Managing organizations

In Kaseya MDR, an organization represents a single monitored environment. Organizations define the administrative boundary for alerts and investigations, devices and telemetry, configuration and overrides, user access, and Security Operations Center (SOC) activity.

Understanding how organizations work is essential before managing users, permissions, configuration, or data lifecycle. Organizations provide the context within which monitoring, investigation, and noise‑reduction decisions are made, and most administrative configuration and SOC activity is scoped at this level.

This article explains what an organization represents, what is scoped to it, and how organizations are created, managed, and removed in Kaseya MDR.

What organizations control

In Kaseya MDR, an organization is the primary unit for managing environments, monitoring scope, access boundaries, and configuration context.

An organization defines the boundary for:

  • Alerts and investigations: Alerts and correlated activity are always evaluated in the context of a specific organization.

  • Security telemetry and operational context: Ingested telemetry, associated activity, and SOC analysis are grouped and evaluated based on the organization they belong to.

  • Configuration and overrides: Many administrative settings can be inherited from global defaults or overridden at the organization level.

  • User access and visibility: User access is scoped by organization based on assigned roles, privileges, and visibility controls.

These boundaries ensure configuration and access changes apply only where intended and do not unintentionally affect other organizations.

Organizations do not control individual alert logic, detection rules, or SOC investigation workflows directly; those operate within the organization’s defined scope and configuration context.

Organizations originating from RocketCyber

Some organizations in Kaseya MDR originate from an existing RocketCyber environment. In these cases, Kaseya MDR provides the next‑generation experience that can run in parallel with RocketCyber and be enabled when desired.

When a RocketCyber environment is synchronized to Kaseya MDR, organizations are created or linked in Kaseya MDR to represent the same monitored environments. Existing monitoring configuration, user context, and SOC instructions are preserved, while monitoring continues to operate throughout the synchronization. The RocketCyber environment remains intact and is not modified or removed as part of this process.

After synchronization, organizations in Kaseya MDR follow the same organizational model described in this article. Organization‑level configuration, access boundaries, and monitoring scope are managed directly in Kaseya MDR, regardless of whether the organization originated in RocketCyber or was created directly in Kaseya MDR.

For a high‑level overview of how Kaseya MDR relates to RocketCyber, including parallel operation and what does not change, see Welcome to Kaseya MDR.

The Organizations page

To access the Organizations page, click Organizations from the side navigation menu.

The Organizations page lists all organizations you manage and provides a structured summary of their status and configuration. Each row represents a separate organization. Actions taken on one organization do not automatically affect others unless explicitly configured at a higher scope.

Each column displays organization‑level information and can also be used to filter the list:

  • Organization: The organization name

  • Groups: The group to which the organization is assigned

  • License type: The license applied to the organization

  • Additional alert recipients: Whether additional email recipients are configured for alerts

  • PSA status: The current alert routing configuration for the organization, indicating whether alerts are sent to a configured PSA, email recipients, or both

  • Power Filters: Whether organization‑level Power Filters are configured

  • Total users: The total number of users associated with the organization

  • Billable users: The number of users counted toward licensing and subscription usage

  • Total devices: The number of devices associated with the organization

  • Status: The operational state of the organization, such as Active, Broken Connection, or Pending Onboarding

  • Applications: The applications and data sources connected to the organization

Page features and action icons

The Organizations page provides both page‑level controls and row‑level action icons for managing organizations.

Page‑level controls

  • Search: Find organizations by name or keyword across the entire list.

Row‑level action icons

Each organization row includes inline icons that provide quick access to common actions:

  • Add to Favorites (star) icon: Mark frequently accessed organizations

  • Go to Accounts icon: Display accounts associated with the organization

  • Edit Organization (pencil) icon: Review and manage organization‑level configuration

  • Delete Organization (trash) icon: Permanently remove the organization. You must confirm the deletion.

IMPORTANT  Deleting an organization permanently removes its configuration and associated data and cannot be undone.

