




















Running a business is hard enough without worrying whether your IT is secure.
Other IT providers treat support and security as separate services. You get a helpdesk contract for day-to-day issues. Then they try to sell you security as expensive add-ons when something goes wrong.
We don't work that way.
When we start working with you, we do an analysis of how secure your business IT systems are. Then, across the year, we bring it all up to scratch organically, included in the price of our support contract.
(and we bring you up to the UK Government's Cyber Essentials standard - all as part of your regular service.)
This page covers our three main areas of managed support: core helpdesk and monitoring services, Microsoft 365 and cloud management, and 4th line escalation support for businesses with existing IT teams.
Your business needs IT that just works.
Our core managed support is built on a foundation of proactive RMM monitoring - technology that gives us real-time visibility into every device we support. We don't wait for things to break.
We catch problems early and fix them in the background.
Here's what's included
When your team needs help, they shouldn't have to wait on hold for a call centre. They should speak to someone who knows their name, their systems, and their history with us.
Our remote IT helpdesk provides:
Onsite engineering is available when remote support isn't enough. We'll come to you for hardware installations, network changes, or any situation that requires hands-on work.
Our technical support is designed to fit around your actual needs. We don't limit how often you can contact us.
At the core of our managed IT service is Remote Monitoring and Management (RMM). This is what gives us real-time visibility and control over every device we support.
Desktops, laptops, servers, and critical infrastructure are all monitored continuously. We maintain a complete, always-up-to-date IT asset inventory that includes hardware specifications, operating systems, installed software, patch levels, and device health — all automatically updated without relying on manual records or guesswork.
This means you get proactive management, not reactive support. Because every managed device is known, monitored, and controlled, we can:
Every laptop, desktop, and server needs protection against malware, ransomware, and other threats.
We deploy and manage enterprise-grade Antivirus and Endpoint Detection & Response (EDR) solutions across all endpoints. With Microsoft-skilled cyber security analysts and SentinelOne-certified engineers, you get a fully managed, proactive service designed to reduce risk and keep your environment secure.
Antivirus/EDR Management
Alert Monitoring
Security updates and software patches need to happen regularly. But they also need to happen safely, without disrupting your business.
Our patch management policy covers:
This is fully managed patching, not best-effort. We're accountable for keeping your systems up to date and secure.
Backups only matter when you need to restore something. That's why we don't just set up backups and walk away — we monitor them daily and verify they're actually working.
Endpoint Backups
For critical endpoints and systems running specialised software, we recommend and deploy a secure cloud backup solution. This creates a full disaster recovery image of the device.
Microsoft 365 Backups
Backups are configured for selected users to protect business-critical cloud data. This includes OneDrive files, email, and selected Teams data.
Server Backups
Server backups are performed at image level, so we can enact a full system restoration. All server backup services are fully managed by our helpdesk team, with daily monitoring and verification.
Backup retention periods and restore testing expectations are defined in your service agreement.
Good documentation means faster incident response, clearer audit trails, and reduced dependency on individual engineers.
Technical Documentation
We maintain comprehensive and up-to-date technical documentation aligned with Cyber Essentials and security best practice, including:
Environment Knowledgebase
Environment knowledge is securely stored within our ticketing system, linked to live support tickets, changes, and incidents.
When you come on board as a managed support client, you start with our Security Baseline — the minimum security standards required across all managed environments.
What's included:
This is mandatory for all managed service clients, delivered using the minimum supported Microsoft 365 licensing such as Business Premium or Business Standard.
You shouldn't have to become an expert in software licensing, vendor roadmaps, and technology procurement. That's our job.
License Optimisation
Renewal Management & Future Planning
Hardware doesn't last forever. Laptops slow down, hard drives fail, and operating systems reach the end of their life. Without proper planning, these issues become expensive emergencies.
Device Standards & Compliance
End-of-Life (EOL) Planning
Hardware is billed separately unless explicitly included in a managed bundle. Lifecycle guidance applies to supported and managed devices only.
You've moved email, file storage, and collaboration to the cloud. But managing Microsoft 365 or Google Workspace securely requires ongoing attention — and mistakes can be costly.
We manage your cloud tenant as part of our core service, making sure it's configured securely, licensed appropriately, and aligned to Cyber Essentials requirements.
User Management (Cyber Essentials aligned)
User accounts are created, modified, and removed in line with Cyber Essentials requirements and NCSC guidance.
Cloud Tenant Configuration (Security Baseline)
We configure and maintain the core security settings of your Microsoft 365 tenant in line with an agreed security baseline.
Email Threat Protection
Email security is configured and managed as part of your Microsoft 365 management. This includes anti-phishing controls, malware protection, and authentication (SPF, DKIM, DMARC).
Google Workspace Security
For businesses using Google Workspace, we provide equivalent management covering user accounts, security policies, and threat protection.
Licences are billed separately. Tenant management and security baseline configuration are included in managed support services.
Servers are the backbone of your IT infrastructure. Whether sitting in your office or running in the cloud, they need proactive monitoring, regular maintenance, and rapid response when issues arise.
On-Premise Server Management
Cloud Server Management
Capacity upgrades are quoted separately. Supported operating systems are defined in your service agreement.
Your network is how everything connects. Firewalls protect your perimeter, switches connect devices internally, and Wi-Fi keeps mobile users productive. All of it needs ongoing management to stay secure and reliable.
Firewall Oversight
Switch Oversight
Wi-Fi Oversight
Hardware replacement is quoted separately. Vendor-specific support responsibilities are defined in your service agreement.
Not every business needs full managed IT services. Some organisations have capable internal IT teams — they just need access to senior-level expertise when they hit complex problems or need strategic guidance.
That's where 4th line escalation comes in.
We provide bespoke senior-engineer support designed to complement and strengthen your internal IT team. You'll be supported by Microsoft-certified experts with over 27 years of industry experience, as well as certified penetration testers and security analysts.
This service is ideal for organisations that:
What's included:
Delivery:
Availability is defined per agreement (business hours, extended hours, or on-call). Response targets are agreed in advance based on severity and business impact.
4th line support is advisory and escalation-focused, not a replacement for day-to-day IT operations. Execution of changes remains with your internal team unless otherwise agreed.
© 2024 Dark Knight