Analyst level users have adequate access to general functions within the Portal. This protects the integrity of the provisioning, configurations, and security settings of the DattoEDR Portal.
Do not remove or modify MSS Engineers user levels or accounts.
Click on your username on the Datto Dashboard and click on Admin
This will default you to the Users page where you will click on Add User
Enter the email of the user you would like to add and select the Role you would like to assign to the user
Admin grants access to all functions in the portal. It is recommended to restrict this access
Analyst role grants access to one-time functions in the portal (i.e., response, scan, search, etc.) This role does not allow Policy management or Device management access
External Analyst grants Read Only access to external Entities and can be restricted to viewing a single Organization.
If a user already has an account in the portal, the email address will be red, and you will not be able to enter it.
Use the same email address as your Datto Partner Portal if you have an already have a pre-existing account to tie the accounts together for single sign on.
Your Datto Partner Portal account and DattoEDR account will have to be manually merged. It is best if you use the same email to access both accounts if you have an existing Datto account.
Log out of any current Datto account
Click on Register link in your User Account set up email
Log back into your Datto Partner Portal with your current credentials
In the same browser, enter your DattoEDR URL <assignedname.infocyte.com> and press enter.
This should bring you to your EDR Dashboard
From this point on, when you log into your Datto Partner Portal, you will have an additional option to select for login
Once authenticated into the portal, you can add KaseyaOne as an additional sign-in option.
In the Datto Dashboard, click your username, then select Admin.
Select Settings from the left menu.
Select the KaseyaOne tab.
Select Unified Login ONLY.
Important
Do not enable Require login with KaseyaOne. Enabling this can lock out your SOC/support team from accessing the instance/devices for support and engagement. (Use Unified Login only.)
For best protection and coverage, we recommend enabling this policy on all endpoints.
Real-time Protection Monitoring should be enabled
If you use an RMM tool, we recommend completing one of the following actions to reduce the likelihood of application conflicts that could impact endpoint performance:
Under Real-time Options, add your RMM tool’s installation path to the exclusions list (recommended for all RMM tools).
Under Real-time Options, clear the Memory checkbox to disable memory scanning in the EDR policy (recommended only if memory read/write protection is already enabled in your AV policy).
Tamper Protection is not applicable in our use case, do not enable
Scheduled Scans at minimum weekly are highly encouraged as they provide a bigger picture of a healthy baseline in your environment in the event we need to investigate an incident or process further by gathering Applications, Artifacts, Autostarts, Drivers, Memory, Modules, and Network connections in addition to the regularly uploaded Accounts and Processes.
Select your desired Day, time, and frequency of the scans.
Do not select any Extension options to add onto the scans. These are for our internal use and may cause device interruptions or unwanted actions on the endpoints.
Once you Create your New Policy, the next screen will open, this is where you will make your personal modifications.
The recommended settings are shown above. We generally do not recommend Shut Down Host in the event of Ransomware as that can result in data /logs loss.
Once you are satisfied with your settings, save the Policy and Activate it by clicking the Radio button next to it
Please see here for important information about the Ransomware Detection and Rollback Features
This Policy is ONLY to be applied to devices with FREE DEFENDER. DO NOT apply this policy to devices with Premium Defender!
Windows Defender Policy provides an additional layer to help guard against malware, spyware, and malicious browser activity.
Name your Custom Policy and it’s descriptor
Select your configurations for each subset
Enter any scanning exclusions
*Your endpoint must be running Windows antivirus version 1.381.2164.0 or higher to be able to use the Use advanced Office/Adobe Reader protection in the Attack Surface Reduction of the Policy. If the endpoint is not running this version or above, you will need to disable the toggle.
Disable User Interface - Limits the user's ability to view Defender UI, notifications, or change any scanning behavior
Use a proxy server - Enables proxy configuration for partners who run updates via a proxy
Protection
Cloud-based protection - Leverage Microsoft Defender's cloud platform to evaluate file samples and block content determined to be a threat by the Defender community
Behavior-based protection - Monitor for threats that are detected through machine learning
Keep Defender service alive in all circumstances - Enable the Defender service's keepalive functions
Monitor file and program activity - Monitor new files and file-related activity
Network inspection and protocol recognition - Monitors outbound HTTP(s) traffic and block connections to sites such as Command & Control (C&C) servers, phishing, and other malicious targets
Scan scripts used in Microsoft browsers - Scan for malicious scripts from web pages when using Microsoft browsers
Block risky DNS request - Attempts to identify and block connections to URLs known to be risky or host malware
Detection based on heuristics - Inspects code for suspicious elements
Microsoft Outlook protection - Scan Microsoft Outlook for suspicious emails and attachments
Scanning exclusions
Excludes specific processes, files, folders, and extensions from scanning. (ie quarantine folders, security products, etc.)
Defender Attack Surface Reduction
Use advanced ransomware protection - Use your Windows-embedded client and cloud heuristics to determine if a file resembles ransomware; can run in conjunction with The Ransomware Detection Policy
Block abuse of exploited / vulnerable signed drivers - Prevent applications from writing a vulnerable signed driver to disk
Block untrusted unsigned process running from USB - Block untrusted processes from executing that are on a USB drive
Block advanced malware attack techniques - Block potentially obfuscated scripts, possible persistence through WMI, and processes creations from PSExec and WMI
Use advanced Office / Adobe Reader protection - Monitor and block Microsoft Office and Adobe applications that may inject codes, create child processes, or make Win32 API calls (Your endpoint must be running Windows antivirus version 1.381.2164.0 or higher to use this function, otherwise you need to disable it)
Protection Level - Enables you to toggle Windows Defender's response level to Audit or Block mode
Attack Surface Reduction Exclusions
Process exclusions - Exclude specific processes from analysis in the Attack surface reduction exclusions ruleset (ie security software, backup solutions, etc.)