Cyber Security FAQs

Everything you need to know about our managed security services, response times, and tools.

Need help right now?

Email: [email protected]
Phone: 1800 112 872

Support channels  

Hours: Mon & Fri (business hours) + after-hours options for critical

What does Comans do vs what does Huntress do?

Huntress provides the technology platform and 24/7 SOC analysts who monitor for threats. Comans provides the local engineering, strategy, implementation, and hands-on remediation. We are the "boots on the ground" that act on Huntress intel.

Do you only monitor, or do you remediate?

We remediate. Unlike alert-only services that just forward you an email at 2 AM, we take action to stop the threat (isolate host, disable account) and then work to fix the root cause.

Does this include Microsoft 365 identity protection?

Yes, our Secure Plus and Secure Complete plans include Microsoft 365 Identity Threat Detection and Response (ITDR) to catch account takeovers, impossible travel, and malicious inbox rules.

What happens when there’s an alert at 2am?

The Huntress SOC operates 24/7. They can take immediate "Assistant Remediation" steps (like isolating a host) to contain a threat instantly. Our team then picks up the full investigation.

Can you help us uplift Essential Eight?

Absolutely. We specialize in assessing environments against the ASD Essential Eight maturity models and implementing the specific controls needed for Level 1, 2, or 3.

How do we price this? (fixed monthly options)

We offer fixed monthly pricing per user/endpoint. This gives you predictable costs while scaling security coverage automatically as your team grows.

Do you support macOS?

Yes. Our EDR and management tools fully support macOS to ensure your creative and executive teams are just as secure as your Windows fleet.

Do you support servers / firewalls / logs?

Yes, monitoring for servers is included. For firewalls and broader log retention, our Secure Complete plan includes Managed SIEM features for comprehensive visibility.

What does onboarding look like?

Onboarding is fast. We deploy a lightweight agent to all endpoints, connect to your Microsoft 365 tenant via API, and begin a 1-week "baseline" period to learn your environment before switching to active blocking.

Still have questions?

Our security consultants are happy to explain how we fit into your specific environment.