This document describes the NetLock RMM Cloud & Pro service, the scope of functions, and the key features of the SaaS solution and serves as a supplement to the contract concluded between the customer and 0x101 Cyber Security UG (haftungsbeschränkt), including the General Terms and Conditions (GTC). 0x101 Cyber Security UG (haftungsbeschränkt) reserves the right to adapt the service description to technical developments, new legal requirements, or changed market requirements.
NetLock RMM is a remote monitoring and management (RMM) solution that enables centralised control and management of IT systems such as servers, workstations and network devices. It was developed primarily with C#, Blazor, ASP.NET Core and SignalR and offers robust performance, flexibility and modern interfaces.
NetLock RMM is used for the technical operation, maintenance, and security management of distributed IT infrastructures, especially in companies and public institutions with their own IT administration, managed service providers (MSPs), and organizations with high requirements for data protection and digital sovereignty.
NetLock RMM enables increased technical efficiency, transparency, and security in IT operations. Centralized management and automation reduce manual maintenance efforts, minimize security risks, and standardize service processes.
The use of the software addresses the following challenges on the part of the customer:
NetLock RMM essentially enables the following functions:
| Function | Description / Purpose |
|---|---|
| System and network monitoring | Continuously monitors the status of registered endpoints and servers. Collects metrics such as CPU, memory, and hard disk usage as well as event logs, thereby supporting the early detection of malfunctions and performance problems. |
| Sensor system and event notifications | Configurable sensors monitor defined thresholds (e.g., CPU load, services, logs). Events can trigger actions or send notifications via email, Microsoft Teams, Telegram, or ntfy.sh. |
| Remote shell and file browser | Provides remote administrative access to end devices. Enables file transfer, file management, log analysis, and command execution. |
| Task and service manager | Remote management of running processes and services on endpoints. Administrators can terminate, start, and manage processes without physical presence. |
| Remote support and screen control | Remote access with screen control on user interfaces (Windows). Supports session switching and logging for support purposes. |
| Software inventory | Records installed software packages, scheduled tasks, services, drivers, and user logins. Provides a basis for compliance audits, patch management, and asset management. |
| Hardware inventory | Automatic detection of hardware features (CPU, RAM, data carriers, network interfaces). Enables a central overview of distributed IT hardware infrastructure. |
| Policy and automation management | Administrators define policies that are automatically applied to devices (e.g., antivirus settings, sensor activation, or script jobs). Supports centralized control of recurring tasks. |
| Job system (tasks & scripts) | Time- or event-driven execution of PowerShell and Bash scripts. Supports patch management, maintenance tasks, or automated repair measures. |
| Multi-Tenancy and Group Management | Structured management of multiple customers or locations in a single instance. Strict technical separation supports data protection and compliance. |
| Granular rights management | Rights can be defined down to the user and object level. Administrators can precisely control which technicians are allowed to access which tenants or functions. Supports two-factor authentication. |
| Dashboard and event overview | Display of open events and statistics in real time. Filter by severity, tenant, device, or category. |
| Server role architecture (server concepts) | The RMM server has a modular design and consists of independent roles: Trust, Communication, Update, File, Remote, Notification. This separation improves scalability, security, and fault tolerance. |
| Container-based deployment (Docker) | Installation and operation are performed via Docker Compose. The components can be deployed quickly. Supports Docker-compatible distributions. |
| Secure Communication (HTTPS, TLS) | HTTPS encrypted by default. Certificate management via Let’s Encrypt or trusted certification authorities. |
| Agent authentication and signature verification | Each agent is digitally signed. Only verified agents can connect to the server. Protection against manipulation and unauthorized connections. |
| Antivirus integration (Microsoft Defender) | Management and monitoring of Windows Defender status, quarantine notifications, and settings directly via the RMM interface. |
| User and session management | Create, edit, and remove users. Log sessions and actions for traceability. |
| Self-hosting and data protection (NetLock RMM Pro only) |
Full operation possible in your own infrastructure. |
| Open source license (AGPL-3.0) | Open source and licensed under GNU AGPL v3. Enables audits, customizations, and independent operation in accordance with digital sovereignty requirements. |
The NetLock RMM Cloud product is used via a managed cloud provided by NetLock RMM. No local server installation is required. Access requires a web browser (e.g., the latest version of Chrome, Firefox, Edge, or Safari) and an internet connection. An email address is also required to register on the member portal. The end devices only initiate outgoing, TLS-encrypted connections to the cloud instance. No port forwarding is necessary for this.
To run NetLock RMM Pro and Community Edition as an on-premises solution (self-hosting), we recommend a Linux server with the latest Docker environment. Installation is container-based via Docker. All components (front end, back end, database, reverse proxy) are preconfigured.
Recommended system resources: At least 2 CPU cores, 8 GB RAM, and 80 GB free storage space (depending on the number of monitored systems).
MySQL version 8.0 or higher is required as the database. The server must be permanently accessible to the administrator via HTTPS. Certificates can be integrated via Let’s Encrypt or a trusted certification authority. The target devices must have a supported operating system and network access to the server.
NetLock RMM can also be operated in completely isolated or internet-separated (“air-gapped”) environments, whereby no data is transferred to third parties.
| Windows | Linux | Mac OS |
|---|---|---|
| Windows 10 / 11 Windows Server 2016 / 2019 / 2022 / 2025 |
Ubuntu: 20.04, 22.04, 23.10 & 24.04 Debian: 11 & 12 RHEL 9, CentOS Stream: 8 & 9 Fedora: 39 & 40 |
Ventura Sonoma Sequoia |
| Although it is technically possible to use older versions of Windows/Windows Server, NetLock RMM does not officially support them, meaning that no direct troubleshooting or official support is provided. | For more information and possible restrictions on supported Linux distributions, please refer to our documentation. |
Requirements other than those listed here have not been intended or tested for use with this service.
The use of NetLock RMM Pro, NetLock RMM Community Edition, and NetLock Cloud is only possible with registration in the NetLock RMM Members Portal.
As of: October 17, 2025
Version: 1.0