cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
mbsangster
Viewer

RMM Security

I seek advice on securing and monitoring Remote Monitoring and Management (RMM) services like Kaseya. I had a n experience with an account take over, and the actors used RMM to deploy malware to target systems. The logs only show connection details and no tracking of downlods, patches or updates. Any ideas how to track and log this activity?

2 Replies
Danieldale
Viewer II

You can implement intrusion detection and prevention systems (IDPS) to monitor network traffic and identify any suspicious or unauthorized activities. IDPS can provide valuable insights into potential security breaches. My Envoy Air

mbsangster
Viewer

Thanks!