Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Empowering the Hunt: All Your Security in One Place
Published:
January 4, 2024

Empowering the Hunt: All Your Security in One Place

By:
Abbey Jo Leyendecker
Kelly Murphy
Share icon
Glitch effectGlitch effectGlitch effect

In a world of many noisy tools, Huntress has always been mindful of how real people are fighting against cyberattacks every day. Our goal is to make life easier for you (and harder for hackers). So to do that, we’re excited to kick off this new year with a new UI for the Huntress platform!

To empower your workflows, we knew we needed to bring things together into a single pane of glass. So how did we decide on what updates were needed? We performed user research at every level—CEOs, admins, SOC analysts, MSPs, security engineers, solution architects, and the techs who are “down in the trenches” doing this work day in and day out. We wanted to know what really mattered to each of you and how we could make the Huntress platform work better for everyone. And you answered.

Full-screen view of the new Huntress Command Center homepage
New Command Center on the Huntress platform

Know What Your SOC Is Doing

A common question we get is, “What has Huntress done for me lately?” so we wanted to show you all the work that Huntress does behind the scenes. While other tools prove their worth with lots of noise, leaving you to sort out the mess, we do the heavy lifting for you.

The Security Operations Center Actions is a new part of the platform homepage that shows you the massive amount of events that we comb through to find the signals that need to be investigated, and then from that smaller pile, the short list of reported incidents you actually need to worry about. 

Close up of the SOC action counts for events analyzed, signals investigated, and incidents reported
Security Operations Center Actions

So what is a Signal anyway? Among all the events happening within a network, SOC analysts find some events more interesting than others. Alone, these events are not a security threat, and most of them do not require investigation. However, when these events happen in context with other suspicious behaviors, they do need more investigation. The Huntress SOC goes through thousands of these signals each month to find the reportable ones. 

In the past, because we only highlighted reported incidents and autorun-specific investigations, it was hard to tell that Huntress was hard at work for all the data sources that we monitor. Now you can see we’re on the job around the clock, because we want you to sleep better at night.

All Your Products, One Place

The platform homepage in the past was all EDR all the time, but that doesn’t reflect the services and security insights that we offer you. This new section accounts for all of the subscriptions you have and the things you’ve told us are most important to you about each of these products. 

Three EDR cards showing Huntress Agent status, Microsoft Defender, and Windows Firewall counts
Command Center cards for Managed EDR

Managed EDR is the product you’ve come to know and love, now we’re adding even more goodness. The new Command Center still highlights the status of your Huntress Agents at a glance, but now, it also lets you get to what matters faster. You can see the status of the Managed Antivirus of Microsoft Defender and Windows Firewall for all of those agents. 

Two cloud identities cards showing MFA status and billable user counts
Command Center cards for identities

Managing identity security in the cloud is something we know many organizations are struggling with—it can feel like you can’t get your arms around the problem. You’ve told us that the main issue is that you need to know their MFA status, now it’s easy to see who has MFA turned on and who doesn’t. As a parallel to the EDR agent counter, the Billable Users shows you the scope of your coverage, upfront and center. Stay tuned for more changes to this set of data—as this offering matures, we’ll have even more new things for you.

Simplified To-Do List With the Triage Feed, Including Escalations

Remember that shortlist of things you need to take action on? We used to have the incidents as a count that you’d have to click through to find out any details, beyond the severity. If there were any escalations, they were buried several clicks deep. Well, we’ve fixed that.

Now, both of these important lists are available, as the Triage Feed, from the Command Center, putting your to-do list right at your fingertips.

Triage Feed with the Incidents tab selected, showing a list of all incidents and key details
Triage Feed, Incidents tab

The Incidents tab shows you much more than severity—you can see the most important details and click through to the recommended remediations. And the Escalations tab makes those not-an-incident-but-still-important actions easy to find and check off. 

Triage Feed with the Escalations tab selected, showing a list of all escalations and key details
Triage Feed, Escalations tab

If you’re a zero-inbox hero, you’ll find clearing your Triage Feed oh so satisfying.

The End, but Not Really

Huntress has always strived to build products that deliver the most value and put it into your hands as soon as possible. This shiny, new Command Center gives insights into the SOC, simplifies incident triage, and shows important metrics at a glance. 

Thank you to all our partners and users who took the time to help guide this latest evolution of the Huntress platform. We couldn’t have done it without you.

But… our work is never done. Hackers don’t rest and neither do we. If you want to be a part of the next big thing and influence where we’re going, hit us up if you’d like to be contacted for future UX research.

Categories
Huntress News
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Unwanted Access: Protecting Against the Growing Threat of Session Hijacking and Credential Theft

    Discover how our new Unwanted Access capability strengthens your defenses against session hijacking and credential theft. Dive in and learn how to minimize risks and protect your business-critical assets from evolving cyber threats.
  • Managed Antivirus Is Here!

    After months of rigorous beta testing, we’re excited to announce the addition of our Managed Antivirus service to the Huntress Security Platform.
  • Checking the EDR Box: Evolving Endpoint Protection and the Next Iteration of Huntress

    Discover how Process Insights brings new managed EDR functionality to The Huntress Managed Security Platform to help you detect cyberattacks as they happen.
  • Analyzing Initial Access Across Today's Business Environment

    Learn more about the initial access techniques observed by the Huntress SOC and Tactical Response teams! Gain valuable insights to help you protect your environment.
  • Understanding Potentially Unwanted Programs Part I — It’s Not Always Malware

    Regardless of your daily duties, we’ve all encountered annoying ads, unwanted pop-ups, or generically named rogue applications. These nuisances, commonly called Potentially Unwanted Programs (PUP), are often unknowingly installed when downloading free software.
  • Evolving the Hunt: Host Isolation for Smarter Defense

    Learn about Host Isolation, a new feature that's just been added to The Huntress Security Platform.
  • Level Up Your Business Security: Huntress Launches New Collaboration with Microsoft

    Huntress is collaborating with Microsoft to help your business get the most out of your Microsoft security investments.
  • Evolving the Hunt

    At Huntress, our goal is not only to chase after changing threats but to remove obstacles that get in the way of new security innovation.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy