Obsidian Ridge

Managed ITDR

The identity layer is where the breach actually starts.

Most account compromises in 2026 do not begin with a stolen password. They begin with a phished session token replayed from another country, while MFA is still happily green. Managed ITDR is the layer of detection that watches Microsoft 365, Entra ID, and Google Workspace for those signals — and the practitioner who picks up the phone when one fires at 3 a.m. Bundled in Protected at $32 per user per month.

What is ITDR?

A one-paragraph definition before the sales copy

Identity Threat Detection and Response (ITDR) is the set of detections and response actions focused on the identity layer of your business — sign-ins, session tokens, MFA events, OAuth consents, mailbox rules, and privileged-role changes — rather than the endpoint layer.

It exists because most modern attacks against small businesses never touch an endpoint at all. The attacker phishes a session token, replays it from a foreign IP, sets a mail rule to hide their tracks, and sends a fraudulent wire-instructions email from inside the victim's real mailbox. EDR cannot see any of that. ITDR can.

Managed ITDR adds the part that decides whether the service produces outcomes or just notifications: a 24/7 Security Operations Center reviewing the alerts, plus a CISSP-led practitioner who coordinates the actual response.

Source: Huntress Managed ITDR platform overview

TL;DR

What you get, what it costs, and why it pays for itself

We operate Huntress Managed ITDR for you — the same identity threat detection platform Huntress runs for 200,000+ organizations, deployed and tuned to your Microsoft 365 or Google Workspace tenant.

The Huntress 24/7 SOC reviews identity alerts within minutes, automatically isolates confirmed compromised accounts, and Obsidian Ridge picks up the practitioner side: response coordination, evidence capture, insurance notification, and the post-incident debrief.

Managed ITDR is included in Protected at $32 per user per month and Complete from $55 per user per month. The Foundation tier ($15 per agent per month) is endpoint-only and does not include ITDR.

Stopping a single business-email-compromise attempt typically covers years of service.

What's included

Everything that goes into Managed ITDR

Anomalous sign-in detection

Impossible travel, anonymous proxy and Tor sign-ins, foreign-IP logins to accounts that have no business outside one country. Detections come from the Huntress Managed ITDR platform and are reviewed by an analyst before anything reaches you.

Token replay and AiTM detection

Modern phishing kits steal session tokens, not passwords, then replay them from a different country. MFA is already satisfied. Detection has to happen on session behaviour. That is what this watches for.

Anomalous mail-rule monitoring

Auto-forwarding rules, rules that delete on receipt, rules that hide messages matching wire or ACH or invoice — these are the canonical staging step for business email compromise. We see them within minutes of creation.

OAuth consent and app-registration review

Consent phishing is the quieter cousin of credential theft. A user grants a malicious app mailbox access, no password ever changes hands, and the attacker has a stable foothold. The SOC reviews new consents and risky app registrations.

MFA fatigue and bypass patterns

Repeated push prompts, MFA method changes, fallback to weaker factors, and registration of attacker-controlled authenticators are all surfaced. We tell you when an account looks like it is being worn down.

Incident response coordination

If an identity is compromised, you are not left translating tool alerts into next steps. We coordinate session revocation, password and MFA reset, audit-log review, insurance notification, and the post-incident debrief.

The detection platform is Huntress Managed ITDR — Huntress builds and runs the detection engine and the 24/7 SOC. Obsidian Ridge does not claim to have built the detection platform. We deploy it, tune the policies for your environment, handle the escalations Huntress raises, and own the practitioner-side response — coordination, evidence capture, insurance notification, and the post-incident write-up.

Source: Huntress Managed ITDR platform overview

Compare honestly

EDR alone vs MDR alone vs MDR + ITDR

The question is rarely “which acronym is best.” It is “which one of these would have caught the attack that actually hit a business like yours last quarter?” This table is honest about where each one is blind.

