MSP Onboarding Digital Kit
Introductions
The following instructions are intended to help our MSP partners to understand the XeneX services and how to configure different agents required for these services.
The onboarding is a self-services process. As such these steps are easy to follow. However, we are here to help. So, please do not hesitate to contact support@xenexsupport.com if you need any help and we will get back to you within 24 hours.
Download Device ID List here .
Then Upload completed list using button below.
Table of Contents
ThreatDown (MalwareBytes) EDR and SOC Monitoring
Backup and Disaster Recovery
Patch Management
Download Email ID List for Phishing here.
Then Upload completed list using button below.
Backup And Disaster Recovery
What is Backup?
Backup is a crucial process that involves creating copies of your important data and storing them securely in a separate location. This safeguards your data from potential loss or damage due to various threats such as hardware failures, cyberattacks, natural disasters, or accidental deletion. Regular backups ensure that you can restore your data to its original state in case of an unforeseen event, minimizing downtime and potential financial loss.
What is Disaster Recovery?
Disaster recovery is essential to minimize downtime and ensure business continuity in the face of unforeseen events. Disaster recovery solutions enable you to quickly restore your systems and data, minimizing disruption to your operations. By implementing a comprehensive disaster recovery strategy, you can protect your business from significant financial losses and reputational damage.
How does our Backup service work?
Our Backup works by deploying agents on the hosts (computers, servers, or virtual machines) you want to protect. These agents are responsible for monitoring the system, capturing data changes, and initiating backups according to the defined schedule that you will choose. The backed-up data is transferred to a cloud storage provider Acronis Cloud. In the event of a disaster, wecan restore your data or entire systems to their previous state. This process involves booting your system from a bootable recovery media, selecting the desired recovery point from the available backup versions, and initiating the recovery process. By leveraging advanced technologies like incremental backups, image-based backups, and efficient data transfer protocols, we ensures rapid and reliable data protection and recovery.
How do I get started with Backup and/or Disaster Recovery?
Complete the Backup Questionnaire for each of your customers and XeneX will get back to you with installation materials to install the Backup agent. Please go to the Getting Started with Backup page and follow the steps.
Patch Management
What is Patch Management?
Patch management is the process of identifying, testing, deploying, and managing software updates, or patches. These patches are released by software vendors to address security vulnerabilities, bugs, and performance issues. By implementing a robust patch management strategy, businesses can significantly reduce their risk of cyberattacks, system failures, and data breaches.
How Does Patch Management Work?
Patch Management requires installing an agent on all hosts. Once deployed, the agent automatically discovers and inventory devices on your network, including servers, workstations, and other endpoints. It scans your devices for vulnerabilities and missing patches, providing you with a clear overview of your security posture. The solution then deploys the patches to your devices, either automatically or manually, based on your preferences. By automating these tasks, we save you time and effort, while significantly enhancing the security posture of your IT environment. You have control of what time patches go through and to what extent the system will automatically send through patches.
How do I get started with Patch Management
Complete the Patch Management Questionnaire and XeneX will get back to you with installation materials to install the Patch Management agent. Please go to the Getting Started with Patch Management page and follow the steps.
ThreatDown (MalwareBytes) EDR and SOC Monitoring
What is Endpoint Detection and Response (EDR)?
Endpoint Detection and Response (EDR) is a cybersecurity solution designed to protect individual endpoints, such as computers, servers, and mobile devices. EDR solutions continuously monitor endpoints for malicious activity, detect threats in real-time, and respond to incidents promptly. This proactive approach helps organizations mitigate cyberattacks, reduce downtime, and minimize financial losses.
What is SOC Monitoring
EDR SOC Monitoring is a cybersecurity service that augments your internal security team by providing 24/7 monitoring, threat hunting, and rapid response to cyberattacks. Our EDR SOC Monitoring service leverages the robust threat detection capabilities of EDR, a leading endpoint detection and response solution. By continuously analyzing endpoint activity for suspicious behavior, even beyond traditional security measures, our expert security analysts proactively hunt for threats. When threats are detected, such as ransomware, malware, or data breaches, our team swiftly identifies and responds to them, minimizing downtime and damage to your business. This proactive approach enhances your overall security posture, frees up your internal IT team to focus on other critical tasks, and ensures rapid and effective incident response.
