ThreatDown OneView is a single, multi-tenant console that lets you easily install and manage endpoint security solutions. The intuitive OneView console is easy to use and provides site administration, license management, and detailed, value-driven reporting that can be shared with end users.
Note:
- The free, 15-day trial provides the full functionality of the OneView platform. After the trial ends, your subscription will automatically begin.
- Sites created on your account ThreatDown will not automatically switch from a Trial to a Paid status. They need to be manually converted in the ThreatDown dashboard. Learn more
For billing information, see Atera Subscription Information
To sync your Atera customers to ThreatDown, see:
To deploy ThreatDown to your end-user devices, see Install ThreatDown via Atera
Products
The following products can be activated from the OneView Console:
Incident Response
Quickly and effectively respond to any security incidents and minimize the impact on your business. This flexible solution is designed to adapt to your specific needs, ensuring you have the right level of support during any incident. For more information, see Incident Response (IR)
Endpoint Protection
Protect your devices from malware, ransomware, zero-day exploits, phishing, and more. For more information, see Endpoint Protection (EP)
Endpoint Protection for Servers
Provide proactive protection and remediation capabilities for your Windows and Linux servers. For more information, see Endpoint Protection for Servers (EPS)
Endpoint Detection and Response
Upgrade to enterprise-grade endpoint protection to enable the automatic detection, isolation, and remediation of all types of cyber threats across your workstations. For more information, see Endpoint Detection and Response (EDR)
Endpoint Detection and Response for Servers
Upgrade to enterprise-grade server protection to enable the automatic detection, isolation, and remediation of all types of cyber threats across your servers. For more information, see Endpoint Detection and Response for Servers (EDRS)
Vulnerability Assessment
Scan your inventories and assess vulnerabilities to gain insights and prioritize remediation steps based on severity levels. Customizable notifications for new vulnerabilities and detailed vulnerability dashboards further enhance the ability to manage and minimize risk. For more information, see Vulnerability Assessment
Vulnerability and Patch Management
Identify, prioritize, and remediate vulnerabilities in your networks. It detects missing patches and vulnerabilities across your endpoints and provides you with the tools to quickly remediate them. With detailed reports of your system's vulnerabilities, you can prioritize which vulnerabilities to patch first. For more information, see Vulnerability and Patch Management
DNS Filtering
Gain that extra layer of protection by blocking harmful websites, preventing employees from accessing them and putting your organization's security at risk. You can also use it to establish custom policies and restrict access to certain website categories that may not be suitable for your business. By doing so, you can enhance productivity and lower the chances of employees being targeted by phishing scams or other online attacks. For more information, see DNS Filtering
Managed Detection and Response
Offer complete protection with instantaneous threat detection and round-the-clock monitoring. With real-time threat detection and 24/7 monitoring, MDR provides comprehensive protection for your organization. Additionally, MDR includes a team of cybersecurity experts who collaborate with you to promptly identify and resolve any threats that emerge. With MDR, you can rest easy knowing that your business is protected against the latest cyber-attacks and that you have a dedicated team on your side to help you through any incidents. For more information, see Managed Detection and Response
Application Block
Block risky or unproductive applications to maximize endpoint security and ensure endpoints remain compliant and productive. For more information, see Application Block
Managed Threat Hunting
Anticipate threats and sound the alarm before they become full-blown assaults with Managed Threat Hunting. Enhance your response speed, highlight overlooked or previously unknown Indicators of Compromise (IoC), reduce remediation costs, and cut down on unnecessary alerts, all while ensuring your organization stays a step ahead of lurking threats. For more information, see Managed Threat Hunting
Mobile Security
Secure your Android, iOS, iPadOS, and Chromebooks from ransomware, malicious apps, and PUPs. Block malicious websites, stop damaging applications, and bar intrusive ads and malware with ease. For more information, see Mobile Security
Activate ThreatDown
Note: Only an Admin can activate ThreatDown.
To activate ThreatDown:
1. From App Center (on the sidebar), select ThreatDown.
The ThreatDown page appears.
2. Click Get started. The Activate ThreatDown window appears.
3. Enter your email. Then click Activate.
Note:
- Already have an account?! Click Request migration, and enter your email when prompted. Our support team will get back to you within two business days. For more information, see Migrate an existing ThreatDown account to Atera
- After clicking Activate, you can immediately sync your Atera customers to ThreatDown. For more information, see Atera's App Center
4. Alright! Please check your email to log in and activate ThreatDown.
Note: This activation email will expire in 3 days. If expired, contact your administrator for an updated invitation.
5. Click Activate OneView. You will be redirected to https://oneview.malwarebytes.com/auth/register
6. Create and confirm your password. Then click Submit.
Note: Passwords must be at least 8 characters long, with upper and lowercase letters, numbers, and symbols.
7. Set up two-factor authentication.
- Open your authenticator app (e.g., Google Authenticator, Okta).
- Scan the QR code.
- Enter the code displayed in the authenticator app.
8. Click Continue.
You're in! The ThreatDown OneView dashboard appears.
See the OneView Onboarding guide for information on setting up and managing OneView.
ThreatDown billing information
Atera offers two subscription models, unified and non-unified. With a unified subscription, you can view a single invoice that includes any apps purchased through Atera. With a non-unified subscription, you'll see individual invoices for each app. In both models, you can download a CSV file with a breakdown of ThreatDown usage per customer, directly from the invoice page in Atera.
For App Center billing information, see Atera subscription information
Note: The unified subscription model is currently available for credit-card-paying customers who purchased Atera after July 12, 2023.
Unified subscription
To view your ThreatDown usage per customer:
1. Go to Admin > My account > Subscription.
The Subscription invoices page appears.
2. From the Invoices tab, click Invoice breakdown for the App Center invoice you want to view.
The Invoice breakdown slide-out appears.
3. Click Download CSV.
The invoice breakdown will download as a CSV file. The first tab shows the total usage for each app. Each additional tab is organized by app, showing the usage per customer.
Non-unified subscription
To view your ThreatDown usage per customer:
1. Go to Admin > My account > Subscription.
The Subscription invoices page appears.
2. From the Invoices tab, click the download icon () next to the ThreatDown invoice you'd like to download.
The invoice breakdown will download as a CSV file, displaying a breakdown of ThreatDown usage by customer.