bc8e637bba | ||
---|---|---|
.vscode | ||
_modules | ||
api/tacticalrmm | ||
docker | ||
docs | ||
scripts | ||
web | ||
.gitignore | ||
.travis.yml | ||
LICENSE | ||
README.md | ||
azure-pipelines.yml | ||
backup.sh | ||
install.sh | ||
restore.sh | ||
update.sh |
README.md
Tactical RMM
Tactical RMM is a remote monitoring & management tool for Windows computers, built with Django and Vue.
It uses an agent written in golang, as well as the SaltStack api and MeshCentral
LIVE DEMO
Demo database resets every hour. Alot of features are disabled for obvious reasons due to the nature of this app.
Tactical RMM is currently in alpha and subject to breaking changes. Use in production at your own risk.
Discord Chat
Features
- Teamviewer-like remote desktop control
- Real-time remote shell
- Remote file browser (download and upload files)
- Remote command and script execution (batch, powershell and python scripts)
- Event log viewer
- Services management
- Windows patch management
- Automated checks with email/SMS alerting (cpu, disk, memory, services, scripts, event logs)
- Automated task runner (run scripts on a schedule)
- Remote software installation via chocolatey
- Software and hardware inventory
Windows versions supported
- Windows 7, 8.1, 10, Server 2008R2, 2012R2, 2016, 2019
Installation
Requirements
- VPS with 4GB ram (an install script is provided for Ubuntu Server 20.04)
- A domain you own with at least 3 subdomains
- Google Authenticator app (2 factor is NOT optional)
Docker
Refer to the docker setup
Installation example (Ubuntu server 20.04 LTS)
Fresh VPS with latest updates
login as root and create a user and add to sudoers group (we will be creating a user called tactical)
apt update && apt -y upgrade
adduser tactical
usermod -a -G sudo tactical
switch to the tactical user and setup the firewall
su - tactical
sudo ufw default deny incoming
sudo ufw default allow outgoing
sudo ufw allow ssh
sudo ufw allow http
sudo ufw allow https
sudo ufw allow proto tcp from any to any port 4505,4506
sudo ufw allow proto tcp from any to any port 4222
sudo ufw enable && sudo ufw reload
Our domain for this example is tacticalrmm.com
In the DNS manager of wherever our domain is hosted, we will create three A records, all pointing to the public IP address of our VPS
Create A record api.tacticalrmm.com
for the django rest backend
Create A record rmm.tacticalrmm.com
for the vue frontend
Create A record mesh.tacticalrmm.com
for meshcentral
Download the install script and run it
wget https://raw.githubusercontent.com/wh1te909/tacticalrmm/develop/install.sh
chmod +x install.sh
./install.sh
Links will be provided at the end of the install script.
Download the executable from the first link, then open rmm.tacticalrmm.com
and login.
Upload the executable when prompted during the initial setup page.
Install an agent
From the app's dashboard, choose Agents > Install Agent to generate an installer.
Updating
Download and run update.sh (Raw)
wget https://raw.githubusercontent.com/wh1te909/tacticalrmm/develop/update.sh
chmod +x update.sh
./update.sh
Backup
wget https://raw.githubusercontent.com/wh1te909/tacticalrmm/develop/backup.sh
Change the postgres username and password at the top of the file (you can find them in /rmm/api/tacticalrmm/tacticalrmm/local_settings.py
under the DATABASES section)
Run it
chmod +x backup.sh
./backup.sh
Restore
Change your 3 A records to point to new server's public IP
Create same linux user account as old server and add to sudoers group and setup firewall (see install instructions above)
Copy backup file to new server
Download the restore script, and edit the postgres username/password at the top of the file. Same instructions as above in the backup steps.
wget https://raw.githubusercontent.com/wh1te909/tacticalrmm/develop/restore.sh
Run the restore script, passing it the backup tar file as the first argument
chmod +x restore.sh
./restore.sh rmm-backup-xxxxxxx.tar
Using another ssl certificate
During the install you can opt out of using the Let's Encrypt certificate. If you do this the script will create a self-signed certificate, so that https continues to work. You can replace the certificates in /certs/example.com/(privkey.pem | pubkey.pem) with your own.
If you are migrating from Let's Encrypt to another certificate provider, you can create the /certs directory and copy your certificates there. It is recommended to do this because this directory will be backed up with the backup script provided. Then modify the nginx configurations to use your new certificates
The cert that is generated is a wildcard certificate and is used in the nginx configurations: rmm.conf, api.conf, and mesh.conf. If you can't generate wildcard certificates you can create a cert for each subdomain and configure each nginx configuration file to use its own certificate. Then restart nginx:
sudo systemctl restart nginx