Documentation

Technical Docs

Security concepts & technical specs for all services.

Remote Management

Last updated: January 2026

v1.1Internal

Security Concept: Remote Management System

Document Version: 1.1
Date: January 2026
Confidentiality: Internal


1. Summary

This document describes the architecture and security measures of our Remote Management System. The system enables secure remote maintenance and monitoring of workstations without dependence on third-party providers like AnyDesk or TeamViewer.

What does this mean for you?

Simply explained: We have built our own system for IT support that runs on our own servers in Germany. No external company has access to your data. When we help you with a problem, it happens via a secure, encrypted connection - just like online banking.

Core Benefits:

  • Complete control over all data (Self-Hosted)
  • GDPR-compliant data processing in Germany
  • Banking-standard encryption (TLS 1.3)
  • User consent before every remote access

2. System Architecture

2.1 Overview

                              Internet
                                  │
                    ┌─────────────┴─────────────┐
                    │   TLS 1.3 Encryption      │
                    │      (Port 443/HTTPS)     │
                    └─────────────┬─────────────┘
                                  │
              ┌───────────────────┼───────────────────┐
              │                   │                   │
              ▼                   ▼                   ▼
    ┌─────────────────┐ ┌─────────────────┐ ┌─────────────────┐
    │ rmm.c4g7.com    │ │ api.c4g7.com    │ │ mesh.c4g7.com   │
    │ Web Dashboard   │ │ API Server      │ │ MeshCentral     │
    └────────┬────────┘ └────────┬────────┘ └────────┬────────┘
             │                   │                   │
             └───────────────────┴───────────────────┘
                                 │
                    ┌────────────┴────────────┐
                    │      HAProxy Cluster    │
                    │  (High Availability, 2 Nodes)│
                    └────────────┬────────────┘
                                 │
                    ┌────────────┴────────────┐
                    │     Tactical RMM        │
                    │    (Internal Server)    │
                    └────────────┬────────────┘
                                 │
          ┌──────────────────────┼──────────────────────┐
          │                      │                      │
          ▼                      ▼                      ▼
   ┌─────────────┐        ┌─────────────┐        ┌─────────────┐
   │  Office PC 1│        │  Office PC 2│        │  Office PC n│
   │  MeshAgent  │        │  MeshAgent  │        │  MeshAgent  │
   │  TRMM Agent │        │  TRMM Agent │        │  TRMM Agent │
   └─────────────┘        └─────────────┘        └─────────────┘

2.2 Components

ComponentFunctionLocation
HAProxyLoad Balancer, SSL TerminationGermany
Tactical RMMCentral Management, MonitoringGermany
MeshCentralRemote Desktop, Remote MaintenanceGermany
MeshAgentClient Agent on WorkstationsLocal
TRMM AgentMonitoring AgentLocal

3. Security Measures

What does "security" mean in this context?

Simply explained: Imagine you're sending a letter. Without encryption, it would be like a postcard - anyone could read it. With our encryption, it's like a sealed safe that can only be opened by the recipient. No one in between - no internet provider, no hacker, nobody - can see what's being transmitted.

3.1 Transport Encryption

All connections between clients and server are encrypted:

ProtocolWhat does it mean?Usage
TLS 1.3Latest encryption (like online banking)All connections
TLS 1.2Older but still secure versionLegacy devices
WSSEncrypted real-time connectionRemote maintenance

Simply explained - TLS 1.3: This is the same security standard used by banks, PayPal, and Amazon. When you see the lock symbol in your browser, you're using this technology. Our connections are just as secure as your online banking session.

Cipher Suites (only modern, secure algorithms):

  • ECDHE-RSA-AES256-GCM-SHA384
  • ECDHE-RSA-CHACHA20-POLY1305
  • TLS_AES_256_GCM_SHA384

What are Cipher Suites? These are the mathematical procedures that encrypt your data. We only use the strongest and most modern procedures - the same ones used by governments and military.