Creating an organization

Use this procedure when creating a new organization in Kaseya MDR, either manually or by importing organization data from a supported PSA.

To add a new organization:

  1. Select + New Organization from the upper‑right corner of the Organizations page.

  2. In Organization Creation, choose one of the available creation methods:
    • Import from PSA (when available): Create an organization using data from a connected PSA and pre‑populate organization details. For prerequisites, supported PSA platforms, and connection setup, see the documentation for your PSA integration.

    • Create Manually: Enter organization details directly in Kaseya MDR.

Once you have completed the Add a New Organization page, click Create Organization.

A confirmation message indicates that the organization was created successfully.

Organization creation and onboarding flow

Creating an organization establishes the administrative boundary, but monitoring does not begin immediately.

The organization onboarding flow follows this general sequence:

  1. Organization is created: The organization is created with its initial governance and expected‑activity context, but no data sources are connected yet.

  2. Pending onboarding state: Newly created organizations appear with a Pending onboarding status. This indicates that the organization exists, but no telemetry is being ingested and no alerts or investigations can be generated yet.

  3. Applications tab opens by default: After creation, Kaseya MDR opens the organization directly in the Applications tab. This guides you to the next required step: connecting data sources so monitoring can begin.

  4. Connect applications: Click + New Application to connect data sources to start monitoring. Monitoring begins only after at least one application or data source is connected. When applications are added, connection setup involves using existing administrative credentials or allowing the organization to complete the connection process.

  5. Applications are connected: Once at least one application is successfully connected:

    • Telemetry ingestion begins

    • Alerts and investigations can be generated

    • The organization transitions out of the Pending onboarding state

Organization tabs and administrative responsibilities

Each organization includes several tabs, each responsible for a specific aspect of administration and configuration. While connecting applications is the required step to begin monitoring, the other tabs control how activity is scoped, filtered, and managed over time.

Each tab affects only the selected organization unless a setting is inherited from a higher scope. Together, these tabs define how monitoring, investigation, and noise‑reduction behavior operate for that organization.

Changes made within organization tabs take effect only after they are saved. Where additional configuration detail is required, this article links to the relevant task‑specific documentation.

Organization scope and inheritance

Kaseya MDR supports inheritance and overrides to balance consistency and flexibility.

  • Global or partner‑level defaults establish baseline behavior.

  • Organizations can inherit those defaults or override them when necessary.

  • Overrides apply only to the selected organization.

This model allows you to standardize behavior across many organizations while supporting environment‑specific exceptions.

For a detailed explanation on how inheritance and overrides work across Settings, see Global defaults and organization‑level behavior.

How organizations affect alerts and investigations

Alerts and investigations in Kaseya MDR are always evaluated in the context of an organization.

Within an organization:

  • Alerts are generated based on that organization’s configuration

  • Correlated activity is reviewed within the correct environment

  • Organization‑level controls affect how noise is reduced

This ensures investigations remain focused and prevents configuration changes from unintentionally affecting other organizations.

Organizations and noise‑reduction controls

Many noise‑reduction features in Kaseya MDR are applied per organization, including Power Filters and alert suppression rules.

Defining these controls per organization allows you to reduce noise based on expected behavior for that specific environment while preserving visibility elsewhere and avoiding global impact.

Organizations and access control

User access in Kaseya MDR is scoped by organization. Depending on assigned roles and permissions, users may:

  • View or manage one or more organizations

  • Access alerts and investigations only within permitted scopes

  • Configure organization‑level settings if authorized

This supports separation of duties and ensures users only interact with the environments they are responsible for.

For details, see User roles and permission boundaries.

Related articles

  • User roles and permission boundaries: Defines how access to organizations is controlled, including organization visibility, role‑based permissions, and delegated administrative capabilities

  • Alert suppression: Covers how to prevent known, expected activity from escalating into alerts or downstream actions without stopping data ingestion