Allowlist requirements for IP addresses and URLs

This article outlines the requirements for allowing Datto RMM the network access it needs to work at its full potential if devices are behind a firewall, as well as additional information related to network connectivity for various Datto RMM functions.

Initial allowlisting for Datto RMM

In order to ensure the networks your managed devices are on are properly configured, and to track down any connection issues you may have, refer to the below list.

  1. Allow inbound traffic from Datto RMM to your managed devices: Allowing inbound traffic from Datto RMM to your managed devices can be accomplished by allowlisting the Fully Qualified Domain Name (FQDN) for your Datto RMM platform, or, if needed, by allowlisting the IPs returned by that FQDN. For more information, refer to Allowing Datto RMM access to the internet.
  2. Allow outbound traffic from your managed devices to Datto RMM: If you have outbound traffic restricted, then you will need to configure outbound rules to allow your managed devices to send information to the Datto RMM service. Refer to IP addresses per platform (Outbound).
  3. Allow access to the Datto RMM web interface: If you need to allow access to the Datto RMM web interface, refer to Connecting to the Datto RMM web interface.
  4. Allow access for Web Remote communication: If you need to allow access to allow our Web Remote tool to connect to your remote devices, refer to Web Remote communication.
  5. Inbound and Outbound rules for Datto RMM processes and services: The Datto RMM agent uses various services and processes, all of which have allowlisting needs. Refer to Inbound and Outbound Rules.
  6. Allow access for communication over needed ports: Various ports are used for communication in Datto RMM. Refer to Port usage.

IMPORTANT  In addition to the configurations in the above listed items, some firewalls, proxies, or security appliances may require access to the URL of the service as well as the IP address. To review all URLs used by your Datto RMM platform, refer to URLs.

Allowlisting for additional Datto RMM functions

The above steps will get you started with the basic functions of Datto RMM. Review the below list for information on allowlisting needed for the following optional features and integrations.

Additional Information

This article also hosts additional information on the following topics: 

  • Temporary directory location: Many operations performed by Datto RMM do not use the OS's default temp folder location. Refer to Change of Temporary directory.
  • Connecting agents through the tunnel grid: To learn more about how connections are established with remote Agents, refer to Connecting Agents through the tunnel server grid.
  • New UI access on restricted networks: In certain cases, depending on your network setup, users may be locked in to only viewing the Legacy UI. To learn how to resolve this, refer to New UI access on restricted networks.
  • Receiving emails from Datto RMM: To ensure you are not blocking emails from Datto RMM, ensure you are not blocking emails from the rmm.datto.com email domain.

    EXAMPLE  alerts@rmm.datto.com for alerts, reports@rmm.datto.com for reports, etc.

  • Internet protocol: The Datto RMM Agent communicates with the platform using the IPv4 protocol

    NOTE  IPv6 connections are not supported at this time

  • Stateful packet inspection: It is strongly recommended that any Stateful Packet Inspection be turned off for access to any centrastage.net address, and that all attempts possible are made to guarantee that TCP connections to the cc.centrastage.net addresses are not terminated in cases of inactivity (these connections may be inactive for up to 180 seconds at a time if no client activity is detected).
  • Blocklist: Some countries are not permitted access to the Datto RMM web interface. For more information, refer to Blocklist.

Additional IP addresses and URLs

IMPORTANT  Aside from the following IP addresses listed, additional IPs may be used to access various Amazon Web Services (AWS) infrastructure. The list gets updated as AWS makes changes. For more information, refer to AWS IP Address Ranges.

IMPORTANT  If your antivirus product has flagged the Datto RMM Agent installer as malicious, speak to your antivirus provider and request that they mark the installer as a false positive to allow it through.

Inbound and tunnel server IP addresses for Datto RMM

For information on how to obtain a list of inbound and tunnel server IP addresses for Datto RMM, refer to Method 1: Via FQDNs/DNS A records.

