We use cookies to ensure that we give you the best experience on our website.  Visit our Privacy Policy to learn more. If you continue to use this site, we will assume that you are okay with it.

Your choices regarding cookies on this site.
Your preferences have been updated.
In order for the changes to take effect completely please clear your browser cookies and cache. Then reload the page.


Checkmk Manual

Search in the manual

This article is just a draft and not yet finished!

Here will be an overview article on how to set up Checkmk so that you have optimal network security for your monitoring server, as well as for the monitored systems.

First the good news: through its own agents, Checkmk has an architecture that was designed from the beginning for maximum security. This manifests itself, for example, in that the agents basically do not read data directly from the network. It is therefore impossible for an attacker to inject code. That said, the agents do not even trust the monitoring server itself.

At various points in Checkmk HTTP protocols are used - whether for internal communication or for the connection of other systems. Use HTTPS wherever possible. In other places there are optional encryption techniques. You can also find instructions in this manual: