Documentation

RMM Manual

RMM covers endpoint operations, service work, monitoring, automation, discovery, privileged control, and operational assurance.

Audience: IT, service, and operations teamsFocus: Service delivery, operational control, and infrastructure visibilityStatus: Public manual

RMM Manual

What this manual covers

RMM extends Cadres into IT service and operations management. It is the product teams use when endpoint control, service workflows, automation, monitoring, discovery, and privileged operations become part of the business.

The public manual starts with the operating model and then goes deeper into source-backed operator guides. Internal engineering reference, raw API detail, and platform setup procedures remain private.

RMM Topics

Browse the manual.

Operations Core

Operations Core

Endpoint & Service Operations

Host lifecycle, service work, operator context, and day-to-day endpoint control.

  • Agent and host lifecycle, org boundaries, and operator access
  • Service desk, software operations, and day-to-day endpoint work
  • Execution surfaces that stay reviewable as team size grows

Operations Core

Monitoring, Discovery & Automation

Alerts, discovery, workflows, jobs, scripts, patching, and automated operational response.

  • Alerts, investigations, workflows, jobs, and scripts
  • Patching, discovery, infrastructure maps, and device visibility
  • Repeatable operations with signal, guardrails, and approvals

Assurance & Control

Assurance & Control

Security, Compliance & Controlled Access

Privileged control, compliance state, vulnerability handling, certificates, audit visibility, and assurance.

  • PAM, compliance, and vulnerability handling
  • Certificate lifecycle, drift, exfiltration, and ransomware signals
  • Reviewable privileged operations and operational assurance

Detailed Operator Guides

Detailed Operator Guides

Organization Management

Organization boundaries, service ownership, and the tenant structure required to operate RMM cleanly across customers or internal environments.

  • Creating Organizations
  • Managing Organizations
  • Listing Organizations (Server-Side Pagination)

Detailed Operator Guides

Host & Agent Management

Enrollment, host lifecycle, agent health, and the workflows teams rely on to keep managed endpoints trustworthy.

  • Deploying the Agent
  • Get the Organization Secret
  • What Happens During Registration

Detailed Operator Guides

ITSM

Incidents, problems, changes, service workflows, SLAs, and the operating structure teams use to run support and operations together.

  • Incident Management
  • Creating Incidents
  • Incident Fields

Detailed Operator Guides

Alerts & Monitoring

Alert quality, triage workflow, escalation posture, and the signal model teams use to keep monitoring actionable.

  • Creating Metric Alert Rules
  • Creating Event Alert Rules
  • Managing Alert Snooze

Detailed Operator Guides

Automation

Workflow automation, approvals, exception handling, and the guardrails needed to turn repeatable work into reliable execution.

  • Creating a Workflow Definition
  • Building Workflow Steps
  • Publishing a Workflow

Detailed Operator Guides

Patching

Patch planning, rollout control, exception handling, and the workflow used to keep update pressure from turning into operational risk.

  • Setting Up Patch Policies
  • Creating and Managing Ring Sets
  • Handling Rollbacks

Detailed Operator Guides

Network Discovery

Discovery strategy, inventory confidence, and the workflow teams use to turn network visibility into actionable operations.

  • Understanding the Probe-Based Model
  • Automatic Subnet Discovery and Probe Election
  • Creating a Manual Discovery Job

Detailed Operator Guides

Infrastructure Map

Service and infrastructure relationships, blast-radius visibility, and the topology context teams need during change and incident work.

  • Where the Feature Lives
  • Using the Infrastructure Map
  • Available controls

Detailed Operator Guides

Active Directory

Directory-aware operations, identity context in endpoint management, and the workflows that connect endpoint reality to directory truth.

  • Automatic Forest Detection
  • Listing Forests
  • Manual Forest Registration

Detailed Operator Guides

Privileged Access Management

Privileged workflow boundaries, approval expectations, and the controls used to keep sensitive action reviewable.

  • Vault Management
  • Creating a Vault
  • Listing Vaults

Detailed Operator Guides

Compliance Operations

Operational compliance posture, configuration discipline, and the review model teams use to keep IT operations auditable.

  • Template Creation and Publishing
  • Policy Assignment
  • Running Compliance Scans

Detailed Operator Guides

Vulnerability Management

Exposure review, prioritization, remediation follow-through, and the workflow used to keep vulnerability work grounded in real operations.

  • Viewing Vulnerabilities
  • Triggering Manual Operations
  • a. Checking Operation Status

Detailed Operator Guides

Certificate Lifecycle

Certificate inventory, renewal pressure, and the workflow that keeps certificate risk from surfacing only at failure time.

  • Viewing Certificate Inventory
  • Manual Certificate Sync
  • Setting Up Auto-Renewal

Detailed Operator Guides

Fingerprint Drift

Configuration drift visibility, change awareness, and the workflow used to distinguish normal variation from meaningful deviation.

  • Creating a Fingerprint Policy
  • Assigning Policies to Hosts
  • Capturing a Baseline

Detailed Operator Guides

Exfiltration Detection

Signal interpretation, investigation workflow, and the operating context teams need when suspicious data movement appears.

  • Understanding the Detection Pipeline
  • Managing Suppressions
  • Investigating Exfiltration Alerts

Detailed Operator Guides

Ransomware Detection

Behavioral signals, containment-oriented response, and the workflow teams need when destructive activity is suspected.

  • Activating a Policy
  • Deactivating a Policy
  • Monitoring the Dashboard and Risk Scores

Detailed Operator Guides

Backup Management

Backup visibility, recovery confidence, and the operating model teams use to keep resilience work reviewable instead of assumed.

  • Table of Contents
  • Getting Started
  • Backup Engine (BES) Management

Read Path

Where teams usually start.

  1. Start with Endpoint & Service Operations to understand host control, service work, and operator access boundaries.
  2. Move to Monitoring, Discovery & Automation when alerts, patching, discovery, and automated action are the main concern.
  3. Use Security, Compliance & Controlled Access when privileged control, compliance posture, and operational assurance become the priority.

Native Handoffs

How RMM connects to the suite.

Portal

Portal provides governed operator identity and access context for the people working inside RMM.

Meridian

Meridian can use RMM operating state as part of broader compliance and remediation workflows.

Keystone

Keystone matters when service delivery, customer operations, or commercial commitments need to stay aligned.