Attack patternEDR aloneMDR alone (endpoint-only)MDR + Managed ITDR
Phishing email lands, user clicksNot seen — no endpoint malwareNot seen — endpoint-only scopeSign-in anomaly + session events caught
Attacker replays stolen session token from abroadInvisible — happens in the cloudInvisible — happens in the cloudImpossible-travel + risky sign-in flagged
Attacker creates auto-forward rule for ‘wire OR ACH’Not seenNot seenInbox-rule alert within minutes
Malicious OAuth app granted mailbox accessNot seenNot seenConsent review + revoke action
Ransomware on a laptopCaught — endpoint detection worksCaught + analyst responseCaught + analyst response
Best fitTech-mature teams that staff their own triageEndpoint-heavy orgs without cloud identity riskAny business running Microsoft 365 or Google Workspace

If your business runs on Microsoft 365 or Google Workspace, identity is where the attacker is going. Buying endpoint-only detection in 2026 is buying a fence around the building while leaving the front door open.

See the save

What an ITDR save actually looks like at 3 a.m.

A short walkthrough of the kind of identity incident this service is built to catch. Anonymized, but the shape of the attack and response are real.

Compliance mapping

What auditors and underwriters actually see

Managed ITDR supports and produces evidence for the identity-side controls most frameworks now ask about. It does not make your organization compliant on its own — nothing does — but the detection logs, response records, and incident reports are the artifacts the auditors and underwriters keep asking for.

  • SOC 2 CC6 (Logical and Physical Access)— supports monitoring of authentication events, session controls, and access anomalies, with evidence preserved in the case file.
  • HIPAA Security Rule 164.312(b) Audit Controls— produces the audit-log review and anomaly-detection records required for technical safeguards. The ePHI scoping itself remains the covered entity's responsibility.
  • ISO/IEC 27001 A.5.16 and A.5.17 (Identity management, Authentication information)— supports the operational evidence for identity lifecycle and authentication monitoring controls.

Where carriers and auditors used to accept an attestation checkbox, more of them now ask for the actual log review evidence. That is what ITDR produces continuously rather than as a one-time exercise.

Pricing

Three tiers. ITDR is in two of them.

We are explicit: Foundation is endpoint-only and does not include identity monitoring. If your real risk is in Microsoft 365 or Google Workspace, you want Protected or Complete. We will tell you that on the triage call too.

Prices in USD · per agent or per user

Tier 01 · Foundation

Foundation

$15/ agent / mo

EDR only · ITDR not included

Endpoint protection watched 24/7. Useful, but it does not see what happens inside Microsoft 365 or Entra ID. If identity is your real risk, you want Protected.

What's included

  • Always-on endpoint protection.EDR: the agent watches endpoint activity; the SOC reviews the alerts. Identity-side events are not part of this tier.
  • Human alert review.SOC triage: endpoint alerts are read by an analyst before they reach you, but Microsoft 365 sign-ins, inbox rules, and OAuth consents are not monitored here.
  • Quarterly posture check-in.Posture review: a senior practitioner reviews what changed and what still needs attention.
  • Direct email support.Security advisory: a person to ask when something feels off, not a generic ticket queue.
  • No ITDR coverage at this tier.Identity monitoring: if you want token-theft and inbox-rule detection, step up to Protected.

Replaces or complements

  • Antivirus subscriptions that flag everything and stop nothing
  • Generic IT-installed protection with no one reviewing alerts
  • Monthly log review your team never finds time for
Cyber insurance baselineSOC 2 readinessHIPAA Security Rule

Tier 03 · Complete

Complete

from$55/ user / mo

Scoped · log sources priced separately

Managed ITDR plus 90-day evidence retention, quarterly tabletop drills, and reserved practitioner hours. For teams that already feel the weight of compliance.

Everything in Protected, plus

  • Audit-ready security records.SIEM: logs from endpoints, identity, network, and cloud tools are collected so investigations and evidence requests are easier to answer.
  • Searchable evidence for 90 days.Log retention: when someone asks what happened, we investigate from stored security records instead of rebuilding the story after the fact.
  • Quarterly tabletop drill.Tabletop exercise: we walk through what your team would do if a token-theft incident hit, before the pressure is real.
  • Senior practitioner — 4 hrs/mo reserved.Practitioner hours: security questions, policy decisions, vendor reviews, audit prep.
  • Framework alignment support.Compliance readiness: we help turn identity detection and response work into clearer evidence for audits, renewals, and client reviews.

