Appearance
ZynoRMM
ZynoRMM is a cross-platform remote monitoring and management solution built for MSPs. A lightweight agent runs on each managed endpoint — macOS, Windows, or Linux — and maintains a persistent connection to the ZynoRMM bridge, giving technicians real-time visibility and control over their customers' devices.
Features
Remote Screen Sharing & Control
Connect to any managed endpoint's desktop in real-time. Screen sessions use WebRTC for low-latency, hardware-accelerated H.264 video streaming directly from the endpoint to the technician's browser — no VNC, no screen recording software required.
- Multiple monitors — view and switch between all connected displays
- Keyboard & mouse control — full remote input, including special keys and shortcuts
- Multi-viewer support — multiple technicians can observe the same session; one technician has active control at a time
- Clipboard sync — copy and paste text between the local and remote machine
- Chat — communicate with the end user via an on-screen chat window during a session
- Platform support — macOS and Windows
Remote Terminal
Open a fully interactive terminal session on any endpoint. Terminal sessions run over a real PTY (pseudo-terminal), so you get full shell support — tab completion, text editors, interactive commands — not just command output.
- macOS, Windows, and Linux supported
- Multiple concurrent sessions per endpoint
- Real-time I/O streamed over WebSocket
Command & Script Execution
Run commands or scripts on endpoints and collect the results.
- Synchronous or asynchronous execution
- stdout/stderr streamed back in real-time
- Exit codes captured
- Environment variables and working directory configurable per execution
- Pre-approved scripts — scripts can be reviewed, signed, and stored for repeat execution across endpoints
File Management
Browse, transfer, and manage files on remote endpoints.
- Directory browsing — navigate the full filesystem with permissions, sizes, and modification dates
- File upload and download — transfer files to and from endpoints via WebRTC data channels
- File operations — create, rename, move, and delete files and directories
System Information & Inventory
Get a live view of each endpoint's configuration and health.
- System overview — hostname, OS, boot time, CPU count, total memory, domain join status
- Hardware inventory — motherboard, CPUs, memory modules, GPUs, disks, and network interfaces
- Installed programs — full software inventory with publisher, version, and source
- User sessions — who is logged in, session type, login/logout history
- Resource utilization — real-time CPU, memory, and disk usage
System Services
View and manage system services (daemons, Windows services) on endpoints.
- List all services with status
- Start, stop, and restart services remotely
Network Tools
Diagnose network issues directly from the endpoint's perspective.
- Interface listing — all network interfaces with addresses and status
- DNS resolution — resolve hostnames from the endpoint
- Ping — ICMP ping from the endpoint to any target
- Port scanning — test TCP connectivity from the endpoint
Network Tunnels
Create secure TCP and UDP tunnels through endpoints for accessing services on remote networks.
Agent Lifecycle
- Automatic enrollment — deploy the agent with an enrollment token (via MDM, Intune, GPO, or manual install) and it registers itself with no manual approval step
- Self-updating — agents can be updated remotely after a technician reviews and approves the update
- Authenticated uninstall — agents can only be removed by an authorized technician, not by end users or compromised infrastructure
- Service mode — runs as a system service (launchd on macOS, Windows Service, systemd on Linux) for persistent, unattended operation
Architecture & Security
ZynoRMM is built with a zero-trust security architecture that assumes the hosting infrastructure itself could be compromised. Every sensitive operation requires cryptographic proof from an authenticated technician — the server alone cannot execute commands on your endpoints.
Learn more:
- Architecture — how the components fit together
- Security — the trust model, encryption, and authorization framework