NetLock RMMNetLock RMM Docs
I — Getting Started & Concepts

What is NetLock RMM?

Product overview, deployment modes, and who NetLock RMM is for.

What is NetLock RMM?

NetLock RMM is a remote monitoring and management (RMM) platform for IT administrators and managed service providers (MSPs). You use it to deploy an agent to the devices you manage, see their status in real time, apply policies, schedule automations, push patches, run scripts, distribute software, hand out remote-control sessions, and keep an auditable record of everything that happens along the way.

The product is delivered as a web Console backed by a server and an agent you install on each managed device. All three components are covered in this manual; the Console is the main surface you interact with.

NetLock RMM Web Console login page

Who the product is for

NetLock RMM targets two audiences:

  • IT admins inside a single organisation. You manage a single fleet of workstations, laptops, and servers. You typically use one tenant, a small number of locations, and a handful of user accounts for your colleagues.
  • MSP technicians managing multiple customer organisations. You create one tenant per customer, organise their devices into locations and groups, apply policies that differ per customer, and scope user permissions so that technicians see only the tenants they are assigned to.

Both audiences use the same Console. The difference is scale — whether you work with one tenant or a hundred — not the feature set.

Deployment modes

NetLock RMM runs in two deployment modes. Functionally they are the same; operationally they differ in who manages the server.

ModeWho runs the serverWhat you see in the Console
CloudHosted by the NetLock RMM vendorAll settings pages are available, the same as on a self-hosted deployment. The vendor manages updates, backups, and infrastructure for you.
Self-hostedYou run the server on your own infrastructureAll settings pages are available. You are responsible for updates, database backups, and maintenance.

Throughout this manual, sections that apply to only one mode are flagged with a callout:

Cloud only: This section applies only to the hosted deployment.

Self-hosted only: This section applies only to self-hosted deployments.

If neither callout appears, the content applies to both modes.

What NetLock RMM does at a glance

The Console is organised into roughly a dozen top-level feature areas. At the highest level:

The rest of this manual describes each of these areas in detail.

What NetLock RMM is not

Setting expectations up front saves time later:

  • It is not a replacement for a dedicated SIEM. The Audit trail is auditable, but large-scale security event aggregation belongs in a SIEM you forward events into.
  • It is not an identity provider. You can sign in with SSO (OIDC / SAML), but NetLock RMM consumes identities; it does not issue them.
  • It is not a backup product. File Server distributes files to agents; it does not perform image-level backups of managed devices.

How to use this manual

The quickest path for a new deployment is:

  1. Read Core Concepts so the vocabulary in the rest of the manual makes sense.
  2. Work through the First-Run Walkthrough to get one device under management.
  3. Skim Navigating the Console so you know where things live.
  4. Jump into Part II for the feature area you need next, or Part III if you want a task-by-task recipe.

For day-to-day reference, use Part II (one chapter per menu group) or Part V (glossary and lookup tables).