How Does EDR and XeneX SOC Monitoring Work?
EDR and SOC Monitoring works by deploying an agent on your endpoints. This agent continuously monitors system activity, network traffic, and file behavior. If any suspicious activity is detected, the agent alerts and notifies the monitoring team. Security analysts investigate the incident, determine the nature of the threat, and take appropriate action, such as quarantining infected files, blocking malicious processes, or deploying countermeasures. By combining advanced threat detection, automated response, and expert analysis, EDR and SOC Monitoring helps organizations protect their endpoints and safeguard sensitive data.
How do I get started with EDR/MDR?
To get started, we need information about your environment in order to get you properly set up. Please fill out this EDR Questionnaire. After completing, proceed to the options below.
1. Already have ThreatDown (Malwarebytes)?
If you already have Malwarebytes and are migrating your Malwarebytes EDR to XeneX for SOC Monitoring, please go to the EDR SOC Monitoring Setup page and follow the steps.
2. Need Malwarebytes EDR/MDR?
If you don’t already have Malwarebytes and are looking to utilize it for your EDR/MDR, then please go to the Getting Started With Threatdown EDR/MDR page and follow the steps.
3. Want MDR with your current, non-Threatdown (Malwarebytes), provider?
Please send an email to support@xenexsupport.com and include the information on your current EDR provider so we can begin the process of getting the data forwarded to us.
Cybersecurity Phishing Training and Awareness
What Is Phishing?
Phishing is a cyberattack technique where malicious actors disguise themselves as legitimate entities to trick individuals into revealing sensitive information. This can involve fraudulent emails, text messages, or phone calls, often urging recipients to click on malicious links or download harmful attachments. To mitigate the risks associated with phishing, organizations must prioritize employee training and awareness. By educating employees about common phishing tactics, recognizing suspicious emails, and understanding the importance of strong password hygiene, organizations can significantly reduce their vulnerability to these attacks. Regular phishing simulations can further enhance employee awareness and preparedness, enabling them to identify and report potential threats.
What Is Cybersecurity Phishing Training and Awareness?
Cybersecurity awareness and phishing simulation training offer comprehensive tools and services designed to empower employees to recognize and respond to phishing attacks effectively. Through engaging training modules and realistic phishing simulations, we can help organizations build a strong human firewall. By continuously educating employees about the latest phishing techniques and best practices, we empower them to make informed decisions and protect sensitive information. Combining training and awareness campaigns helps organizations create a culture of cybersecurity, reducing the risk of successful phishing attacks and safeguarding valuable assets.
How Does Cybersecurity Phishing Training and Awareness Work?
We provide you with both a phishing campaign and a training campaign. The Phishing campaign is done by sending emails to the users in your organization that are designed to look like real emails. These phishing emails emulate the ones attackers are using every day to try and steal sensitive data and gain access to your computer. These emails are hand selected from a list of hundreds of templates, and each month a new campaign will be launched with different emails. You will have the option of choosing the themes for each month’s campaign and the Email content will reflect that. Once the campaign starts, we can check who is opening emails, who is clicking on links in emails, and who is replying to emails. This gives us specific data that we can use to track progress over time.
The training campaign comes after or during the phishing campaign. It consists of videos, articles, and quizzes on how to spot phishing and how to have good cybersecurity posture. These are used to train employees on how to be more aware and smarter when choosing what to click on. The goal is that this training will help them be more aware the following month, and we will see a trend of less people clicking on phishing email links.
We can also deploy a Phish Hook button feature, allowing all users to have a button to press when they suspect an email is a phishing email. This enables us to track who is reporting emails and improve their cybersecurity posture.
How Do I Get Started?
To get started with Cybersecurity Phishing Training and Awareness for your organization, please validate it is part of the packages/services that you selected in the MSP Self-Service Portal. Please fill out the Phishing Training and Awareness Questionnaire and submit. This must be filled out separately for each of your customers who need Phishing Awareness and Training. If you want settings to be the same for every customer, just note that on the documents instead of filling in all the information twice. Make sure all users for each organization are given in separate questionnaires.
For the specific steps of getting started, please go to the Getting Started with Phishing Training and Awareness.