secRMM Features
Below are the most significant features/benefits about secRMM. Please click the link to jump to the subject on this page.
For complete details, please reference the secRMM Administrators Guide (PDF).

01. Detailed forensic data for smart phones, tablets and removable media 09. Tightly integrated with Microsoft Windows Operating System
02. Useful yet simple authorization modules 10. Tightly integrated with Microsoft Active Directory
03. Prevent unauthorized devices from mounting 11. Tightly integrated with Microsoft System Center
04. Mobile app for added security 12. Tightly integrated with Microsoft Azure\HyperV\RDP\RemoteFX
05. Enforceable two man policy 13. Tightly integrated with Microsoft Rights Management Services (RMS)
06. Removable Media device tracking 14. Tightly integrated with Microsoft Excel
07. Transparent integration with hardware/software encryption technology 15. Tightly integrated with Microsoft Scripting languages
08. Light-weight 16. Tightly integrated with Microsoft EMS/InTune (MDM)
17. Flexible licensing, affordable price


back to main list

01. Detailed forensic data for smart phones, tablets and removable media

secRMM monitors and collects very detailed forensic data about removable media write activities. This ensures that if a security incident does occur and removable media is involved, you will be able to understand the exact nature of the security incident. The level of detail collected by secRMM is what distinguishes secRMM from other products that attempt to provide similar functionality. Surprisingly, other competing solutions are not even able to report the files being copied from the local computer and/or network. Missing this important data makes the security forensic data incomplete and will make any security analysis exercise a guessing game. secRMM was developed to address requirements coming from the United States government and military organizations. This means secRMM ensures that removable media write activity is always predictable and the events are always captured to a nonrepudiation store (i.e. the Windows Security event log).

back to main list

02. Useful yet simple authorization modules

Watch the video
secRMM provides a removable media authorization layer to prevent any removable media security incidents from ever occurring in the first place. Unlike other competing solutions, secRMM lets you control what files the end-user can copy from the local computer and network. The other authorization modules let you control removable media write activity based on userid, removable media serial number, removable media internal Ids (i.e. VIDs and/or PIDs) and the program used to perform the write operations to the removable media.

back to main list

03. Prevent unauthorized devices from mounting

Watch the video
secRMM can prevent unauthorized devices from mounting to the Windows Operating System. The advantage of using this feature is that even though the device cannot be read from or written to, the device still receives power from the Windows computer. This allows your end-users to still charge their device (usually a smart phone or tablet) while keeping the data in your environment safe. A corresponding event is generated when this even occurs so you can even know who is charging their phone or tablet. This feature is available on the device serial number, the device VID/PID and for userids.

back to main list

04. Mobile app for added security

Watch the video    Download
For heightened security environments such as military and/or government, secRMM comes with a mobile app that forces the end-user to login (authenticate) from the mobile device before the device will appear as a USB storage device to Windows. Note that you are not required to use this feature; it is an optional security feature.



back to main list

05. Enforceable two man policy

Watch the video
secRMM comes with an end-user GUI application called SafeCopy that works in conjunction with secRMM.  The SafeCopy user interface mimics the standard Windows explorer program but only allows writing to removable media and adjusts what it displays to the end-user based on secRMM properties. Administrators can easily enable secRMM/SafeCopy to enforce a two man policy. A two man policy means at least 2 people must be involved for the removable media write operation to occur. The two man policy is a common operating procedure in many critical government and military situations. The secRMM/SafeCopy two man policy implementation allows administrators to monitor each operation the end-user takes while using the SafeCopy program. A check is made if an administrator tries to approve himself. This check will not allow the approval.


back to main list

06. Removable Media device tracking

Watch the video
Read the blog


back to main list

07. Transparent integration with hardware/software encryption technology

secRMM works seamlessly with hardware and software encryption technologies. In fact, secRMM generates the necessary security events required:
1. An event telling you that an encryption device has been plugged into the Windows computer (i.e. mounted)
2. An event telling you that the authorization to use the device has succeeded. Encryption technology authorization is done using either software (i.e. a dialog asking for your password) or hardware using a push button key pad. Examples of software authorization include IronKey devices and Microsoft BitLocker. An example of hardware authorization is the Apricorn Aegis Secure Key USB Flash Drive.

