Website
24/7 Detection & Response

24/7 Detection & Response

Finn O'Brien

Last updated: 29 October 2025

In this article, you will find:

  • Important information about the 24/7 detection & response service offered by OneClickComply.


Alongside automating your compliance journey, the OneClickComply platform also helps you keep your organisation secure by providing the ability to integrate with Huntress, the enterprise-grade 24/7 SOC.

Huntress delivers round-the-clock protection for your endpoints, with optional coverage for cloud identities, backed by industry-leading detection and response. It can automatically isolate impacted devices to contain threats, integrates seamlessly with Microsoft Defender to enhance what you already have, and provides clear monthly summaries with threat intelligence so you know exactly whatโ€™s been found and fixed. When something critical happens, the OneClickComply team is on call to help coordinate and respond quickly and effectively.

This integration allows users to automatically detect devices with the agent installed, instantly add them to the Physical and Virtual Asset Register, and download monthly summary reports.

Enabling Detection & Response on your OneClickComply Account

To access the Detection & Response area within the OneClickComply platform, select the 24/7 Detection & Response option from within the Scanning tab of the Navigation bar, as shown below:

Navigation guidance for accessing 24/7 detection & response

Note: If you have not purchased the Huntress add-on, you will be shown a default page prompting you to book a call with a member of the team. If you would like to discuss upgrading your subscription to include Huntress, please book a call using the button, as shown below.


Book a meeting option


If you already have the Detection & Response add-on, you will see the following page.

24/7 detection & response homepage

The three main areas within this feature are:

Reports: View and download your monthly summary reports, which outlines recent threats, incidents, or any other notable events across your connected devices.

Devices: View a list of all devices that have the agent installed, or refresh the list ot locate new devices.

Download: Install the Huntress agent onto Windows or macOS devices using either an installation script, or a .exe installer.

Installing the Huntress Agent onto Devices

To install the Huntress agent onto a device, navigate to the Download tab and choose your method of installation. For Windows devices you can either use an install script, or download a .exe installer directly from the OneClickComply platform, whereas macOS devices are limited to only the .exe installer, as shown below.


Agent installation guide


During the installation process, you will be required to provide both your Organisation Key, and your Account Key, which have been redacted in the example image above. Failure to provide these keys, or inputting the wrong information will prevent the agent from installing correctly.

You must ensure that the agent is installed across all devices that you wish to monitor, such as laptops, desktops, and servers. If you encounter any issues adding the agent to a device, please contact a member of the support team.

Detecting devices with the agent

Once the agent has been installed onto all required devices, you will need to refresh your devices list in order for them to appear within the OneClickComply platform. To do this, select the Devices tab, found to the left of the Download option.


Device detection guidance


Once on this new page, click the Get Devices to begin a retrieval of all devices that have the Huntress agent installed.

The OneClickComply platform will begin populating the Devices area with a record of all devices that have the agent installed. Each record will include the device name, the IP address, and the OS version. See below for an example detected device:


Example device with agent installed


Downloading monthly summary reports

Each month, a report will be automatically generated, detailing what threats have been prevented, what incidents have occurred, as well as other statistics and information about your environment and connected devices. These reports are ready-to-share, and have been designed to be both visually appealing and content-rich. We've provided an example below:


Monthly report example



Related articles
Did you find this article helpful?