The Read
Technological and network security For RMM Protection
Submitted by FazalGR » Wed 20-Sep-2023, 23:12Subject Area: General | 0 member ratings |
 |
Technical controls are essentially limitless, thus this is only a partial list. On-premise RMM software partners are given specific attention in this category.
• Can you limit access to the administrative part of your RMM through IP address? Only permit access from reliable, secure locations.
• Do you have staff throughout the same nation? Create regional restrictions on your firewall to exclude access from other countries.
• Even better, if all your assets are on reliable channels with fixed IP addresses, you may ban everything else.
• Is your main internal network able to access your RMM system? Put it in a different network and tightly restrict access to the rest of your network, please. As a result, it cannot be accessed through your private network.
• To examine network data forwarded to your RMM server, use the IPS functions of your firewall.
• Double-check all port forwarding if you're on-site to make sure they're still required. Based on recommendations from a few years ago, multiple channels in the case of ConnectWise could be activated, but they are not required to be.
• Their RMM system should only be accessible to authorized individuals. Remember the idea of most little advantages.
• Verify if your internal assets are subject to NIST/CIS regulations. You should have better MSP protection for yourself than for any of your clients.
• Make sure the appropriate endpoint monitoring is activated. This should at the very least provide EDR features. It would be ideal to begin protecting this site with a basic antivirus.
• Think about adding a last layer of protection and surveillance (Huntress). Do your clients also use reliable antivirus software? It takes more than just basic antivirus software. They might be saved by effective virus defense.
0 Reviews