3.2 End-to-End Encryption

Simply explained: "End-to-end" means: The data is encrypted on your computer and only decrypted on our server. Along the entire path in between - through your router, through the internet, through every server in between - NOBODY can read the data. It's like sending a message in a language that only you and we understand.

3.3 Certificate Management

  • SSL certificates from Let's Encrypt (automatic renewal)
  • HSTS enabled (HTTP Strict Transport Security)
  • Certificate pinning for critical connections

Simply explained - Certificates: A certificate is like a digital ID. It proves that you're really talking to our server and not to a fraudster. Let's Encrypt is a trusted organization that issues these IDs.

3.4 Network Security

┌─────────────────────────────────────────────────────────────┐
│                    Security Layers                          │
├─────────────────────────────────────────────────────────────┤
│  Layer 1: Firewall / HAProxy (only port 443 public)        │
│  Layer 2: TLS Encryption (End-to-End)                      │
│  Layer 3: Authentication (API Keys, Certificates)          │
│  Layer 4: Authorization (Role-based Access Rights)         │
└─────────────────────────────────────────────────────────────┘

4. Data Processing

What happens with your data?

Simply explained: We store NONE of your personal data. No documents, no emails, no passwords - nothing. The system only checks if your computer is "healthy": Is it running fast enough? Is there enough storage free? Are all security updates installed? That's all. Like a doctor measuring your pulse, but not reading your diary.

4.1 Collected Data

The system only collects basic technical metrics:

CategoryDataWhy?
SystemCPU, RAM, Hard driveTo see if your PC is slowing down
NetworkConnection statusTo check if your PC is reachable
SoftwareInstalled programsTo find outdated software
UpdatesWindows Update statusTo detect security vulnerabilities

Important: This data is only queried when needed (pull principle). We don't constantly look at your computer, only when a check is necessary.

4.2 What we DON'T see and store

Absolute guarantee - this data is NEVER collected:

What we DON'T seeWhy not?
Your documents and filesTechnically not possible, not built into the system
Email contentsNo access to email programs
Browser historyNot read out
PasswordsTechnically not accessible
Private messagesNo access to chat programs
Photos and videosNot transmitted
Keyboard inputsNo keylogger, no recording

Simply explained: Our system is like a mechanic who only looks under the hood. He checks oil, tires, and brakes - but he doesn't open your glove box and doesn't read your private letters.

4.3 Data Retention

Data TypeRetention PeriodWhat does it mean?
System Metrics30 daysAutomatically deleted afterwards
Audit Logs90 daysLog of who accessed what and when
Session DataOnly during sessionGone immediately after end

Simply explained: All technical data is automatically deleted after a short time. Nothing is stored permanently. After 30 days, it's as if the measurement never happened.


5. User Consent and Transparency

You have control

Simply explained: Nobody can access your computer without your permission. EVERY TIME an IT staff member wants to see your screen, a window appears on your computer. You decide: Yes or No. Without your "Yes", nothing happens. Also, you ALWAYS see when someone is connected - there are no hidden accesses.

5.1 Consent Workflow

┌──────────────────────────────────────────────────────────────┐
│                    Remote Access Process                     │
├──────────────────────────────────────────────────────────────┤
│                                                              │
│  1. IT staff initiates remote access                        │
│                         │                                    │
│                         ▼                                    │
│  2. System sends request to client                          │
│                         │                                    │
│                         ▼                                    │
│  3. User receives popup notification:                       │
│     ┌────────────────────────────────────┐                  │
│     │  IT Support wants to access your   │                  │
│     │  computer.                         │                  │
│     │                                    │                  │
│     │  [ Allow ]       [ Deny ]          │                  │
│     └────────────────────────────────────┘                  │
│                         │                                    │
│                         ▼                                    │
│  4. Only with consent: Connection is established            │
│                         │                                    │
│                         ▼                                    │
│  5. Visible icon in taskbar during session                  │
│                                                              │
└──────────────────────────────────────────────────────────────┘

5.2 Your Rights as a User

Your RightWhat does it mean?
Consent RequiredNo access possible without your OK
VisibilityIcon shows active connection
CancelYou can disconnect at any time
LoggingAll accesses are documented

No secret accesses possible: It is technically impossible to access your computer without the popup. The system is built so that transparency is enforced - not as an option, but as a fundamental principle.


