What is Co-Managed IT?
Co-Managed IT is a hybrid engagement model where an external MSP supplements an internal IT team rather than replacing it. The internal team keeps context and business relationships while the MSP provides specialist depth, after-hours coverage, tooling, and scale on demand.
How Co-Managed IT works
Three-step view of how it operates in practice.
Clarify roles
Define who owns what: tickets, strategy, security, projects, vendor management. Written RACI prevents gaps.
Share tools
Both teams work from shared RMM, PSA, and documentation. One system of record, two operators.
Coordinate cadence
Weekly stand-ups, quarterly reviews, shared incident response. Partnership, not vendor relationship.
Common co-managed patterns
A clear breakdown of the common variants.
Coverage extension
Internal team works business hours; MSP covers nights, weekends, holidays.
Specialist depth
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Project scale
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
Tooling & vendor management
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why Co-Managed IT matters for SMBs
Co-Managed IT is a hybrid engagement model where an external MSP supplements an internal IT team rather than replacing it.
Common Co-Managed IT mistakes
- Turf warsWithout clear roles, internal and external teams duplicate work or drop tickets between them. RACI is mandatory.
- One-way knowledgeAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- No joint planningQuarterly joint roadmap sessions align priorities. Without them, the MSP drifts to their own agenda.
- Billing surprisesScope-creep in co-managed engagements is common. Clear inclusion/exclusion and change-request process prevents friction.
Co-Managed IT frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Want to supplement your internal IT team without replacing them?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.