Detailed Operator Guides
Organization boundaries, service ownership, and the tenant structure required to operate RMM cleanly across customers or internal environments.
- Creating Organizations
- Managing Organizations
- Listing Organizations (Server-Side Pagination)
Detailed Operator Guides
Enrollment, host lifecycle, agent health, and the workflows teams rely on to keep managed endpoints trustworthy.
- Deploying the Agent
- Get the Organization Secret
- What Happens During Registration
Detailed Operator Guides
Incidents, problems, changes, service workflows, SLAs, and the operating structure teams use to run support and operations together.
- Incident Management
- Creating Incidents
- Incident Fields
Detailed Operator Guides
Alert quality, triage workflow, escalation posture, and the signal model teams use to keep monitoring actionable.
- Creating Metric Alert Rules
- Creating Event Alert Rules
- Managing Alert Snooze
Detailed Operator Guides
Workflow automation, approvals, exception handling, and the guardrails needed to turn repeatable work into reliable execution.
- Creating a Workflow Definition
- Building Workflow Steps
- Publishing a Workflow
Detailed Operator Guides
Patch planning, rollout control, exception handling, and the workflow used to keep update pressure from turning into operational risk.
- Setting Up Patch Policies
- Creating and Managing Ring Sets
- Handling Rollbacks
Detailed Operator Guides
Discovery strategy, inventory confidence, and the workflow teams use to turn network visibility into actionable operations.
- Understanding the Probe-Based Model
- Automatic Subnet Discovery and Probe Election
- Creating a Manual Discovery Job
Detailed Operator Guides
Service and infrastructure relationships, blast-radius visibility, and the topology context teams need during change and incident work.
- Where the Feature Lives
- Using the Infrastructure Map
- Available controls
Detailed Operator Guides
Directory-aware operations, identity context in endpoint management, and the workflows that connect endpoint reality to directory truth.
- Automatic Forest Detection
- Listing Forests
- Manual Forest Registration
Detailed Operator Guides
Privileged workflow boundaries, approval expectations, and the controls used to keep sensitive action reviewable.
- Vault Management
- Creating a Vault
- Listing Vaults
Detailed Operator Guides
Operational compliance posture, configuration discipline, and the review model teams use to keep IT operations auditable.
- Template Creation and Publishing
- Policy Assignment
- Running Compliance Scans
Detailed Operator Guides
Exposure review, prioritization, remediation follow-through, and the workflow used to keep vulnerability work grounded in real operations.
- Viewing Vulnerabilities
- Triggering Manual Operations
- a. Checking Operation Status
Detailed Operator Guides
Certificate inventory, renewal pressure, and the workflow that keeps certificate risk from surfacing only at failure time.
- Viewing Certificate Inventory
- Manual Certificate Sync
- Setting Up Auto-Renewal
Detailed Operator Guides
Configuration drift visibility, change awareness, and the workflow used to distinguish normal variation from meaningful deviation.
- Creating a Fingerprint Policy
- Assigning Policies to Hosts
- Capturing a Baseline
Detailed Operator Guides
Signal interpretation, investigation workflow, and the operating context teams need when suspicious data movement appears.
- Understanding the Detection Pipeline
- Managing Suppressions
- Investigating Exfiltration Alerts
Detailed Operator Guides
Behavioral signals, containment-oriented response, and the workflow teams need when destructive activity is suspected.
- Activating a Policy
- Deactivating a Policy
- Monitoring the Dashboard and Risk Scores
Detailed Operator Guides
Backup visibility, recovery confidence, and the operating model teams use to keep resilience work reviewable instead of assumed.
- Table of Contents
- Getting Started
- Backup Engine (BES) Management