Getting started with Kaseya MDR as a RocketCyber user

This article helps existing RocketCyber users get started with Kaseya MDR after access is established. It focuses on access readiness and validation, not day‑to‑day investigation or advanced configuration.

Kaseya MDR runs alongside RocketCyber during the synchronization period. Organizations, users, and agents are synchronized so you can confirm access and begin using the new experience without rebuilding your environment or disrupting existing security operations.

Accessing Kaseya MDR from RocketCyber is optional; RocketCyber continues to operate independently during the synchronization period.

Before you begin

This article is intended for existing RocketCyber users who are enabling or evaluating access to Kaseya MDR through RocketCyber.

It covers:

  • How access is established from RocketCyber

  • What occurs during the synchronization process

  • What administrators should verify after access is enabled

If you access Kaseya MDR as a standalone user or through Kaseya 365, see Getting started with Kaseya MDR as a standalone user or Kaseya 365 Endpoint Pro: Getting started with Kaseya MDR, respectively.

Establishing access from RocketCyber

RocketCyber users initiate access to Kaseya MDR from RocketCyber by selecting the synchronization option in Provider Settings. This action establishes the Kaseya MDR environment and begins the synchronization process using the existing RocketCyber identity.

After access is initiated, the system evaluates the user’s identity and organization to determine how access should be established.

Safety and identity validation

To prevent unintended cross‑tenant access, Kaseya MDR does not assume which RocketCyber or SaaS Alerts account should be linked.

Identity and organization association are intentionally validated to ensure accounts are connected correctly and customer data is not exposed to the wrong organization. In some cases, additional confirmation may be required before access is finalized.

What happens during access establishment

  • The sync process matches the user account initiating the action to any existing SaaS Alerts tenant and links to that tenant to avoid creating a duplicate tenant.

  • If no matching tenant exists, the platform establishes the required tenant and user association needed to enable access.

  • If the user’s email address is not associated with an existing organization in SaaS Alerts, a new organization and user account are created.

This process establishes identity and organizational association only. It does not imply that data ingestion, integrations, or monitoring configurations are automatically complete.

In most cases, existing RocketCyber configuration, users, agents, and integrations are synchronized automatically; however, some integrations—most commonly Microsoft—must be reconnected manually due to updated permissions and a new enterprise application.

IMPORTANT  Reconnecting Microsoft is recommended to take advantage of updated permissions and expanded telemetry available.

Agents do not need to be reinstalled as part of the synchronization.

After access is established, RocketCyber and Kaseya MDR are accessed independently using separate URLs and sign‑in sessions.

Email notification and first login

After access is initiated, you receive an email notification with next steps.

Depending on your existing account status, the email will either:

  • Confirm that the Kaseya MDR account has been activated and is ready to use, directing you to sign in with your existing SaaS Alerts credentials

  • Prompt you to activate a new account and set a password if no prior account exists

For users with an existing tenant association, some organization‑level configurations (for example, ticketing/PSA settings) may already exist and should be reviewed during validation.

In some cases, first‑time access may require explicit confirmation to ensure the correct account or tenant is used. This validation step exists to reduce risk and ensure correct ownership before access proceeds.

Identity, authentication, and security behavior

Kaseya MDR uses the same underlying user identity as RocketCyber and related systems used to establish access.

  • Any existing two‑factor authentication (2FA) registration is retained.

  • Sign‑in sessions are not shared between RocketCyber and Kaseya MDR. You authenticate separately when accessing each platform.

Some advanced and automated response capabilities require two‑factor authentication (2FA). If 2FA is not enabled, some response functionality may be unavailable until authentication requirements are met.

Accessing RocketCyber and Kaseya MDR during the synchronization

During the transition period:

  • RocketCyber remains available at its existing URL.

  • Kaseya MDR is accessed separately through https://manage.kaseyamdr.com.

  • Each platform has its own sign‑in experience and session.

There is no in‑product navigation that automatically switches between RocketCyber and Kaseya MDR. Each platform is accessed independently.

Enabling access to Kaseya MDR does not remove data, users, or configurations from RocketCyber.

Getting oriented after first access

Availability of data, events, and alerts depends on existing integrations and ingestion state and may not be immediate after first access.

Once you have access to Kaseya MDR:

  • Verify that data is being ingested and displayed

  • Review events and alerts

  • Begin investigations using alerts and the Analysis workplace

To understand where familiar RocketCyber features live in the new interface, see How RocketCyber features map to Kaseya MDR.

Post-access onboarding: verify what carried over, configure what is new

After access to Kaseya MDR is established, administrators should take two types of actions:

  • Verify inherited state that carried over from RocketCyber (such as organizations and agents).

  • Review and configure new control surfaces introduced in Kaseya MDR (such as alert delivery, noise reduction, and SOC settings).

The steps below intentionally balance verification and first‑time configuration.

Some items already existed in RocketCyber and simply need to be confirmed. Others are new in Kaseya MDR and require an initial review so you can make intentional decisions about how the platform behaves.

Kaseya MDR does not assume correctness across organizations, roles, or integrations without administrator review.

This guide does not walk through every option. Detailed configuration is covered in the linked articles.

Related articles