Knowledge Base

Browse these resources to find answers to your Domotz questions. Or contact our support team with any questions and we'll get back to you as quickly as possible. We're here to help.


Domotz User Guide
The Complete User Guide
Managing Multiple Remote Networks with Domotz
Multisite Dashboard
How to view IoT device data on remote networks with Domotz
Device Details
How to access remote networks with Domotz Agents and endpoint management dashboard.
Agent Dashboard
Configuring Domotz Eyes for remote monitoring devices
Configuring Domotz Eyes
How to Install Domotz Box Agents on remote networks
Domotz Box
Synology Remote Access - Domotz Installation
Synology
QNAP Remote Access - Domotz Installation
QNAP
Raspberry Pi Remote Access - Domotz Installation
Raspberry Pi
Build a Customized Network Monitoring Dashboard with Domotz + Node-RED

WOW you team and your clients with a customized network monitoring dashboard. Follow this tutorial (using Domotz + Node-RED) for displaying camera snapshots, Round-trip Delay (RTD) data, SNMP sensor data charts, and Alert integrations.
~60 minutes

Read Blog Post

Domotz Public API Documentation

Access & store Security Camera footage with Domotz Public API

This video will walk you through an easy way to use the Domotz Public API to monitor security cameras and expand your services.
~60 minutes

Download Presentation Slides

Domotz Box configuration best practices

This video covers the best practices for configuring and installing a new Domotz Box for Remote Network Management.
~2 minutes

Domotz Box configuration best practices
Getting started with Domotz

Just getting started with Domotz? Follow along as our CTO, Giancarlo Fanelli, walks you through Domotz' available features, set-up and configuration shortcuts, and make sure you are getting the most of our platform.
~40 minutes

Getting started with Domotz
RMM Technical Training (Series)

Learn more about how Domotz makes remote network management easy, as our Head of Support guides you througha live demo and covers many of our top features.

RMM Technical Training (Series)
Domotz Security Standards
Security Standards
Domotz Box Specs
Domotz Box Specs
Domotz FAQs
FAQs
Domotz Brochure
Domotz Brochure

The brochure highlights the features of Domotz (monitoring, alerts, diagnostics, network mapping etc.) helping you better understand what Domotz offers. Many of our Domotz dealers use this document to sell their services.

Domotz Visual Resources for Selling MSP Support
Domotz Visuals

Use the Domotz Visuals to market your remote support service. You can use the visuals on your website, a landing page, a brochure or email marketing campaign.

Let’s Do The Math!

In this webinar, Seth and JB show you how to use Domotz remote monitoring and management (RMM) to build recurring monthly revenue (RMR).
~46 minutes

Make MRR from RMM
Don’t Sell Domotz!

In this webinar, Seth Rubenstein and JB Fowler will talk you through strategies and tactics for building your business and improving your customer relationships with RMM from Domotz—without ever mentioning Domotz to your customer.
~62 minutes

How to sell customer support and managed services.
How to Deploy and Use Domotz Remote Monitoring & Management (RMM)

In our last webinar, we showed you how to use Domotz to enhance your business. In this more technical webinar, Giancarlo Fanelli, CTO, walks you through installing Domotz for remote monitoring and management (RMM).
~56 minutes

How to Deploy and Use Domotz Remote Monitoring and Management (RMM)
Intro to Domotz Remote Monitoring & Management (RMM)

In this webinar JB Fowler, CRO, shows you how to use Domotz remote monitoring and management (RMM) in your business to save time and money, boost profits, and deliver superior customer service.
~33 minutes

Intro to Domotz Remote Monitoring
Domotz $21/m

Ideal for MSPs, Franchises, Hospitality, Retail, Corporate offices, Commercial Integrators for Large Business

Get started
  • Device Response Time Monitoring
  • Security Features (Perimeter Network Scans)
  • Desktop App with Configuration (Coming Soon)
  • Document Storage (Coming Soon)
  • & Much More...

Featured Articles

A person in a black and white striped shirt carrying a laptop out of a workspace.
Creating a Bring-Your-Own-Device Policy

A bring-your-own-device policy can save your business time and money. However, when creating a BYOD policy for the first time, it’s important to plan for the drawbacks this kind of policy can incur, including cybersecurity threats.

A middle-aged person in a light blue button-up shirt sits in front of a computer in a warehouse setting. The person is smiling and looking at the camera.
Network Security for Small Businesses

Cyber attacks can cause serious long-term damage to a business of any size, and smaller businesses may be at greater risk for security breaches and prolonged recovery.

A vector image of a person sitting at a desk in front of a computer monitor. Lines connect this person’s computer to many different pictures of other people.
Tips for Remote Business Management

Essential tips for managing multiple businesses at once while working remotely include being accessible, standardizing company processes, investing in monitoring software, delegating, communicating clearly, integrating systems, and being goal-oriented.

A stethoscope sitting on top of a laptop keyboard.
Healthcare & Technology: Changing Patient Care

Technology in healthcare is gradually improving convenience and outcomes related to health. These developments are changing the landscape of healthcare at large.

A mock street sign set against a blue sky. One sign reads, “Hire” while the perpendicular sign reads, Outsource.
BPO: Definition and Technologies

More and more companies are using BPO to support their business operations. This practice can have many benefits, ranging from flexibility to cost savings.

A person using a tablet in front of a server.
Network Engineering Career for Women

Network engineering is experiencing incredible growth, and there are ample opportunities for women who want to enter this exciting and in-demand field.

An individual wearing a suit and headset seated at a desk, using a laptop and checking their watch.
Tips to Improve Time Management in Business

If you own your own business, time management is one of the most important skills you can develop to ensure your success. It will help you grow your business, balance your life, and build positive connections.

A pair of IT specialists inspecting stacks of servers together.
Types of Network Security Threats

Network security professionals can neutralize threats like malware, DDoS attacks, and phishing by training employees, monitoring network traffic, and securing and backing up data.

A pair of analysts seated in front of a laptop, reviewing data together.
Valuable Skills for Network Security Professionals

Network security professionals must understand technical cybersecurity concepts and proper use of network systems, but they also need soft skills like communication abilities and resourcefulness.

Close-up of a row of network cables plugged into a server.
The Five Functional Areas of Network Management

The five main types of network management solutions — performance, fault, configuration, accounting, and security — are defined by the ISO as essential for implementing and optimizing enterprise operations.

A digital rendering of a computer network as a blue grid, with data superimposed above it.
Types of Data Monitored by Security Teams

An effective data and network security system will monitor API, packet data, flow data, and SNMP to streamline operations and reduce or prevent security risks.

A graphic demonstrating a system of eight computers all connected to a central server to form a network.
Build a Strong Network Management System

A network management system plan must account for different variables, including budget, security, scalability, performance, and efficiency.

Ready to get started with Domotz?

  • Powerful
  • Automated
  • Simple
  • Affordable
Start Your Free Trial Contact Sales