1. INFO CENTER
  2. RMM - Remote Monitoring & Management

What is RMM?

Remote Monitoring & Management

TEKRiSQ shield

Everyone is working remotely nowadays, how do you keep track?

 

The new era of remote work has opened many possibilities, including many risks that come along with this new reality.

 

  1. How do you make sure that all computers are being managed?
  2. Do you have a way to support your users remotely in the case something stops working?
  3. What about the moment a user reports the computer slowing down?
  4. Are computers being patched to prevent attackers from taking advantage and gaining access?
  5. Are you tracking what software is installed and is allowed by company policy?
  6. Can you tell who has the hard disk encrypted?
  7. Can you run scripts remotely to adjust computer settings or to explore new findings?
  8. Does the computer have any protections?
    (
    VPN? DNS Filtering? EDR? Anti-Virus?)
  9. Is there a Password Vault Manager installed?
  10. Is the protection solution being updated regularly?

 

RMM comes into play and gives insight into all of the issues mentioned above, it basically gives you visibility into the device's running state, the patches missing, software versions, operating system version, hard disk encryption state, network status while providing diagnostics, alerts, reporting and more in an easy to use dashboard.

There's no longer a need for doing it the old school way - going user after user and asking if they've updated their computer or following protocol, you can now configure multiple devices remotely and all at the same time.

 

Unfortunately, RMM can't solve everything but it can provide great visibility into the current state the organization's position is in.

 

For example, you can tell if all computer's hard disks have been encrypted, if not, there is a great possibility that the same organization is lacking protection in more areas.

 

Another example would be, do you have one or more computers where the operating system is outdated?    -  That tells us that employees aren't doing the right thing.

We've seen cases with Windows XP or outdated Mac computers (versions 10-11), which is a huge risk as these computers are connected to the same network all your other computers are connected to!

 

1. What if you get infected without knowing and one of your malware files reaches a workmate?

That malware can then reach other workmates if it has "worm" capabilities.

That malware can steal all your credentials.

That malware might have remote control and/or webcam access.

2. What if an attacker gained access using a vulnerability in the outdated operating system and used lateral movement to reach other computers in the same network?


These are only two examples but there are plenty more!

 

Using RMM allows us to discover more and more data required to improve the security posture, we believe that giving the user the right tools and education to become aware of said issues and resolve them, will give them an understanding of how to function correctly & securely to prevent the next breach.

 

 

TEKRiSQ+shield