IP addresses per platform (Outbound)

Add the following IP addresses to the allowlist for outbound communication if either of these scenarios apply to your Datto RMM account:

Concord (US East) Vidal (US East) Zinfandel (US West) Merlot (EU) Pinotage (EU) Syrah (APAC)

54.90.30.238

18.210.141.219

34.206.106.100

52.72.137.122

107.22.0.143

34.231.104.171

34.232.253.178

52.33.150.151

44.237.4.153

52.41.95.147

18.202.215.160

3.251.48.174

52.31.46.222

52.210.155.229

52.212.169.223

54.155.36.8

3.104.103.44

52.62.188.240

URLs

In addition to IP addresses, some firewalls, proxies, or security appliances may require access to the URL of the service as well as the IP address.

If you are using a proxy or security appliance, we recommend that you add the centrastage.net and the rmm.datto.com domains to the allowlist in their entirety if possible or, at a minimum, ensure that the relevant URLs to your platform are added to the allowlist.

Platform Service URLs TCP Port Direction
EU (Pinotage) Web Service https://01ws.centrastage.net
https://agent-gateway.pinotage.rmm.datto.com/
https://pinotage-agent.centrastage.net
https://pinotage-audit.centrastage.net
https://pinotage-monitoring.centrastage.net
https://pinotage-agent-notifications.centrastage.net
https://pinotage-agent-comms.centrastage.net
http://features.pinotage.rmm.datto.com/
HTTPS / 443 Outbound
Agent Updates https://update.centrastage.net
https://storage.rmm.datto.com
https://download.visualstudio.microsoft.com
Web Interface https://pinotage.centrastage.net
https://pinotage-realtime.centrastage.net
https://pinotage.rmm.datto.com
https://pinotagermm.centrastage.net
https://auth.datto.com
https://saml.datto.com
https://pinot-frontend-api.centrastage.net
Control Channel 01cc.centrastage.net
Tunnel Server ts.centrastage.net
Component Library https://cpt.centrastage.net
https://cpt.centrastage.net.s3.amazonaws.com
EU (Merlot) Web Service https://02ws.centrastage.net
https://agent-gateway.merlot.rmm.datto.com/
https://merlot-agent.centrastage.net
https://merlot-audit.centrastage.net
https://merlot-monitoring.centrastage.net
https://merlot-agent-notifications.centrastage.net
https://merlot-agent-comms.centrastage.net
http://features.merlot.rmm.datto.com/
HTTPS / 443 Outbound
Agent Updates https://update-merlot.centrastage.net
https://update.centrastage.net
https://storage.rmm.datto.com
https://download.visualstudio.microsoft.com
Web Interface https://merlot.centrastage.net
https://merlot-realtime.centrastage.net
https://merlot.rmm.datto.com
https://merlotrmm.centrastage.net
https://auth.datto.com
https://saml.datto.com
https://merlot-frontend-api.centrastage.net
Control Channel 02cc.centrastage.net
Tunnel Server ts.centrastage.net
Component Library https://cpt-merlot.centrastage.net
https://cpt-merlot.centrastage.net.s3.amazonaws.com
US East (Concord) Web Service https://01concordws.centrastage.net
https://agent-gateway.concord.rmm.datto.com/
https://concord-agent.centrastage.net
https://concord-audit.centrastage.net
https://concord-monitoring.centrastage.net
https://concord-agent-notifications.centrastage.net
https://concord-agent-comms.centrastage.net
http://features.concord.rmm.datto.com/
HTTPS / 443 Outbound
Agent Updates https://update-concord.centrastage.net
https://update.centrastage.net
https://storage.rmm.datto.com
https://download.visualstudio.microsoft.com
Web Interface https://concord.centrastage.net
https://concord-realtime.centrastage.net
https://concord.rmm.datto.com
https://concordrmm.centrastage.net
https://auth.datto.com
https://saml.datto.com
https://concord-frontend-api.centrastage.net
Control Channel concordcc.centrastage.net
01concordcc.centrastage.net
Tunnel Server ts.centrastage.net
Component Library https://cpt-concord.centrastage.net
https://cpt-concord.centrastage.net.s3.amazonaws.com
https://s3.amazonaws.com/cpt-concord.centrastage.net
US East (Vidal) Web Service https://01vidalws.centrastage.net
https://agent-gateway.vidal.rmm.datto.com/
https://vidal-agent.centrastage.net
https://vidal-audit.centrastage.net
https://vidal-monitoring.centrastage.net
https://vidal-agent-notifications.centrastage.net
https://vidal-agent-comms.centrastage.net
http://features.vidal.rmm.datto.com/
HTTPS / 443 Outbound
Agent Updates https://update-vidal.centrastage.net
https://update.centrastage.net
https://storage.rmm.datto.com
https://download.visualstudio.microsoft.com
Web Interface https://vidal.centrastage.net
https://vidal-realtime.centrastage.net
https://vidal.rmm.datto.com
https://vidalrmm.centrastage.net
https://auth.datto.com
https://saml.datto.com
https://vidal-frontend-api.centrastage.net
Control Channel vidalcc.centrastage.net
01vidalcc.centrastage.net
Tunnel Server ts.centrastage.net
Component Library https://cpt-vidal.centrastage.net
https://cpt-vidal.centrastage.net.s3.amazonaws.com
https://s3.amazonaws.com/cpt-vidal.centrastage.net
US West (Zinfandel) Web Service

