To stay updated on your favorite discussions, please create an account or log in. Then, click the Bookmark icon to subscribe and receive notifications.

Computer Protection integration with RMM software

maaretp W/ Alumni Posts: 62 W/ Former Staff

We have received a number of queries asking about RMM (Remote Management and Monitoring) support with Computer Protection endpoints.

This community post:
- Introduces RMM with Solarwinds and RMM with Kaseya to support new people in getting started with it
- Invites partner and user feedback on improving our RMM support


The Foundation for RMM Support

F-Secure Computer Protection endpoint includes a WMI (Windows Management Interface) functionality that exposes a selected set of information in a commonly used format. As a supported interface, it includes a promise for us to keep this interface consistent even when we are changing the internals of the applications.

WMI is the core of RMM Support as the interface that provides the necessary information. For RMM support to work, WMI must be turned on. Out of the box, WMI is turned off and administrators need to assign a profile with WMI on for RMM purposes.

Where we have built Protection Service for Businesses Portal as optimized for our fleet of security products, RMM solutions offer a more generalized set of remotely managing and monitoring software in large organizations on top of the details F-Secure PSB Portal does. It enables seeing many kinds of software in a concise view, with selected subset of information and functionalities.

Support for Solarwinds MSP RMM


Applies to:

  • F-Secure Computer Protection 19.4+
  • F-Secure Server Protection 19.4+
  • F-Secure Client Security 14.00+
  • F-Secure Server Security 14.00+

Scenario 1: Installation of Computer Protection

The Solarwinds portal includes a "Push 3rd party software" node. Installing with a command line installer option for silent install, including the licence voucher in the installer name allows for distributing Computer Protection.

Scenario 2: Monitoring Windows Devices with Computer Protection

There are six stock monitoring services related to F-Secure that are available in the Solarwinds MSP portal and also described in their documentation:

They display the information extracted from WMI Interface.  All this information can be added to dashboards. Ensure WMI is first enabled in PSB Portal.




Scenario 3: Running tasks with Computer Protection

The Solarwinds portal allows for running tasks exposed through WMI or AMP (Powershell). Our WMI exposes only one method, Scan Computer.

Users of Solarwind are also free to implement Powershell scripts for specific task running and information collection needs. Our solution does not include any of those.

Scenario 4: Alerts

The "thresholds" for monitored parameters can be configured by standard means of the Solarwinds portal. For example, if the "Real Time Scanning" parameter does not contain the "Turned_On" string, a warning is issued, as seen in the screenshot above.

The administrator will then see it on the Active Issues node of the portal.

Scenario 5: Reports

Simple reports are possible based on monitored metrics.



Support for Kaseya RMM


Applies to:

  • F-Secure Computer Protection 19.4+
  • F-Secure Server Protection 19.4+
  • F-Secure Client Security 14.10+
  • F-Secure Server Security 14.00+

Scenario 1: Installation of Computer Protection


 You can add either a network installer or an offline MSI package to the Kaseya's Software Catalog.




To detect a deployed instance of the software, you can specify the following registry key as a scan item:
(for 32-bit Windows) HKEY_LOCAL_MACHINE\SOFTWARE\F-Secure\OneClient
(for 64-bit Windows) HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\F-Secure\OneClient


Scenario 2: Monitoring with Monitor Sets


Kaseya allows you to create Monitor Sets for monitoring Windows services and processes.
You can add the following F-Secure Computer Protection services to your Monitor Sets:


  • fshoster
  • fsnethoster
  • fsulhoster
  • fsulorsp
  • fsulnethoster
  • fsulprothoster



Scenario 3: Scheduling agent procedures


F-Secure Computer Protection includes the WMI Provider component to enable an integration with various RMM systems.


The documentation on the exposed WMI classes together with some use case examples can be found here.


Alternatively, you can download and import the pre-created set of the agent procedures here.




In case of any failures detected by the agent procedures, the alerts are issued:




The description of each agent procedure can be found here.


Inviting Your Feedback

We recognize our RMM support is founded on information we have decided to reveal on the WMI and would welcome your feedback on our choices of what we make available. Are you missing something we don't make available? Are you using something you self-created that other administrators would benefit from if we improved the product?

Our idea queue holds these items that we could take forward based on feedback:


  • On access scanning results are not shown through WMI. We have one manual scanning actions available with WMI and show only results of that specific scan through WMI. Perhaps having a fuller status is more needed that we have given it credit for?
  • We have only one action available with WMI: running a malware scan. Would other actions be needed? We have thought about WMI primarily as an interface for *monitoring* purposes. Is that a fair assumption with respect to what you need?
  • We focus on reporting status when the product is running and are more unclear on how things are shown through WMI when an installation of the product is broken. Has this turned out to be something you look for when managing the product with WMI or through a RMM solution?

We know we don't know all of it, and we know we also forget to mention some of the things you have shared with us in our summaries. Take this as an opportunity to specifically provide us feedback on a focus area we want to understand: the RMM support.


On behalf of the R&D team responsible for Computer Protection endpoint development,



  • Petes
    Petes W/ Partner Posts: 3 Security Scout

    I would like to build an agent to use in a few monitoring envionments.    The onles I would like to support is  Graylog, Datadog, and ADT IQ.   I beleve the most compatable method would be through syslog.  

    Ideally this would support Windows, Mac and Linux

  • kiryvl
    kiryvl W/ Alumni Posts: 4 Security Scout

    Hi, Petes

    Do you mean you would like our Windows  end-point client to write some monitoring events to Windows Event Log?

    Best regards,