Managed IT Plan
Centralized DEVICE Control
Connect your work computers and mobile devices to the cloud for best-of-breed monitoring, management, and support.
Our core Managed IT solution delivers essential IT services for all your devices across Windows, MacOS, iOS, Android, and Linux. Keep all your devices secure, compliant, and reliable with best-of-breed device security, monitoring, and remote support.
Managed Devices
What’s Centralized DEVICE Control?
It’s how we give your company full visibility and control over work devices — including security, remote support, software updates, and compliance monitoring — all from a single dashboard.
Two Security Models
Light Security: Designed for industries that allow a flexible mix of unmanaged and lightly registered BYOD devices — ideal for retail, construction, logistics, and real estate.
- All Windows and macOS desktops on plan
- BYOD and mobile devices are lightly managed via our Managed M365 plan (Intune registration optional)
- Company owned desktops and mobile devices can be fully Intune enrolled.
Full Security: Required for industries with regulatory or contractual compliance needs — including healthcare, finance, legal, and insurance.
- All desktops and your business-class SonicWall on plan
- All company owned and BYOD devices are Intune enrolled and compliance-enforced through Managed M365
Managed Antivirus
Why centralized and professional is the best.
Most people install a free antivirus and hope it does the job. And in many cases, it does — but true security is about layers. Some users take it a step further and buy an AV product, hoping it adds another layer of protection. And it does — but unless you take the time to become an expert in that product, you’re not fully protected.
At Prestwood IT, we use centrally managed, business-class antivirus software, professionally configured and actively monitored. Our standard solution is Bitdefender, carefully tuned for business environments. We’ve implemented five distinct profiles — from our flexible default to High 5, a locked-down setting ideal for public-use machines like a front-desk computer.
Need to kick it up to the best?
For advanced protection, especially against ransomware, we deploy SentinelOne — a market leader in EDR (Endpoint Detection and Response). Our team knows when a well-configured Bitdefender setup is the right call — and when SentinelOne is required. Either way, it’s centrally managed, continually monitored, and handled by professionals.
Windows Computers
Desktops, laptops, and servers.
While we specialize in Dell computers, especially their servers, Latitude laptop, and Optiplex workstations lines, we manage and work on all brands of Windows computers. Active issue notifications include patch failure or uninstall, high CPU/RAM/Disk usage, and service failures.
Managed IT Windows Agent:
- Remote control (Take Control)
- Advanced Monitoring/alerting (CPU, disk, event logs)
- Asset inventory
- Patch management (Windows Update & 3rd-party apps)
- Antivirus/EDR integration (Bitdefender and SentinelOne)
- Scripting (PowerShell, CMD, etc.)
- Compliance reporting
- Reboot scheduling
About Managed IT and M365: Of course Windows devices are fully compatible with Microsoft 365, Entra, and Intune as well as on-premise and under-a-roof domain controllers including hybrid domain-Entra-Intune setups.
Apple Computers
MacOS desktops and laptops.
Active issue notifications include visibility/offline, low disk space, and agent tampering.
Managed IT Mac Agent:
- Remote control (Take Control)
- Monitoring/alerting (CPU, disk, etc.)
- Asset inventory
- Patch visibility, reporting-only
- Scripting (bash/zsh)
- Partial compliance reporting
Sierra v10.12 or later, but Big sur v11 or later recommended
Not Supported: Patch deployment, reboot scheduling, and full compliance automation are not supported on Macs.
About Apple, Managed IT, and M365: Like Windows desktops, MacOS desktops are fully compatible with Microsoft 365, Entra, and Intune. To manage iPhone and iPad iOS devices, we use Intune linked to Apple Business Manager.
We keep your network and devices secure, compliant, and going!
Linux
Workstations and server boxes.
Active issue notifications include high CPU/memory usage, filesystem thresholds exceeded, and offline alert.