back to main list

08. Light-weight

secRMM is designed as a light-weight security software product. What this means is that when secRMM does not need to be running, it enters into a quiescent state. The secRMM software will run only when a Removable Media device is plugged into the computer. This means that your end-users will not feel a performance impact from the secRMM software in their normal day-to-day computer work activities.

back to main list

09.  Tightly integrated with Microsoft Windows Operating System

secRMM was designed to fit into the most common security and monitoring scenarios. This means secRMM utilizes Microsoft best practices by utilizing core Windows Operating System components rather than writing a separate framework to monitor Removable Media devices. The benefit to this approach is that secRMM does not require a large learning curve or large setup period. It also means you can integrate secRMM into your existing security and monitoring strategies/implementations with very little work. secRMM uses the familiar Microsoft Management Console (MMC) as the User Interface (UI) to make secRMM configuration changes.


back to main list

10. Tightly integrated with Microsoft Active Directory

Watch the video
secRMM takes advantage of Active Directory in two powerful ways. First, secRMM properties can be applied using Active Directory Group Policy. The Group Policy Editor has both a computer and user configuration security settings secRMM node. The user interface for the Group Policy Editor is identical to the secRMM user interface in the Computer Management MMC. This means secRMM security settings can be applied to the computer, a group of users and/or individual users. Secondly, secRMM can use Active Directory computer object and user object attributes within the secRMM properties (AllowedDirectories, AllowedSerialNumbers and AllowedUsers). This makes applying removable media security policies very easy to maintain and deploy.



back to main list

11. Tightly integrated with Microsoft System Center

Watch the video    Download
Because secRMM does not use a proprietary framework to function, secRMM easily integrates into the system management tools used within any environment. Microsoft System Center is the dominant systems management tool on the market today. secRMM has integration with SCCM, SCOM, Orchestrator, Azure Sentinel and Azure Intune. For details, please click here.

back to main list

12. Tightly integrated with Microsoft Azure\HyperV\RDP\RemoteFX

Watch the video
secRMM provides enhanced auditing for Microsoft Cloud and virtual environments. secRMM supports USB drives that are available to remote machines under Azure and Hyper-V via the Remote Desktop RemoteFX USB redirection feature. This feature even works when you use a Remote Desktop session to another physical computer. The secRMM online events contain information about the Hypervisor server and the remote machine. The event data gets logged in both the physical and remote secRMM event logs. This gives you a complete picture of your removable storage within your domain whether it exists on premise or in the cloud. This feature requires you to have secRMM running on both the RDP client and the RDP server.



back to main list

13. Tightly integrated with Microsoft Rights Management Services (RMS)


secRMM provides integration with Microsoft RMS by providing a security rule named EnableRMS. The secRMM EnableRMS rule can be set to only allow RMS protected files to be copied to removable storage devices. You can take it even one step further and have secRMM "RMS protect" files during the copy of the file to removable storage devices. In both configurations, secRMM logs which RMS template is associated with the file being copied to removable storage.



back to main list

14. Tightly integrated with Microsoft Excel

Watch the video    Download
secRMM comes with an Excel AddIn that makes analysis, filtering and reporting very simple.



back to main list

15. Tightly integrated with Microsoft Scripting languages

Watch the video
In addition to the MMC User Interface, secRMM can be controlled and configured using any Microsoft COM compatible scripting language (i.e. Powershell, VBScript, Jscript, Perl) as well as any .Net language.


back to main list

16. Tightly integrated with Microsoft EMS/InTune (MDM)

Watch the video
Read the blog
When it comes to mobile devices, your MDM framework and your DLP solution should be able to share common data. With SCCM, you can easily accomplish this and generate meaningful security reports for your mobile devices.

back to main list

16. Flexible licensing, affordable price

secRMM has 4 different license modes:
1. By Active Directory forest – secRMM provides all features in this licensing mode.
2. By Active Directory domain – secRMM provides all features in this licensing mode.
3. By individual computer – secRMM provides all features in this licensing mode.
4. Freeware – secRMM provides online and offline removable media events only, in addition to unique smart phone and tablet security features.
Please contact our friendly sales team for pricing details.