Partner Playbook: Deploying Field Effect MDR

Introduction

For partners deploying a new client, this playbook outlines the phases involved.   This guide will provide an overview of each of these phases.


Table of contents


Initial Onboarding

To begin the process, our Customer Success team will reach out to introduce themselves and get you ready for your deployment.


After receiving your client's shipping details, we will ship the network appliance. This appliance needs to be physically installed in your client's environment. It’s used to monitor the traffic within their network.


While the network appliance is in transit, we strongly recommend that your client completes phases 1 to 5 before the network appliance arrives. 

This will make the deployment a much more efficient exercise



Deploying Field Effect MDR

The following sections provide a high-level description of each phase, along with links to more in-depth knowledge base articles to help you complete each phase.


Phase 1: Create Accounts and Invite Users

Field Effect is managed through the Field Effect MDR Portal


You should already have an account and we recommend inviting your client's technical team members first, so they can help set up and adjust Field Effect for their organization.



For help completing this phase, visit:


Chapter: User Management


Phase 2: Complete Your Client’s Monitoring Profile

Now that your client has access to the MDR Portal, the next phase is to complete their organization’s monitoring profile. This is part of the Service Profile page It contains information that helps Field Effect, and our analysts, better understand, contextualize, and characterize the activity being monitored.


The monitoring profile stores the client's organization’s web domains, email domains, Public IPs, and (geographical) staff locations.


Some features, such as the DNS Firewall, require that you fill out the monitoring profile, which is why we recommend setting it up as soon as you have access to the MDR Portal.



For help completing this phase, visit:


Chapter: Service and Organizational Profile


Phase 3: Configure Active Response

Google Workspace and Microsoft 365 support Active Response, so it’s important to configure it before enrolling these services for cloud monitoring.


Active Response lets you define how aggressively Field Effect MDR, and our security analysts, respond to threats. This is defined through your response policy, which should align with your, and your end clients', organizational tolerance for risk and downtime.


There are four response policy levels available (Off, Limited, Balanced, and Aggressive), and we apply the Limited policy to new organizations by default.


Each response policy can be modified with custom exclusions (example: "never isolate host X."), and we encourage you to tailor your response policy to suite your organization's risk tolerance - especially while deploying the service.  

For more on Active Response, visit:



Phase 4: Set Up Cloud Monitoring

Field Effect supports cloud monitoring for several cloud services. For this phase, set up the client’s supported cloud services in the MDR Portal for cloud monitoring. Our knowledge base has setup guides for every cloud service supported by Field Effect.


Of our cloud services, Google Workspace and Microsoft 365 support Active Response. It’s important to set up Active Response prior to setting up cloud services, as you will be given a chance to enable Active Response when setting up services that support it.



For help completing this phase, visit:


Chapter: Cloud Monitoring


Phase 5: Enable the DNS Firewall

Before enabling the DNS Firewall, ensure that phase 2 has been completed since the DNS Firewall leverages the details included in your client’s monitoring profile. 


The DNS Firewall can track and block access to IP addresses associated with sites that are known to be malicious. In addition to blocking known malicious sites, client organizations can block access to sites based on category (gambling, streaming, etc.) or use the custom allowlist and blocklist to control access to specific URLs.



For help completing this phase, visit:


Chapter: DNS Firewall


Phase 6:  Network Appliances

The network appliance stores, monitors, and analyzes the traffic moving through your client's network. Each appliance ships with the appropriate setup guide, but they are also available in our knowledge base.


If the client requested a Field Effect hosted virtual machine, the physical network appliance can be ignored, and focus should be put on setting up the virtual appliance.



For help completing this phase, visit:


Chapter: Field Effect Appliances


Phase 7: Install Endpoint Agents

The final phase is to install the endpoint agent on the client organization’s devices. Every device in the organization should have an endpoint installed, as it allows several Field Effect features to function.


Endpoint agents are accessible via the MDR Portal and available for Windows, macOS, and Linux (Debian and RedHat).


For help completing this phase, visit:


Conclusion

These steps outline the phases of a Field Effect deployment. After completing the process, you can really begin to take advantage of Field Effect.


Learn more about using Field Effect post-deployment:

  • Chapter – AROs: every threat and vulnerability Field Effect detects is reported to you via an ARO (Action, Recommendation, or Observation). This chapter covers the concept of AROs and how to work with them.
  • Chapter – Reports & Analysis: the MDR Portal’s Reports & Analysis section houses several dashboards for various aspects of your threat surface. This chapter introduces you to each dashboard, and how to navigate them.
  • Chapter – SEAS: as a Field Effect user, you have access to the Suspicious Email Analysis Service (SEAS). Any time you or your colleagues receive a suspicious email, you can send it to SEAS and receive a full report in the MDR Portal about the submitted email.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article