6. Why not AnyDesk or TeamViewer?

The Important Difference

Simply explained: With AnyDesk or TeamViewer, all connections run through servers in America or other countries. This means: A foreign company could theoretically read along. With us, everything runs through our own server in Germany. Nobody except us has access. Your data never leaves Germany.

CriterionAnyDesk/TeamViewerOur System
Where is the data?USA/AbroadGermany
Who has access?Foreign companyOnly us
GDPR?ProblematicFully compliant
DependencyYes - if provider fails, nothing worksNo - own control
CostsMonthly feesOne-time setup
Source CodeSecret (nobody knows what happens)Open Source (verifiable)

What does "Open Source" mean? The program code of our software is publicly viewable. Thousands of developers worldwide have reviewed it. Hidden backdoors or spy functions would have been discovered immediately. With TeamViewer, nobody knows what the software really does - we have to trust the manufacturer.


7. Technical Specifications

For the technically interested: This section contains details for IT professionals. The most important information for you: Our system is secured multiple times (2 servers), uses current security standards, and supports both old and new internet protocols.

7.1 Infrastructure

ParameterValueWhat does it mean?
Load BalancerHAProxy 2.8 (2 Servers)If one server fails, the other takes over
Failover Time< 3 secondsOutages are fixed immediately
EncryptionTLS 1.2 / TLS 1.3Most modern security standards
IPv4 + IPv6YesWorks with all internet connections
Max Connections50,000More than enough capacity

7.2 Software Versions

SoftwareVersionLicense
Tactical RMMCurrentAGPL v3 (Open Source)
MeshCentralCurrentApache 2.0 (Open Source)
HAProxy2.8+GPL v2 (Open Source)

8. Privacy and Legal

8.1 GDPR Compliance

Simply explained - GDPR: The General Data Protection Regulation is an EU law that protects your personal data. Our system is fully GDPR compliant - that means we adhere to the strictest data protection laws in Europe.

What we guarantee:

  • Data processing exclusively in Germany
  • No sharing with third parties (never)
  • All processing purposes are documented
  • Automatic deletion after set periods
  • Technical protection measures are documented

8.2 Traceability (Audit Trail)

Simply explained: Every access is logged. If someone asks "Who accessed my computer and when?", we can answer that exactly. These logs are tamper-proof.

What is logged:

  • Time of every action
  • Name of IT staff member
  • What exactly was done
  • Which computer was affected

9. Frequently Asked Questions

"Can IT secretly access my computer?"

No. Technically impossible. With every access attempt, a window appears on your screen. Without your consent, no connection is established. During a session, you'll also always see a symbol in the taskbar.

"Are my files or emails being read?"

No. The system has no access to your documents, emails, or personal data. Only technical information about the state of your computer is collected (CPU, memory, updates).

"Who can see my data?"

Only authorized IT staff. All accesses are logged. It's always traceable who accessed which system and when.

"Is the connection really secure?"

Yes, banking standard. We use TLS 1.3 - the same encryption your bank uses for online banking. Nobody can eavesdrop on or manipulate the connection.

"What happens with my data?"

No permanent storage. Technical metrics are kept for a maximum of 30 days and then automatically deleted. Personal data is not collected at all.


10. Summary: Your Security at a Glance

PromiseGuarantee
No access without your consentTechnically enforced via popup
No storage of personal dataDocuments, emails etc. are not collected
EncryptionTLS 1.3 (banking standard)
Data locationGermany only
TransparencyAll accesses are logged
Open SourceSoftware is verifiable

11. Contact and Support

For questions about system security or data protection, contact:

IT Department
Email: it@c4g7.com


This document is updated when significant changes are made to the system.