Windows 10 / 11
Standard Huntress agent
GAIntegrations
Most small and mid-market businesses already run a handful of security and IT tools. Obsidian Ridge does not ask you to rip and replace — we connect to your existing stack, ingest the signals, and have the SOC review them. Below is a complete picture of what we plug into today.
Endpoints & devices
Where the Managed EDR agent runs. Light, signed, and deployable across mixed fleets.
Standard Huntress agent
GAIncludes Domain Controllers
GAApple Silicon and Intel
GAServer workloads
GAAgent push via Intune policies
SupportedAgent push for managed Macs
SupportedAgent push for Apple fleets
SupportedAgent push for Apple fleets
SupportedIdentity providers
Where Managed ITDR watches for the patterns that show up before account takeover.
Full identity threat detection
GAFull identity threat detection
GALog forwarding and posture monitoring
SupportedAvailable in Complete tier scope
RoadmapCloud platforms
Cloud workloads ingested into Managed SIEM for unified detection across your stack.
Sentinel logs, Defender for Cloud
GACloudTrail, GuardDuty, S3 access logs
GACloud Audit Logs, SCC findings
SupportedWAF events, Zero Trust logs
SupportedNetwork & perimeter
Firewall, DNS, and VPN telemetry feeding Managed SIEM correlation.
Syslog ingestion
GASyslog and Cortex XDR
GASyslog ingestion
SupportedSyslog and event API
SupportedDNS security telemetry
SupportedActivity logs
SupportedSecurity tools you may already run
We don't ask you to rip and replace. Existing security tools become signal sources for the SOC.
Coexists with Huntress agent
GAAlert ingestion and correlation
SupportedAlert ingestion and correlation
SupportedAlert ingestion and correlation
SupportedProductivity & SaaS
Audit-relevant SaaS log sources for compliance and threat detection.
Audit log forwarding
SupportedAudit log and security event ingestion
SupportedAudit log forwarding
SupportedAvailable in Complete tier scope
RoadmapActivity log forwarding
SupportedFAQ
GA (generally available) means the integration is fully productized and works out of the box on the relevant tier. Supported means we can connect it during onboarding with light configuration work. Roadmap means we can scope it as a custom integration in the Complete tier — typically a one-time setup fee.
Probably yes. The Managed SIEM in the Complete tier accepts standard log formats (Syslog, JSON, Webhook, S3 bucket forwarding). If your tool has any kind of log export, we can usually wire it in. Tell us during the briefing.
We need read-only or scoped admin access to ingest logs and see alerts. For most tools, that means a service account with audit-log read permissions — not a global admin. We document exactly what's needed before deployment.
No. Most integrations are log-forwarding (one-way), not in-line traffic inspection. The Huntress endpoint agent itself is light — under 50 MB of memory, no kernel hooks, signed by Microsoft.
Don't see your tool?
The Managed SIEM in the Complete tier accepts standard log formats (Syslog, JSON, Webhook, S3 forwarding). If your tool can export logs, we can usually ingest them.