1. How to install RMM Central agent?
First create a remote office with distribution server or direct communication. Then install the agent from Web Console -> UEM -> Agent -> Remote Office. Find out more details
here. To install agents in Linux machines, click
here.
2. What are the ports used by RMM?
Here is a
list of ports that are used by the RMM application. You will need to open these ports for a hassle-free communication between the Agent, RMM Server and the Distribution Server.
3. How is customer data protected in RMM?
Each customer, managed under RMM is provided with a unique ID and the users and machines associated with each customer are mapped to it. This ensures that users can only access the details of the customers associated with them and restricts access to other customers' data.
4. Is it possible for a customer to be managed by several administrators?
We can create various user accounts by clicking user administration under Admin tab. User administration enables associating users with customers. Either one user can manage several customers or one customer can be managed by several users.
5. Is it possible to add/store customer details like mail, address, contact details, etc. for each client?
While creating new customers, such details can be specified. To add details to existing customers, go to the Admin tab, select customer, choose Action, and then click on Modify
6. If I manage more number of customers, will that consume more bandwidth?
If you are using a distribution server, bandwidth consumption would be low as the clients' endpoints use local bandwidth to download updates from the distribution server.
7. How can one reach computer and domain in customer environment?
One can achieve this using the AD connector.
8. Can I generate bills for clients based on usage?
Yes, you can generate bills through our billing feature.
9. Can I limit the number of managed endpoints(desktops, mobile devices, servers, etc) for specific customers?
While creating a customer, these details can be provided (can also be modified later).
10. Will I get free technical support during evaluation?
Yes, you can get free technical support during evaluation. You can contact our support team at rmmcentral-support@manageengine.com.
11. What is Scope of Management (SoM)?
Scope of Management is a feature in RMM that is used to specify which computers you can manage using RMM. You can add and manage computers that are from an Active Directory, a workgroup or any other directory service like Novell eDirectory. The computers can either be in the same Local Area Network (LAN) or in a remote location connected through a Virtual Private Network (VPN) connection or through the Internet. For more information, see
defining Scope of Management.
12. Can I group and define configurations or do I have to define them individually?
RMM has predefined configurations available for users and computers. These configurations can be grouped and defined into collections if they are meant for the same user or computer. However, if they are meant for individual users or computers, they have to be defined and deployed individually.
13. When and how do configurations get applied to computers and users?
Every configuration that is applied to computers and users will be applied in the following scenarios:
- User logon or system startup: All user configurations, except the Custom Script configuration, are applied when a user logs on or when a system is started.
- System startup or shutdown or user logon or logoff: The Custom Script configuration is applied when a user logs on or logs off. This also takes place when a computer is switched on or switched off.
- 90-minute refresh cycle.
Let us see a few examples: A configuration is deployed to computers and users, to block USB devices,
If the computer is turned off - This configuration will be applied during the computer start up and the USB access will be blocked.
If the computer is turned on - This configuration will get applied during the next refresh cycle, when the agent communicates with the RMM server. Assuming that a USB device was already plugged in and used in the computer, the access will be denied as soon the configuration gets applied.
If the User has logged off - This configuration will get applied to the user's profile when the user logs on to the computer. So that the particular user will not have permission to access USB devices.
If the User has logged on - This configuration will be applied during the subsequent refresh cycle. Assuming that the user has already plugged in a USB device and has been using the device, the access will be denied after the configuration gets applied.
14. How do I access the User Interface (UI) of RMM from a remote location?
To access the RMM UI from a remote location, follow the steps given below:
- Open a supported browser.
- Enter http://:in the address bar
Note: Here refers to the name / IP Address of the machine running RMM, refers to the port where the product is started, the default being 8090. For example, 192.168.100.110:8020. Press Enter. You can now login to the RMM UI.
15. What do I use the Define Target feature for?
The Define Target feature is used to identify targets, also called users or computers, to apply configurations to. The targets can be all the users or computers belonging to a site, domain, Organizational Unit (OU) or a group. They can also be a specific user or computer. For more information, see
defining targets.
16. How is RMM licensed?
RMM is licensed on an annual-subscription basis depending on the number of computers you want to manage. RMM works on unit based licensing which will detect two devices when there is one device that needs to be registered for monitoring as well as management purpose. You can get the price for a specific number of desktops from our online store. You may also buy a permanent license by paying a one-time fee. Contact us further to get a quote from our sales team: sales@manageengine.com
17. What is probe key in RMM Central.?
Probe key is used to authenticate the probes in RMM Central monitoring component. The probes are necessary for monitoring the remote offices of each customer. Each remote office will have a unique probe key. There are no additional costs to procure these probe keys. To obtain a probe key,
Login to RMM Central web console.
Go to Admin -> General Settings and choice any of the below-given options.
1. Customer -> click on customer name -> Remote offices -> click on remote office name to view summary.
2. Remote office -> Click on remote office name to view summary.
Under probe details tab, you can download probe_key.zip file
18. Why are configurations in RMM created using a Web interface?
RMM, with its Web-based interface, enables desktop administrators to access the application from anywhere within a network to complete various tasks; for example, to create configurations. This facilitates easy management of computers without being required to be present in any specific location.
