Infrastructure

    Enterprise-Grade Security

    Built-in protection against supply chain attacks, advanced encryption, and hardened server architecture.

    Out of the Box Attack Prevention

    Hardened Server Architecture

    NetLock RMM is architected from the ground up with multiple protection layers. Even if your server were ever compromised, breaching your infrastructure remains exceptionally difficult.

    Important Distinction

    Server-side packages (installation & update packages stored on the server) are uniquely encrypted and obfuscated. They are decrypted on-demand when agents request updates. Running agents on endpoints are not obfuscated or virtualized – this is intentional to prevent antivirus false positives and ensure compatibility with security software.

    Server Code Virtualization

    Server components are protected with advanced code virtualization and deep tamper protection, making reverse engineering and manipulation extremely difficult.

    Package Obfuscation

    All agent packages stored on the server are uniquely encrypted and obfuscated before distribution, preventing unauthorized access or tampering.

    On-Demand Decryption

    Packages are securely decrypted and deobfuscated only when needed using proprietary algorithms, minimizing exposure time.

    Why Server Compromise Becomes Extremely Difficult

    Even if an attacker gains access to your server, they face multiple barriers:

    • Virtualized code cannot be easily analyzed or modified
    • Encrypted packages are useless without proprietary decryption
    • Unique obfuscation per installation prevents generic exploits
    • Tamper protection detects and blocks manipulation attempts

    Result

    These combined mechanisms form a layered defense model that raises the bar significantly for any potential attacker, making your infrastructure exceptionally resilient.

    Supply Chain Protection

    Trust Server Verification

    Protect against attacks like those seen with SolarWinds or Kaseya through independent hash verification.

    Advanced Server Concept

    By dividing the server into different roles, you can significantly enhance security against supply chain attacks.

    Update Server

    Provides update packages for agents

    Trust Server

    Independent hash verification service

    Attack Scenario Protection

    1

    Attacker compromises Update Server to deploy malicious packages

    2

    Agent downloads package but contacts Trust Server for hash verification

    ✓

    Hash mismatch detected – agent refuses to execute the package

    Result: Attacker would need to compromise both Update AND Trust servers – a significantly harder attack vector.

    Performance & Security

    High-Speed RAM Distribution

    Unlike conventional RMM solutions that rely on outdated disk-based delivery, NetLock RMM serves installation and update packages directly from memory – combining performance with enhanced security.

    • No disk I/O bottlenecks or hardware wear
    • Packages preloaded and encrypted in memory on startup
    • Blazing-fast delivery speeds at scale
    • Encrypted packages never touch disk in plain form
    • Perfect for enterprise-scale deployments

    Access Control

    Web Console IP Restriction

    Configure IP addresses allowed to access the Web Console. Leave empty to allow access from all IPs.

    Backend IP Restriction

    Configure IP addresses allowed to access Backend services. Applied when backend services restart.

    End-to-End Encryption

    All communication between server and agents is encrypted using modern cryptographic standards.

    AV-Friendly Agents

    Running agents are clean and unobfuscated to prevent antivirus false positives and conflicts.

    Outbound-Only Connections

    Agents only perform outgoing connections – no port forwarding required on client networks.

    Agent Authentication

    Only agents installed by the customer can communicate with their own NetLock RMM server installation. Agents from unknown installations are automatically rejected.

    Trusted & Verifiable

    RMM platforms have been misused for cyberattacks in the past. We provide full transparency to help security researchers verify legitimate NetLock RMM installations and whitelist our signed agents.

    Platform Trust & Reliability

    Digitally Signed: The paid on-premises version is code-signed with a trusted certificate, significantly reducing the likelihood of third-party abuse.

    NetLock RMM Cloud: Our cloud platform maintains the same high security standards and is protected against misuse through intelligent license verification systems.

    License Abuse Prevention: Both the cloud platform and paid on-premises version employ sophisticated systems to prevent license fraud and unauthorized usage.

    Note: Only the paid version is digitally signed. The free/open-source version is unsigned. For questions, please contact support@netlockrmm.com

    Code Signing Certificate Details

    Use the following information to whitelist NetLock RMM agents or verify legitimate installations:

    Status:Valid — Signature verified
    Subject:CN="Open Source Developer, Nico Mak", O=Open Source Developer, L=Kerpen, S=Nordrhein-Westfalen, C=DE
    Issuer:CN=Certum Code Signing 2021 CA, O=Asseco Data Systems S.A., C=PL
    Thumbprint:7FF988F718D03058CD3E5CD55E26E0C28768417C
    Serial:6A6440B3059FBBD3D9D4D71D1E838F82
    Valid:13.08.2025 – 13.08.2026
    Questions about verification?support@netlockrmm.com
    Patch SLA

    Automated Patch SLA System

    Our built-in Patch SLA system ensures every instance stays up-to-date and secure — automatically escalating notifications until action is taken.

    7 Days

    Friendly Reminder

    A subtle update icon appears in the web console, letting administrators know a new version is available.

    14 Days

    Active Notification

    A dialog popup appears in the web console, actively reminding the administrator to apply the latest update.

    30 Days

    Automatic Shutdown

    The instance will stop itself to prevent security risks from running outdated and potentially vulnerable versions.

    Why enforce updates? Outdated RMM instances are prime targets for attackers. Our Patch SLA ensures your infrastructure is never left exposed to known vulnerabilities — protecting both you and your clients.

    Cybersecurity at Our Core

    With deep roots in cybersecurity, we're committed to continuously evolving these protection mechanisms — not just to respond to threats, but to stay ahead of them and prevent incidents before they happen.