Legal

    Service Description (EULA)

    NetLock RMM Cloud & Pro Service Description

    NetLock RMM Service Description

    General

    This document describes the NetLock RMM Cloud & Pro service, the scope of functions, and the key features of the SaaS solution and serves as a supplement to the contract concluded between the customer and 0x101 Cyber Security UG (haftungsbeschränkt), including the General Terms and Conditions (GTC). 0x101 Cyber Security UG (haftungsbeschränkt) reserves the right to adapt the service description to technical developments, new legal requirements, or changed market requirements.

    Scope of services

    NetLock RMM is a remote monitoring and management (RMM) solution that enables centralised control and management of IT systems such as servers, workstations and network devices. It was developed primarily with C#, Blazor, ASP.NET Core and SignalR and offers robust performance, flexibility and modern interfaces.

    NetLock RMM is used for the technical operation, maintenance, and security management of distributed IT infrastructures, especially in companies and public institutions with their own IT administration, managed service providers (MSPs), and organizations with high requirements for data protection and digital sovereignty.

    NetLock RMM enables increased technical efficiency, transparency, and security in IT operations. Centralized management and automation reduce manual maintenance efforts, minimize security risks, and standardize service processes.

    The use of the software addresses the following challenges on the part of the customer:

    • Reduction of distributed individual solutions and standardization of system administration
    • Reduction of administrative effort and potential sources of error through automation
    • Improvement of system transparency and traceability of changes
    • Independence from proprietary cloud services through open and self-hostable architecture

    NetLock RMM essentially enables the following functions:

    • Collection and evaluation of system, software, and user information (inventory)
    • Monitoring of system statuses, services, and events
    • Performing remote maintenance measures
    • Support for centralized automation of recurring administrative tasks such as software updates, script execution, or policy compliance
    • Management of (external) security functions such as antivirus management

    Overview of individual functions

    FunctionDescription / Purpose
    System and network monitoringContinuously monitors the status of registered endpoints and servers. Collects metrics such as CPU, memory, and hard disk usage as well as event logs, thereby supporting the early detection of malfunctions and performance problems.
    Sensor system and event notificationsConfigurable sensors monitor defined thresholds (e.g., CPU load, services, logs). Events can trigger actions or send notifications via email, Microsoft Teams, Telegram, or ntfy.sh.
    Remote shell and file browserProvides remote administrative access to end devices. Enables file transfer, file management, log analysis, and command execution.
    Task and service managerRemote management of running processes and services on endpoints. Administrators can terminate, start, and manage processes without physical presence.
    Remote support and screen controlRemote access with screen control on user interfaces (Windows). Supports session switching and logging for support purposes.
    Software inventoryRecords installed software packages, scheduled tasks, services, drivers, and user logins. Provides a basis for compliance audits, patch management, and asset management.
    Hardware inventoryAutomatic detection of hardware features (CPU, RAM, data carriers, network interfaces). Enables a central overview of distributed IT hardware infrastructure.
    Policy and automation managementAdministrators define policies that are automatically applied to devices (e.g., antivirus settings, sensor activation, or script jobs). Supports centralized control of recurring tasks.
    Job system (tasks & scripts)Time- or event-driven execution of PowerShell and Bash scripts. Supports patch management, maintenance tasks, or automated repair measures.
    Multi-Tenancy and Group ManagementStructured management of multiple customers or locations in a single instance. Strict technical separation supports data protection and compliance.
    Granular rights managementRights can be defined down to the user and object level. Administrators can precisely control which technicians are allowed to access which tenants or functions. Supports two-factor authentication.
    Dashboard and event overviewDisplay of open events and statistics in real time. Filter by severity, tenant, device, or category.
    Server role architecture (server concepts)The RMM server has a modular design and consists of independent roles: Trust, Communication, Update, File, Remote, Notification. This separation improves scalability, security, and fault tolerance.
    Container-based deployment (Docker)Installation and operation are performed via Docker Compose. The components can be deployed quickly. Supports Docker-compatible distributions.
    Secure Communication (HTTPS, TLS)HTTPS encrypted by default. Certificate management via Let's Encrypt or trusted certification authorities.
    Agent authentication and signature verificationEach agent is digitally signed. Only verified agents can connect to the server. Protection against manipulation and unauthorized connections.
    Antivirus integration (Microsoft Defender)Management and monitoring of Windows Defender status, quarantine notifications, and settings directly via the RMM interface.
    User and session managementCreate, edit, and remove users. Log sessions and actions for traceability.
    Self-hosting and data protection (NetLock RMM Pro only)Full operation possible in your own infrastructure.
    Open source license (AGPL-3.0)Open source and licensed under GNU AGPL v3. Enables audits, customizations, and independent operation in accordance with digital sovereignty requirements.

    System requirements

    NetLock RMM Cloud

    The NetLock RMM Cloud product is used via a managed cloud provided by NetLock RMM. No local server installation is required. Access requires a web browser (e.g., the latest version of Chrome, Firefox, Edge, or Safari) and an internet connection. An email address is also required to register on the member portal. The end devices only initiate outgoing, TLS-encrypted connections to the cloud instance. No port forwarding is necessary for this.

    NetLock RMM Pro / Community Edition

    To run NetLock RMM Pro and Community Edition as an on-premises solution (self-hosting), we recommend a Linux server with the latest Docker environment. Installation is container-based via Docker. All components (front end, back end, database, reverse proxy) are preconfigured.

    Recommended system resources: At least 2 CPU cores, 8 GB RAM, and 80 GB free storage space (depending on the number of monitored systems).

    MySQL version 8.0 or higher is required as the database. The server must be permanently accessible to the administrator via HTTPS. Certificates can be integrated via Let's Encrypt or a trusted certification authority. The target devices must have a supported operating system and network access to the server.

    NetLock RMM can also be operated in completely isolated or internet-separated ("air-gapped") environments, whereby no data is transferred to third parties.

    Supported (agent) operating systems

    WindowsLinuxMac OS
    Windows 10 / 11, Windows Server 2016 / 2019 / 2022 / 2025Ubuntu: 20.04, 22.04, 23.10 & 24.04, Debian: 11 & 12, RHEL 9, CentOS Stream: 8 & 9, Fedora: 39 & 40Ventura, Sonoma, Sequoia

    Although it is technically possible to use older versions of Windows/Windows Server, NetLock RMM does not officially support them, meaning that no direct troubleshooting or official support is provided.

    For more information and possible restrictions on supported Linux distributions, please refer to our documentation.

    Requirements other than those listed here have not been intended or tested for use with this service.

    Additional regulations

    The use of NetLock RMM Pro, NetLock RMM Community Edition, and NetLock Cloud is only possible with registration in the NetLock RMM Members Portal.


    As of: October 17, 2025

    Version: 1.0