n<\/ul>\n\n\n\n<p>This is what a Rogue App actually looks like in your tenant \u2014 the kind of permissions you&#8217;d never knowingly grant, attached to an app with a name that pattern-matches something you trust:<\/p>\n\n\n\n<div class=\"wp-block-kevinbatdorf-code-block-pro\" data-code-block-pro-font-family=\"Code-Pro-JetBrains-Mono\" style=\"font-size:.875rem;font-family:Code-Pro-JetBrains-Mono,ui-monospace,SFMono-Regular,Menlo,Monaco,Consolas,monospace;line-height:1.25rem;--cbp-tab-width:2;tab-size:var(--cbp-tab-width, 2)\"><span style=\"display:block;padding:16px 0 0 16px;margin-bottom:-1px;width:100%;text-align:left;background-color:#2e3440ff\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"54\" height=\"14\" viewBox=\"0 0 54 14\"><g fill=\"none\" fill-rule=\"evenodd\" transform=\"translate(1 1)\"><circle cx=\"6\" cy=\"6\" r=\"6\" fill=\"#FF5F56\" stroke=\"#E0443E\" stroke-width=\".5\"><\/circle><circle cx=\"26\" cy=\"6\" r=\"6\" fill=\"#FFBD2E\" stroke=\"#DEA123\" stroke-width=\".5\"><\/circle><circle cx=\"46\" cy=\"6\" r=\"6\" fill=\"#27C93F\" stroke=\"#1AAB29\" stroke-width=\".5\"><\/circle><\/g><\/svg><\/span><span role=\"button\" tabindex=\"0\" style=\"color:#d8dee9ff;display:none\" aria-label=\"Copy\" class=\"code-block-pro-copy-button\"><pre class=\"code-block-pro-copy-button-pre\" aria-hidden=\"true\"><textarea class=\"code-block-pro-copy-button-textarea\" tabindex=\"-1\" aria-hidden=\"true\" readonly>{\n  \"appDisplayName\": \"Adobe Acrobat Sign for Outlook\",   \/\/ looks legit\n  \"publisherName\":  \"free-mail-tools-llc\",              \/\/ it's not\n  \"consentType\":    \"AllPrincipals\",                    \/\/ org-wide consent\n  \"scopes\": &#91;\n    \"Mail.ReadWrite\",        \/\/ read AND modify every inbox\n    \"Mail.Send\",             \/\/ send mail as any user\n    \"MailboxSettings.ReadWrite\",  \/\/ create stealth forwarding rules\n    \"offline_access\"         \/\/ refresh tokens forever \u2014 no re-auth\n  &#93;,\n  \"addedBy\": \"compromised.user@yourcompany.com\",\n  \"addedAt\": \"2026-04-29T03:14:07Z\"\n}<\/textarea><\/pre><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:24px;height:24px\" fill=\"none\" viewBox=\"0 0 24 24\" stroke=\"currentColor\" stroke-width=\"2\"><path class=\"with-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2m-6 9l2 2 4-4\"><\/path><path class=\"without-check\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M9 5H7a2 2 0 00-2 2v12a2 2 0 002 2h10a2 2 0 002-2V7a2 2 0 00-2-2h-2M9 5a2 2 0 002 2h2a2 2 0 002-2M9 5a2 2 0 012-2h2a2 2 0 012 2\"><\/path><\/svg><\/span><pre class=\"shiki nord\" style=\"background-color: #2e3440ff\" tabindex=\"0\"><code><span class=\"line\"><span style=\"color: #ECEFF4\">{<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #8FBCBB\">appDisplayName<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">:<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">Adobe Acrobat Sign for Outlook<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">,<\/span><span style=\"color: #D8DEE9FF\">   <\/span><span style=\"color: #616E88\">\/\/ looks legit<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #8FBCBB\">publisherName<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">:<\/span><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">free-mail-tools-llc<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">,<\/span><span style=\"color: #D8DEE9FF\">              <\/span><span style=\"color: #616E88\">\/\/ it&#39;s not<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #8FBCBB\">consentType<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">:<\/span><span style=\"color: #D8DEE9FF\">    <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">AllPrincipals<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">,<\/span><span style=\"color: #D8DEE9FF\">                    <\/span><span style=\"color: #616E88\">\/\/ org-wide consent<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #8FBCBB\">scopes<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">:<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #ECEFF4\">&#91;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">    <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">Mail.ReadWrite<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">,<\/span><span style=\"color: #D8DEE9FF\">        <\/span><span style=\"color: #616E88\">\/\/ read AND modify every inbox<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">    <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">Mail.Send<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">,<\/span><span style=\"color: #D8DEE9FF\">             <\/span><span style=\"color: #616E88\">\/\/ send mail as any user<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">    <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">MailboxSettings.ReadWrite<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">,<\/span><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #616E88\">\/\/ create stealth forwarding rules<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">    <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">offline_access<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #D8DEE9FF\">         <\/span><span style=\"color: #616E88\">\/\/ refresh tokens forever \u2014 no re-auth<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&#93;,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #8FBCBB\">addedBy<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">:<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">compromised.user@yourcompany.com<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">,<\/span><\/span>\n<span