Getting started with INKY

Written By Eric Heller

Last updated 15 days ago

What is INKY?

INKY is Kaseya’s best-in-class email security solution, designed to protect your organization from phishing and email threats.

INKY uses multiple AI detection methods (computer vision, GenAI, behavioral analysis, link analysis, sender authentication) to catch sophisticated email threats. Transparent warning banners explain threats in plain language, building user trust and awareness.

For more information, see the article Understanding INKY Basics.

Organizations and teams

Organizations are INKY's highest-level entity for grouping teams and managing hierarchy. Organizations provide a structure for organizing multiple teams, assigning administrators, and controlling settings across the entire account.

In INKY, teams typically represent small to medium-sized businesses (SMBs). Teams can be nested within organizations to maintain hierarchy and streamline management. An organization can have multiple teams, each with its own set of administrators and settings.

An organization automatically includes the following entities:

  • Root organization: INKY's highest-level entity, the MSP. The root organization can include many customer organizations. Root organizations are represented with a building icon.

  • Root organization’s team - This is the MSP’s/MME’s own team for which they can deploy and become familiar with INKY. Teams are represented with a people icon.

  • Customer organization - These sub-organizations are the customers of the root organization. Customer organizations can have many teams and are represented with a people icon.

Onboarding

IMPORTANT: Only users with the Super Admin account can perform Onboarding tasks.

This Onboarding section guides you through the essential tasks required to ensure a successful onboarding experience. It is recommended you perform the tasks in each section in the order they are presented.

IMPORTANT: A section may refer you to a separate article with instructions for completing the task. After you complete the task, be sure to return to this “Getting started with INKY” article and move to the next section to continue onboarding.

1. Installing INKY for your organization’s own team

Installing INKY for your organization’s own team is a great way to become familiar with INKY’s features and deployment strategies.

For more information, see the article Installing INKY for your own organization’s team.

2. Installing INKY for a customer organization

Generating a license and installing INKY in the client's email platform are key steps when installing INKY for a customer organization.

For more information, see the article Installing INKY for a customer organization.

3. Configuring essentials

After you have installed INKY for your own organization or for a team, configure these essential features:

  • VIP List: Configure a VIP List to escalate threats to Danger level when attackers impersonate your highest-risk targets — executives, board members, and frequently-spoofed employees. Configuration is available at the team level only.
    To configure, see VIP spoofing protection.

  • Allow List: Configure an allow list to add trusted business partners and frequent senders to reduce false positives. Configuration is available at the organization and team levels.
    To configure, see Allow list overview.

  • Block List: Configure a block list to permanently block known malicious senders or domains. Configuration is available at the organization and team levels.
    To configure, see Block list overview.

IMPORTANT: Settings configured at the organization level are inherited by all teams related to the organization. For more information about inheritance, see the article Organization Settings and Inheritance.

4. Planning your deployment strategy

INKY uses a two-phase deployment approach that minimizes user disruption and false positives:

  • Phase 1: Journal Mode (3-7 days): Passive monitoring, no user visibility.

  • Phase 2: INKY-Users Group: Phased rollout with full inline protection.

For more information, see the article Deployment strategy.

5. Adding account users

Super Admins can add users who have access to and work within their INKY environment. There are multiple roles available, each with specific permissions. When adding a user, make sure to select the appropriate role based on the level of access required.

For more information, see the article Admin management.

Frequently asked questions

For answers to common INKY questions, see the article General Q&A.