Replaces or complements

  • Separate logging tools no one reads
  • Advisory retainers with no monitoring behind them
  • A patchwork of identity tools that don't talk to each other
Cyber insurance baselineSOC 2 Type IIHIPAA · PCI-DSS
From $15 / agent / moStart with Foundation
Request pricing

Add-on · Identity posture

Huntress Managed ISPM — the prevention layer that sits in front of ITDR

Managed ITDR catches identity attacks that are happening right now. Managed Identity Security Posture Management (ISPM) reduces the conditions that make those attacks possible in the first place. It runs continuous checks against the Microsoft 365 and Entra ID configurations attackers actually abuse — legacy authentication still enabled, MFA gaps on privileged accounts, risky OAuth consent settings, dormant admin roles, shared mailboxes used as user accounts — and turns the findings into a prioritized remediation plan a real human reviews with you.

We offer Managed ISPM as an add-on to the Protected and Complete tiers through our Huntress partnership. Like ITDR, it is operated end-to-end: findings are triaged, deduplicated, and scheduled for closure rather than landing as another dashboard you have to learn.

Huntress Managed ISPM vs Microsoft Entra ID Governance

Both products improve identity security in Microsoft environments, but they answer different questions — and the right choice depends on team size and licensing.

CapabilityHuntress Managed ISPMMicrosoft Entra ID Governance
Primary purposeDetect and prioritize identity misconfigurations that make account compromise easier.Govern the identity lifecycle — access reviews, entitlement management, lifecycle workflows.
Who operates itHuntress + Obsidian Ridge. Findings come with remediation guidance and a coordinated closure plan.Customer IT team. Powerful tooling, but the configuration and review workflows are yours to run.
LicensingIncluded with the Huntress identity stack. No additional Microsoft license required.Requires Entra ID Governance — a separate paid SKU on top of Entra ID P1/P2.
Deployment frictionLow. Connects to the tenant via standard Microsoft Graph permissions; first findings within hours.Higher. Access reviews, entitlement packages, and lifecycle workflows are designed for organizations with mature identity governance practices.
Best forTeams that need posture improvement and prioritized fixes without standing up a governance program.Larger organizations running formal access certifications and joiner-mover- leaver automation.
Relationship to ITDRReduces the configuration gaps that ITDR alerts on — fewer preventable incidents to chase.Tightens who has access, but does not surface configuration risks ITDR cares about (legacy auth, OAuth consent, mailbox rules).

For most small and mid-market organizations on Microsoft 365, the honest answer is start with ISPM. It pays for itself the first time it catches legacy authentication still enabled on a shared mailbox, or an admin without MFA, before an attacker does. Entra ID Governance is excellent but priced and scoped for enterprises with a dedicated identity team to operate it.

Sources: Huntress posture management announcement · Huntress ISPM documentation · Microsoft Entra ID Governance overview

Honest fit check

Who Managed ITDR is not for

Managed ITDR is the right fit for most small and mid-market businesses running Microsoft 365 or Google Workspace and worried about account compromise, business email compromise, or wire-fraud staging. It is not the right fit if:

  • You do not actually use a cloud productivity suite. If everything is on-premises file shares and a local Exchange server, the identity attack surface is different and ITDR is the wrong starting point.
  • You already run an in-house identity SOC — whether that is Huntress Managed ITDR you operate yourself, Microsoft Defender for Cloud Apps + Entra ID Protection, or a SIEM with custom identity detections — with a 24/7 team reading the alerts. Then you do not need us — you need a peer review, not a managed service.
  • You want a one-time identity assessment PDF and nothing afterward. Buy a consultant for that. We are a continuous service, not a deliverable.
  • You want a vendor who will tell you every alert is critical so the dashboard looks impressive. We tell you when you don't need us.

If any of those describe you, we will say so on the triage call. No hard feelings.

What happens after you reach out

From first call to first identity alert handled

01

Free 20-minute triage

A direct call with the practitioner. We confirm fit, scope, and whether you actually need ITDR or whether the right next step is something simpler — turning on Conditional Access, blocking external auto-forwarding at the tenant level, fixing MFA hygiene. If you don't need us, we say so.

02

30-minute briefing & written proposal

Within one business day after the briefing, you get a fixed-fee proposal with scope, term, onboarding fee, and timeline. The tenants we will connect to and the signals we will pull from each one are listed by name.

03

Identity onboarding (5–10 business days)

Huntress Managed ITDR deployment: tenant connection (Microsoft 365 / Entra ID / Google Workspace), detection policy baseline, sign-in risk thresholds, mail-rule and OAuth-consent policies, escalation paths, and tabletop walkthrough of the first incident-response runbook.