Managed IT Linux Agent:
- Monitoring/alerting (CPU, disk, services, processes)
- Asset inventory
- Patch visibility – limited reporting only
- Scripting (bash)
- Service/port/process checks
Supported:
- CentOS/RedHat 7 x64 Agent
- CentOS/RedHat 8 x64 Agent
- CentOS/RedHat/AlmaLinux 9 x64 Agent
- Ubuntu 16/18 LTS x64 Agent
- Ubuntu 20 LTS/Debian 11 x64 Agent
- Ubuntu 22 LTS/Debian 12 x64 Agent
About Linux, Android, Managed IT, and M365: Android phones and tables are fully compatible with M365 and Intune. To manage Android phones and tablets, we use Intune linked to Managed Google Play. Linux workstations are compatible but more usine OneDrive is more difficult.
Chromebook Note: We do not recommend using Chromebooks. They are not compatible with our Linux agent, nor Intune, nor business OneDrive..
SonicWall Routers
Monitored Business-Class Perimeter Security
While we support all major business-class routers, we specialize in Dell SonicWall — and our active monitoring platform is built specifically for it.
We remotely configure SonicWall routers under any active license plan, and when you choose monitoring, you gain early warnings for everything from offline status to configuration changes and firmware drift.
Router monitoring strengthens your network’s perimeter security, enhances VoIP and cloud app performance, and gives your team real-time insights into uptime, bandwidth usage, and hardware health.
$5/Month — Essential Monitoring
Optional for Light Security Model
Ideal for basic network visibility, small offices, and retail setups.
- Online/offline (ICMP/ping)
- External IP & WAN reachability
- Bandwidth usage (Internet throughput)
- Uptime tracking + alerting
- Offline notifications (email/SMS/portal)
- Historical availability logs
$10/Month — Pro-Level Monitoring
Recommended for Full Security Model
Designed for regulated environments, critical infrastructure, or multi-site clients.
Everything in Essential, plus:
- Firmware version tracking
- Firewall status and open port alerts
- DHCP/DNS service monitoring
- High CPU/memory usage alerts
- Per-interface monitoring (LAN/WAN/Guest)
- Configuration change detection (where supported)
- Scheduled reboot support & config backup
- Wi-Fi status (SSID, congestion, client count – when available)
Canon Printer Specialists
Adding printers to your Managed IT plan supports a comprehensive monitoring strategy — so you’re not left in the dark when something goes wrong.
With pro-level monitoring, we include key indicators like toner levels and common error states, giving you helpful insights and alerts without the need to manually check each device.
$5/Month — Essential Monitoring
- Online/offline (ping status)
- Device uptime tracking
- Offline alert notifications
- Basic print queue visibility (job errors, stuck jobs)
- Historical availability logs
$10/Month — Pro-Level Monitoring
Everything in Essential, plus:
- Toner/ink level monitoring (per cartridge)
- Paper tray and supply status
- Error state alerts (paper jams, low toner, offline warnings)
- Page count tracking (total and per day/week/month)
- Model-specific SNMP data (where supported)
- Printer firmware version & security status
- Scheduled reports or alerts on usage, supply needs
Recommended: We see lots of printers so we know what’s good. Right now we recommend the Canon ImageClass 743 and 753 line of printers.
Feature | Windows | macOS | Linux |
---|---|---|---|
Remote Control (Take Control) | ✔️ Full | ✔️ With Setup | ❌ Not Available |
Monitoring & Alerts | ✔️ Extensive | ✔️ Moderate | ✔️ CLI-Based |
Patch Visibility | ✔️ Full (OS & 3rd-Party) | ⚠️ Reporting Only | ⚠️ Limited Reporting |
Patch Deployment | ✔️ Yes | ❌ No | ❌ No |
Script Automation | ✔️ PowerShell/CMD | ✔️ Bash/Zsh | ✔️ Bash |
Inventory & Asset Tracking | ✔️ Complete | ✔️ Good | ✔️ Basic |
Reboot Scheduling | ✔️ Yes | ❌ No | ❌ No |
3rd-Party AV/EDR Integration | ✔️ Full (e.g., Bitdefender) | ⚠️ Limited | ❌ None |