19. Which ports are used by the RMM application?
Here is a
list of ports that are used by the RMM application. You will need to open these ports for a hassle-free communication between the Agent, RMM Server and the Distribution Server.
20. Which database does RMM suppport to store data?
RMM supports MySQL, PGSQL and MS SQL database to store data.
21. I have an Internet Information Services (IIS) application installed in my computer. Can I configure the settings in RMM to use this IIS instead of its own?
No, currently RMM does not support IIS.
22. Will new computers that are added in the domain receive configurations automatically once they check in with RMM?
Yes, computers that are newly added in the domain will receive all the deployed configurations automatically when they check in with the RMM Server.
23. Does RMM support Home editions of Windows OS like Windows XP Home, Windows 7 Home Premium?
All the features other than patch management works effectively while using RMM in home edition of windows operating system.
24. Do we have any option for multiple active directory inputs in RMM?
Yes, We accept multiple active directory inputs in RMM.
25. How will the RMM agent reach the Distribution Server if the port number used for their communication has been changed?
When the agents of the remote location are unable to contact the Distribution Server, they contact the RMM Server directly during the next 90 minutes refresh interval. They receive the modified port numbers of the Distribution Server and communicate with it henceforth.
26. What is IP Scope and What are its advantages?
RMM has different agents for different locations, for example a local office agent will not be the same as the remote office agent. Similarly every remote office has different agents as well. When you are managing computers one or more remote locations, you can have a defined set of IP ranges for different offices. This enables the RMM Server to identify the agents with respect to the IP range. So whenever a computer is moved from a local office to a remote location, an IP scope is used to detect and deploy the respective WAN agent automatically. RMM will check for the change in the IP address periodically and will deploy the appropriate agents whenever a change is detected.
27. What will happen if the agents are unable to reach the RMM Server to report the status after performing any task?
Agents will report the status to the RMM server after performing every task. In case if the RMM Server is not reachable, then the agents will update the status during their subsequent refresh interval.
28. What minimum access requirements are needed if I configure RMM without using a domain admin account? Does it ensure that all the features still work?
If you need to configure RMM without using domain admin account, then you need a common user created in all the computers with admin privilege. However you will not be able to install agents automatically and agent installation can be done using a GPO.
29. Is RMM capable of managing Virtual computers?
Yes, RMM is capable of managing virtual computers.
30. How to install RMM agent in a different drive?
Download the agent and navigate to the downloaded location using command prompt. For example, if you wanted to download the agent in D drive, execute the below mentioned command. DesktopCentralAgent.msi TARGETDIR="D:\DesktopCentral_Agent\" REBOOT=ReallySuppress
31. What is "dcagentupdater" scheduled task?
This is a scheduled task created in the agents. This task runs on the client computer and scheduled every hour to ensure that the agent version is up to date.
32. Is it possible to use RMM to manage computers without installing agents?
No, RMM needs agents to perform any desktop management activity.
33. Is it mandatory for all the managed computers have connection to the internet?
No, it is not necessary for all the managed computers to have internet connection. However RMM server would need connection to the internet in order to download the patches and software applications from the respective vendors website.
34. Can I use RMM to manage computers that does not belong to a domain?
Yes, RMM can be used to manage computers even if they do not belong to a domain.
35. Which exe should I download, a 32-bit or 64-bit version?
You can choose to download 32-bit or 64-bit based on your OS architecture.
36. Why should I provide credentials with admin privileges?
Credentials that have admin privileges need to be specified for carrying out certain activities in RMM.
37. How to remove a computer that has been taken offline?
To remove a computer that has been taken offline, navigate to Admin>>Scope of Management>>Computers, select the computers that have been taken offline, and click on "Remove Computer(s)."
38. How to manage a network with multiple admin credentials?
With the credential manager, multiple credentials can be stored and used accordingly for different actions. Click
here to know more about credentials manager.
39. What are the minimum rights/privileges required to make any domain-related changes using RMM?
Domain Admin credentials are required to make any Domain-related changes. You can also use the Local Admin, if it is the same for all the computers in that domain.
40. In real life the remote user doesn't announce when he'll connect to the network. Can the agent be pushed automatically as soon as the remote user logs into the domain?
In this situation, if you have an Active Directory you can ensure the agent is installed when he reaches AD. Alternatively, many of my clients would take a maintenance routine to bring the laptop to the office or have a standard time to get connected to the network so that the agent can be pushed to them.
41. By opening ports to remote users coming in through the WAN and opening ports to NAT the port translation aren't we opening the door to even more attempted penetrations through the ports required considering the fewer open ports the better?
We recommend you to use a component called Secure Gateway, which acts as an intermediate to route all the communication between the agents and the server.You can refer to
this document for more details.
42. Why would you control configurations through RMM rather than Active Directory Group Policy?
Status update and ease of management is better in RMM and RMM supports management of workgroup computers too. Hence you gain more control on configuration using RMM.
