Head of IT at a tech services company with 51-200 employees
Real User
Top 20
2025-06-27T15:37:24Z
Jun 27, 2025
My use case is really just for threat detection and response to observe and get more awareness of where our sign-ins are coming from, so we can better protect our login environment.
I synchronize every client I have with M365 into Huntress Managed ITDR, and it operates seamlessly. It acts as the M365 cloud counterpart of EDR on physical machines, offering peace of mind by covering both endpoints and the actual cloud tenant. (If you have both products)
Find out what your peers are saying about Huntress, Proofpoint, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: August 2025.
Identity Threat Detection and Response (ITDR) solutions focus on protecting user identities from threats by providing comprehensive monitoring, alerting, and response capabilities.
ITDR enhances security measures by identifying and mitigating threats that target user identities within organizations. By integrating with existing systems, these solutions monitor user behavior, detect anomalies, and provide actionable insights to prevent unauthorized access.
What features should...
My use case is really just for threat detection and response to observe and get more awareness of where our sign-ins are coming from, so we can better protect our login environment.
I use Huntress Managed ITDR for 365 protection, monitoring log run events, security, and abnormal logons.
I synchronize every client I have with M365 into Huntress Managed ITDR, and it operates seamlessly. It acts as the M365 cloud counterpart of EDR on physical machines, offering peace of mind by covering both endpoints and the actual cloud tenant. (If you have both products)