04

24/7 operation, ongoing

The SOC is watching from day one. You get a 30-day check-in, monthly identity reports, and a practitioner you can call when a sign-in looks wrong — or when you simply want a second opinion on whether to grant an OAuth consent.

FAQ

Questions that come up before signing

What is the difference between MDR and ITDR?

MDR (Managed Detection and Response) watches your endpoints — laptops, servers, workstations — and responds when they show signs of compromise. ITDR (Identity Threat Detection and Response) watches the identity layer: Microsoft 365 sign-ins, Entra ID risk events, Google Workspace logins, OAuth consents, and mailbox rules. They are complementary, not competing. Most modern attacks start in identity (a phished session token) and never touch an endpoint, so MDR alone leaves a real gap. ITDR closes that gap. The Protected tier of Obsidian Ridge bundles both.

Do I need ITDR if I already have MFA?

Yes. MFA blocks password-only attacks, but it does not stop adversary-in-the-middle (AiTM) phishing kits that capture the authenticated session itself. Once an attacker holds a valid session token, they can replay it from anywhere and your tenant sees them as fully MFA-authenticated. Huntress and other major industry threat-reporting teams have repeatedly identified AiTM and token theft as a primary identity-compromise pattern against small and mid-market businesses.

What identity attacks does ITDR catch that EDR doesn't?

Anything that happens entirely in the cloud. A phished session token replayed from a foreign IP, an auto-forwarding rule created to hide invoice emails, a malicious OAuth app granted mailbox.read permissions, MFA-method changes that re-register the account to an attacker's authenticator, anonymous-proxy sign-ins — none of those touch the endpoint, so endpoint detection cannot see them. ITDR is the layer that does.

Can ITDR see across Microsoft 365 and Google Workspace?

Yes. Huntress Managed ITDR connects to both Microsoft 365 (Entra ID, Exchange Online, OneDrive, SharePoint) and Google Workspace (audit log, Gmail, Drive) and correlates identity events across both. We deploy the connectors, tune the policies for your tenants, and the Huntress 24/7 SOC reviews the alerts. Obsidian Ridge adds the practitioner layer on top — escalation handling, response coordination, evidence capture, and the post-incident write-up.

How fast does Obsidian Ridge respond to a token-theft alert?

Sign-in risk and inbox-rule alerts are reviewed by the SOC within minutes, around the clock. A confirmed token theft triggers automated session revocation immediately, and an on-call practitioner picks up the case to coordinate password reset, MFA re-enrollment, and the audit-log review needed for cyber-insurance notification. Our published field note on a 3 a.m. ITDR save walks through one engagement in detail.

What does Managed ITDR cost?

Managed ITDR is included in the Protected tier at $32 per user per month and in the Complete tier from $55 per user per month. It is not sold as a standalone line item, because operating it without the surrounding MDR, training, and reporting program leaves obvious gaps. The Foundation tier at $15 per agent per month is EDR only and does not include ITDR — we are explicit about that in the pricing section.

Is Huntress Managed ITDR the same as Entra ID Protection or Defender for Cloud Apps?

No. Entra ID Protection and Defender for Cloud Apps are Microsoft-native tools — useful, but you have to license, configure, tune, and staff them yourself, and they only see the Microsoft side of the world. Huntress Managed ITDR is a purpose-built identity-threat platform that watches both Microsoft 365 and Google Workspace, comes with a 24/7 SOC reviewing every alert, and is operated end-to-end by Obsidian Ridge. The Microsoft tools produce signals. Huntress + Obsidian Ridge produce decisions.

Does ITDR help with cyber-insurance renewals?

Yes, in two practical ways. First, it produces the kind of evidence underwriters now ask for — MFA coverage, identity monitoring, session controls, and incident-response capability — instead of a self-attested checklist. Second, when an incident does happen, the audit-log record and the practitioner-written incident report meet most carriers' 72-hour notification requirements with room to spare. We have seen renewals decline coverage when the carrier discovered the attested MFA controls were never actually verified post-binding.

Related

Before the briefing, you might want to read

Next step

Stop letting the identity layer answer for itself.

Briefings are free and we tell you when you don't need us. 30 minutes, real answers, plain language, a practitioner who picks up the phone.

Book a 30-min briefing