class=\"line\"><span style=\"color: #D8DEE9FF\">  <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #8FBCBB\">addedAt<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #ECEFF4\">:<\/span><span style=\"color: #D8DEE9FF\"> <\/span><span style=\"color: #ECEFF4\">&quot;<\/span><span style=\"color: #A3BE8C\">2026-04-29T03:14:07Z<\/span><span style=\"color: #ECEFF4\">&quot;<\/span><\/span>\n<span class=\"line\"><span style=\"color: #ECEFF4\">}<\/span><\/span><\/code><\/pre><\/div>\n\n\n\n<p>Across 1.7 million identities under management, Huntress has stopped over 28,000 identity-based attacks with a <strong>mean time to respond under 3 minutes<\/strong>. For a small business, that is the difference between <em>&#8220;the SOC isolated the account before the attacker sent a wire-transfer email&#8221;<\/em> and <em>&#8220;our bookkeeper just paid a fake invoice for $40,000.&#8221;<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Why this beats &#8220;we already have antivirus&#8221;<\/h2>\n\n\n\n<p>Three things separate Huntress from the security stack you may already be running:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>It assumes the attacker is already inside.<\/strong> Traditional AV asks &#8220;is this file bad?&#8221; Huntress asks &#8220;does this <em>behavior<\/em> look like an attacker who&#8217;s already past the door?&#8221; That model catches insider threats, supply-chain compromises, and credential-theft attacks that bypass prevention entirely.<\/li>\n\n\n\n<li><strong>The SOC is not optional or upsell.<\/strong> Many EDR products technically include &#8220;managed&#8221; tiers but ship as software-only by default. Huntress is the opposite \u2014 it is <em>only<\/em> sold managed. There is no tier where you&#8217;re staring at alerts alone at 2 a.m. The 24\/7 SOC is the product.<\/li>\n\n\n\n<li><strong>The false positive rate is genuinely under 1%.<\/strong> Real-world MSP reviewers consistently report &#8220;under 1 minute&#8221; to reach a human Huntress analyst. Compare that to the typical EDR experience of drowning in low-confidence alerts that nobody triages, until one of them was actually real.<\/li>\n<\/ul>\n\n\n\n<p>Huntress won the <strong>2026 SC Award for Best Managed Detection and Response Service<\/strong> and holds a 98.6% customer satisfaction score on Gartner Peer Insights. None of which would matter if it didn&#8217;t work \u2014 but it does, repeatedly, in real-world incidents on real client networks (including ours).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">How we ship it<\/h2>\n\n\n\n<p>Huntress Managed EDR is an <strong>Authorized Partner<\/strong> product for Rainier IT \u2014 meaning we deploy and manage it on every plan that ships with 24\/7 SOC:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Small-business flat-rate plans:<\/strong> included on <a href=\"https:\/\/rainier-it.com\/small-business\/\">Business Shield<\/a> ($199\/mo) and Business Fortress ($349\/month)<\/li>\n\n\n\n<li><strong>Per-user plans:<\/strong> included on <a href=\"https:\/\/rainier-it.com\/pricing\/\">Co-Managed<\/a>, Managed Pro, and Enterprise tiers<\/li>\n\n\n\n<li><strong>Standalone:<\/strong> $25\/endpoint\/month for clients who want EDR without a managed plan.<\/li>\n\n\n\n<li><strong>Add-on for <a href=\"https:\/\/rainier-it.com\/small-business\/\">Business Watch<\/a>:<\/strong> $5\/endpoint\/month \u2014 the cheapest way to get Huntress on a small-business plan without jumping to Shield.<\/li>\n<\/ul>\n\n\n\n<p>On every deployment we pair Huntress with a <strong>CIS-hardened Microsoft Defender<\/strong> baseline (16 ASR rules, BitLocker, Windows LAPS, no standing local admin), pushed via TacticalRMM and Action1, drift-corrected weekly. Defender does the prevention work it&#8217;s good at; Huntress does the detection-and-response work that prevention alone can&#8217;t cover. Together, that&#8217;s the security baseline your insurance carrier is asking for \u2014 and the one we&#8217;d want on our own machines if we were buying for ourselves. (We are. We do.)<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Questions? <a href=\"https:\/\/rainier-it.com\/contact.html\">Get in touch<\/a>, or schedule a 30-minute call. We can pull a sample Huntress report from a real (anonymized) incident on a real network and walk you through what the SOC actually saw and did.<\/p>\n\n\n\n<p>Stay safe out there.<\/p>\n\n\n\n<p>\u2014 Christopher<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A non-technical (then technical) walkthrough of Huntress Managed EDR \u2014 what it is, how it catches what antivirus misses, and the 2026 SMB breach numbers that explain why it ships on every plan.<\/p>\n","protected":false},"author":2,"featured_media":249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,6,8],"tags":[],"class_list":["post-246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices","category-cybersecurity","category-managed-it-services"],"_links":{"self":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":10,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts\/246\/revisions"}],"predecessor-version":[{"id":260,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/posts\/246\/revisions\/260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/media\/249"}],"wp:attachment":[{"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rainier-it.com\/blog\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}