Call us at: 1-844-500-1810
Introducing threat monitoring for your ConnectWise Automate RMM

For the first time, you can now monitor for threat activity directly inside your RMM. Detect, visualize, and report on threats in your ConnectWise Automate instance with support from Perch’s 24/7 Security Operations Center (SOC).

Sign me up
Image of a nest with eggs on a beanstalk
Image of the moon with clouds
What does this mean for me?

Sleep soundly at night knowing that the Perch SOC monitors your CW Automate instance and reviews detailed threat activity, all in real-time. Perch offers Automate monitoring for all, with enhanced monitoring capabilities for Automate on-prem users.

Detect and alert on things like:
  • New script or commands being executed
  • New agents from unexpected locations
  • New and uncommon software installations
  • Unapproved software installation
  • New services initiated
  • Stopped AV & EDR services
  • New persistence mechanisms implanted
  • Brute-force attacks
  • Successful logins from previously unseen IPs or countries
  • Account lockouts
  • Failed logins for nonexistent users
  • Mass file download by agents or spike in file downloads
  • Spike in commands or scripts running executables on client computers
  • Spike in script creation
  • Running a file on a client’s computer
RMM monitoring is just a few steps away

Not a CW Automate user? Let us know what RMM we should add next.