43. Does the distribution server need to be dedicated? Does it need to run on a server OS?
No, it is not required to be a Server OS, it can be a simple desktop. Dedicated machines are also not required. The only requirement would be the availability of that machine with zero down time.
44. What is the difference between group management and custom group?
Under Custom Group you can add all the computers managed by RMM and deploy configurations. Group management is a configuration through which you can manage the local groups in a particular computer.
45. Can I restore a configuration, which is moved to Trash? How long does a configuration stay in trash?
If you move any configuration to trash, it can be restored anytime. Configurations are not automatically cleaned up from trash, you will have to remove them manually.
46. If i move a configuration to trash, would it still execute?
No, it will not get executed. Once you move the configuration to trash it wont get executed. To move the configurations to trash automatically go to configurations tab -> settings -> configuration settings -> enable move configuration to trash option.
47. Is there a way, administrators can be automatically notified when there is a change in the status of the configuration?
You can choose to configure the notification settings while creating the configuration, so that the administrators will be notified whenever there is a change in the status of the configuration.
48. Is it required to move to the distribution server to edge/ public communication?
Moving a distribution to the edge is not necessary, distribution server will replicate the required data from RMM and the agents within the respective remote office will communicate with the distribution server.
49. Can the 90 minute refresh policy be changed?
No, the refresh policy cannot be changed.
50. Let's say there are 5 machines on the third floor and they all get the printer configuration successfully. If a 6th machine is added after the configuration has been changed to "Executed" will the 6th machine get the printer? I think what I'm asking is if there is a way to make a perpetual configuration?
Yes, if you deploy the configuration to security group/OU/Custom group then configuration is perpetual.
51. If you configure a set of restricted sites in the Collection wizard, but don't select a web browser that you want to be the default, does it just add the restricted sites to which ever is their default viewer or IE only?
Restricted sites will be applied to Chrome and Internet Explorer.
52. Can we add an EXE to prohibit list, which is not been used in the network?
You can block exe's using "Block Exe" feature.
53. When does a configuration gets deleted? Is it based on the status of the configuration?
Irrespective of the status, the configuration is moved to trash if it is inactive for the "X" number of days.
54. Some keyboards and monitors have embedded USB ports. Will those ports also be blocked despite having the keyboard and mouse options excluded from the block?
Blocking the USB is based on the device type. Hence, it will not block the critical devices.
55. If using Group Policy for items such as Browser settings, Shortcuts, and Printers, will ManageEngine override the Group Policy deployed items?
Group Policy Settings will not be overwritten by using RMM Configurations.
56. I see there is a configuration template of "Defrag Hard Disk". Is that smart enough to detect Solid State Drives and skip those?
We do have a configuration to defrag the Hard Disk Drive. However, finding the type of drive is unavailable for now.
57. How did you get to the option to download and email the agent for remote computers?
You can download the Agent from Admin-->Scope of Management-->Computers tab and download Agent.
58. How can Configurations be used to install fonts for users?
Yes, you can install Fonts using Display Configuration for computers.
59. Is there any better way to get the Instance name or Vendor Instance for exception besides finding it from the Registry or from Computer Management?
It is available in the inventory tab, under USB audit.
60. If your performing drive mapping is there a recommended setup regarding Preferences on skipping drive that already exists or overwrite the existing drive? I have found when using this feature that sometimes the drive is gone the next time the user logs in?
Best choice is to overwrite the existing drive and also choose to apply always to make sure drive mapping gets configured during every logon.
61. Is there a way with offsite devices that are not connected to the local office, to have them routinely receive an alert to bring back to main office for syncing with ManageEngine?
Currently we do not have this option, however we will take it as a feature request.
62. Can two domains be managed with the same management console?
You can choose to add multiple domains using RMM.
63. We currently use group policy to manage many of these configurations. Do you have a list of recommended policies to migrate to ManageEngine?
It is recommended is use either GPO or RMM configuration to apply the settings. Do not use both to do the same task.
64. Do you know if a custom group based on AD OU or security group membership will automatically update based on changes in membership in the AD OU/Security Group?
No. Currently we do not have this option, however we will take it as a feature request.
65. Can website security certificates be deployed to workstations and to multiple browsers?
Yes, Custom Script and File Folder operation configurations should be used to achieve this.
66. Could a laptop be setup with an agent if it is not part of the domain? It is in a workgroup and only onsite one time a week?
RMM supports both Domain and Workgroup. To install Agent for machines connected to network once in a week, then configure the agent retry to install it.
67. Would I be able to run a report to see what anti-virus every system is running and what day it was installed?
Yes, you can identify this, by using the Inventory reports from RMM web console -> Reports -> Inventory Reports -> Computers with/without software.
68. Why am I getting “Your connection is not private” error message?
This error occurs when you are try to access the RMM Central server, via HTTPS protocol using the 'Self Signed' key generated during Server installation. To resolve the issue, kindly follow the steps in this
link.