Application configurations

Application configurations define how individual detection and integration components behave within Kaseya MDR. They control application‑specific behavior, such as ingestion behavior, tuning, exclusions, and reporting presentation.

These settings are managed by administrators and can impact alerts, investigations, and response workflows across the platform. Only users with appropriate administrative permissions can modify them.

Typically, application configurations are reviewed after initial onboarding and adjusted over time as part of tuning, noise reduction, or environment‑specific customization. Because they directly influence how activity is detected and reported, changes should be made carefully and reviewed periodically.

While application configurations affect how data is evaluated and presented, they do not determine whether an alert triggers or whether response actions are executed.

In Kaseya MDR, application configurations are managed from Settings > Application Configurations.

Common questions this article answers include:

  • What are application configurations in Kaseya MDR?

  • How do application configurations differ from detection logic or response behavior?

  • When should application configurations be adjusted versus left at default settings?

  • How do global defaults and organization overrides apply to application configurations?

  • Which application configuration areas affect visibility, tuning, or ingestion?

This article builds on the global default + organization override model described in Global defaults and organization overrides.

What application configurations do

Application configurations define baseline behavior for how specific applications ingest, evaluate, or present telemetry once it reaches Kaseya MDR.

They are used to:

  • Influence how telemetry is evaluated or contextualized for a specific application

  • Apply exclusions or sensitivity adjustments where supported

  • Customize behavior for a specific organization using overrides

Application configurations do not:

  • Replace detection rules

  • Execute response actions

  • Override SOC authorization or investigation workflows

Application configurations affect configuration behavior, not SOC‑managed detection logic or response execution.

Not all application configurations are meant to be adjusted immediately. Some are used primarily for tuning after baseline behavior is observed, while others are configured during onboarding to enable data ingestion.

In general:

  • Ingestion‑related configurations are reviewed during onboarding when a data source is first introduced.

  • Detection‑specific configurations are adjusted later, after baseline behavior is observed and tuning is required.

  • Exclusions and sensitivity changes should be applied incrementally and reviewed periodically.

Because application configurations can impact visibility, changes should be made deliberately and documented internally.

Application configurations at a glance

The table below summarizes the application-level configuration areas available under Settings > Application Configurations, what each area influences, and when it is typically adjusted.

Application What it controls When to configure Common use case Caution
Advanced Breach Detection Detection tuning for activity mapped to MITRE ATT&CK tactics and techniques on the local device During tuning, after baseline behavior is observed Reducing noise from known processes or command‑line activity while maintaining visibility into advanced attack techniques Exclusions reduce detection coverage
Datto Ransomware Detection Ransomware‑ related detection behavior, including exclusions and reporting sensitivity After initial onboarding, during environment‑specific tuning Reducing noise from known processes while maintaining ransomware visibility Exclusions reduce detection scope
Crypto Mining Detection Detection behavior for known or suspected crypto‑mining activity During tuning when legitimate workloads resemble mining behavior Excluding approved domains or IPs Over‑exclusion can hide malicious activity
Suspicious Tools Exclusions for tools or utilities that may otherwise be flagged as suspicious When approved tools generate alerts Reducing alerts from known operational utilities Path‑based exclusions reduce visibility
Suspicious Network Services Evaluation of network service activity, including exclusions and custom service definitions When legitimate services are flagged Defining known services or excluding expected network behavior Network‑level exclusions should be used sparingly
Firewall Log Analyzer Ingestion, filtering, and forwarding of firewall and network device logs During onboarding of firewall or network devices Managing firewall syslog ingestion and filtering Misconfiguration can impact log volume
Defender Manager Microsoft Defender protection, scanning, threat handling, and exclusions During endpoint security posture review Aligning Defender behavior with organizational security policies Changes directly affect endpoint protection

Accessing application configurations

Application configurations are managed from the Settings area.

To access application configurations, follow these steps:

  1. From the side navigation menu, click >Settings>.

  2. Select the Application Configurations tab.

The Application Configurations page is organized into two scopes:

  • Global defaults, which apply to all organizations unless an override exists

  • Organization overrides, which allow application behavior to be customized for a specific organization

Changes made anywhere within an application configuration panel are applied when you select Save.

If you navigate away from the page without saving, your changes are not applied. Saving applies changes at the current scope (global default or organization override).

Understanding global defaults and organization overrides

By default, application configurations are defined at the global level. These defaults apply to all organizations unless an override exists.

You can create organization overrides to customize application behavior for a specific organization. When an override exists:

  • The organization no longer inherits the global default for that application

  • Application behavior is determined by the organization‑specific configuration

For detailed information, see Global defaults and organization overrides.

Application‑specific configurations

Each application listed under Application Configurations exposes its own configuration options. The available settings vary by application and reflect the nature of the data being ingested or evaluated.

Best practices

  • Start with global defaults and adjust only when necessary

  • Make changes incrementally and review their impact before making additional adjustments

  • Use organization overrides only when an organization requires behavior different from the global standard

  • Document why exclusions or advanced settings are configured

  • Review application configurations periodically, especially after onboarding new organizations or data sources

Related articles

  • Global defaults and organization‑level behavior: Explains how global defaults and organization overrides determine which application configurations apply across organizations, and why behavior may differ between environments

  • Power Filters and allowlisting logic: Describes how to manage surfaced visibility and investigation focus without changing application behavior, detection logic, or data ingestion.

  • Advanced agent settings and organization overrides: Covers how agent‑level behavior (resource usage, logging, and diagnostics) is governed separately from application configurations, using the same global default and override model

  • Configuring SOC settings: Explains how SOC communication preferences, authorization boundaries, and organization‑specific context are defined, and how they differ from application‑level configuration