Choosing the Right Deployment Option(s)
Choosing the Right Deployment Option(s) for HYAS Protect
HYAS Protect offers flexible deployment options to fit your environment—whether you're securing roaming endpoints, enforcing policy at the network edge, or integrating with existing security platforms like Microsoft Defender for Endpoint or SentinelOne. You can deploy a single method or use a hybrid approach, combining multiple deployment types to match your infrastructure, user base, and operational needs. Each method provides a different balance of visibility, control, and integration effort, allowing you to tailor protection to your organization’s unique requirements.
Deployment Method Matrix
To help you quickly compare these deployment methods side-by-side, the chart below breaks down key capabilities, coverage, and requirements—so you can more easily determine which option(s) best align with your environment.
Capability | HYAS Protect Agent | HYAS Protect Resolver | MSFT Defender for Endpoint Integration | SentinelOne Integration |
---|---|---|---|---|
Best-in-Class Defense Against Domain-Based Threats | ✅ | ✅ | ✅ | ✅ |
On-Network Coverage | ✅ | ✅ | ✅ | ✅ |
Off-Network Coverage | ✅ | ⛔ | ✅ provided the subject device is covered by MDE | ✅ provided the subject device is covered by S1 |
HYAS Agent Installation Required | ✅ | ⛔ | ⛔ | ⛔ |
User & Device Level Attribution | ✅ | ⛔ | ✅ | ✅ |
User Group Level Support and Policy Application | ✅ | ⛔ | ⛔ | ⛔ |
Local DNS (Domains & Resolvers) Configurability | ✅ | ⛔ | ⛔ | ⛔ |
Split-Horizon Compatibility | ✅ | ⛔ | ⛔ | ⛔ |
Safe Search Enforcement | ✅ | ⛔ | ⛔ | ⛔ |
Source Network Level Policy Application | ⛔ | ✅ | ⛔ | ⛔ |
Hybrid Deployments
While the matrix above focuses on individual deployment methods, many organizations benefit most from a hybrid approach—combining multiple deployment types to reflect how their environment actually operates.
Hybrid deployments allow you to apply the right level of attribution, control, and visibility across a variety of device types—such as roaming laptops, on-prem desktops, or unmanaged IoT infrastructure.
Common Hybrid Deployment Scenarios:
Agent + Resolver
Use the HYAS Agent for remote or roaming users to enable user-level attribution and group-based policy enforcement. Pair this with the HYAS Resolver for on-premises or fixed-location devices, where source network–based policies are sufficient.MDE + Resolver
Many organizations use Microsoft Defender for Endpoint to monitor DNS activity from managed endpoints. HYAS Protect ingests DNS logs from MDE via an Azure Event Hub and analyzes them for threats and behavioral anomalies. However, MDE only provides visibility into devices running the Defender agent. By adding a HYAS Resolver, you gain policy enforcement and visibility for unmanaged, shared, or IoT devices that MDE doesn’t cover—ensuring more complete DNS-layer protection across your environment.SentinelOne + Resolver
Organizations using SentinelOne can enable Cloud Funnel to forward DNS queries from managed endpoints to HYAS Protect for analysis and threat detection. This provides deep visibility into DNS activity on protected devices. However, SentinelOne only captures traffic from endpoints with the agent installed. Adding a HYAS Resolver extends coverage and enforces DNS-layer policy for infrastructure devices, IoT systems, and other unmanaged assets—ensuring nothing falls through the cracks.
Why Go Hybrid?
Achieve comprehensive DNS-layer protection across managed, unmanaged, and hybrid environments
Cover devices that don’t support agents or endpoint integrations (e.g., printers, cameras, guest devices)
Maintain clean attribution and policy enforcement without unnecessary overhead
Get the most out of your existing security investments while expanding coverage to what they miss
HYAS Protect was designed with deployment flexibility in mind, so you can adapt your protection strategy to your infrastructure—not the other way around.
Still Not Sure?
If you’re unsure which method fits your environment best, answer a few quick questions below, and we’ll guide you to the recommended deployment path based on your needs.
Deployment Assistant
This quick assistant will walk you through a few simple questions to help identify the best way to deploy HYAS Protect—whether that’s through our lightweight Agent, DNS Resolver, Microsoft Defender for Endpoint (MDE) integration, SentinelOne, or a combination of methods.
By answering just a few prompts, you’ll get a personalized recommendation that aligns with your network architecture, visibility needs, and operational goals.
Let’s find the right fit for you.
Does your organization use Microsoft Defender for Endpoint or SentinelOne with Cloud Funnel?
✅ Yes - Choose the appropriate integration below:
Microsoft Defender for Endpoint – MDE Deployment Guide
SentinelOne (with Cloud Funnel) – SentinelOne Deployment Guide
🚫 No - Continue to Question 2. ⤵️
Do you have a mix of devices—some that stay in one place (eg., desktops) and others that travel (eg., remote laptops)?
✅ Yes - Go to Question 3.
🚫 No - Go to Question 4.
Is it acceptable for stationary devices to have policies based on network location (without user/device attribution), while roaming devices get group-based policies and individual attribution?
✅ Yes – A hybrid deployment is recommended.
Deploy the HYAS Protect Resolver for stationary devices and the HYAS Protect Agent for roaming devices.
🚫 No – Deploy via the HYAS Protect Agent. Agent Deployment Guide
Are all of your devices always connected to the corporate network (e.g., via a fixed office, site-to-site VPN, or similar)?
✅ Yes - Go to Question 5
🚫 No - Deploy via the HYAS Protect Agent. Agent Deployment Guide
Is it acceptable to apply policies based on network location (source network) instead of user groups, without knowing which specific user or device made each DNS request?
(You’ll still see all DNS queries—just not who made them.)
✅ Yes - Deploy via the HYAS Protect Resolver. Protect Resolver Deployment Guide
🚫 No - Deploy via the HYAS Protect Agent. Agent Deployment Guide
Optional: Do you also need to protect unmanaged or infrastructure devices (e.g., printers, IoT, or guest systems) not covered by MDE or SentinelOne?
✅ Yes – Consider adding a HYAS Protect Resolver alongside your integration. Protect Resolver Deployment Guide
🚫 No – Your existing integration may be sufficient for your current environment.
If your environment doesn’t fit cleanly into these scenarios, contact HYAS to discuss a custom deployment strategy that meets your specific operational and security needs.