https://03ws.centrastage.net
https://agent-gateway.zinfandel.rmm.datto.com/
https://zinfandel-agent.centrastage.net
https://zinfandel-audit.centrastage.net
https://zinfandel-monitoring.centrastage.net
https://zinfandel-agent-notifications.centrastage.net
https://zinfandel-agent-comms.centrastage.net
http://features.zinfandel.rmm.datto.com/

HTTPS / 443 Outbound
Agent Updates https://update-zinfandel.centrastage.net
https://update.centrastage.net
https://storage.rmm.datto.com
https://download.visualstudio.microsoft.com
Web Interface https://zinfandel.centrastage.net
https://zinfandel-realtime.centrastage.net
https://zinfandel.rmm.datto.com
https://zinfandelrmm.centrastage.net
https://auth.datto.com
https://saml.datto.com
https://zinfandel-frontend-api.centrastage.net
Control Channel 03cc.centrastage.net
Tunnel Server ts.centrastage.net
Component Library https://cpt-zinfandel.centrastage.net
https://cpt-zinfandel.centrastage.net.s3.amazonaws.com
APAC (Syrah) Web Service https://agent-gateway.syrah.rmm.datto.com/
https://syrahws.centrastage.net
https://syrah-agent.centrastage.net
https://syrah-audit.centrastage.net
https://syrah-monitoring.centrastage.net
https://syrah-agent-notifications.centrastage.net
https://syrah-agent-comms.centrastage.net
http://features.syrah.rmm.datto.com/
HTTPS / 443 Outbound
Agent Updates https://update-syrah.centrastage.net
https://update.centrastage.net
https://storage.rmm.datto.com
https://download.visualstudio.microsoft.com
Web Interface https://syrah.centrastage.net
https://syrah-realtime.centrastage.net
https://syrah.rmm.datto.com
https://syrahrmm.centrastage.net
https://auth.datto.com
https://saml.datto.com
https://syrah-frontend-api.centrastage.net
Control Channel syrahcc.centrastage.net
01syrahcc.centrastage.net
Tunnel Server ts.centrastage.net
Component Library https://cpt-syrah.centrastage.net
https://cpt-syrah.centrastage.net.s3.amazonaws.com

ComStore component and Software Management URLs

If you are downloading and running components from the ComStore, we recommend that you add storage.centrastage.net and storage.rmm.datto.com to the allowlist. Additionally, if you use any of the following software applications either as a ComStore component or via Software Management, make sure to add the relevant URL(s) to the allowlist:

Software Operating System URL
7-Zip Windows https://www.7-zip.org
Adobe Acrobat Reader DC Windows, macOS https://ardownload2.adobe.com
Adobe Air Windows, macOS https://airsdk.harman.com
Bitdefender Endpoint Security Tools Windows http://download.bitdefender.com and
https://cloudgz.gravityzone.bitdefender.com
BitDefender GravityZone - Deployment/Management Windows, macOS, Linux http://download.bitdefender.com
Citrix Workspace Windows, macOS https://downloads.citrix.com

Datto Secure Edge

Windows, macOS

https://cf-dl.datto.com
ESET Direct Endpoint Management - Deployment Windows, macOS https://update.esetusa.com
FileZilla Client Windows https://filezilla-project.org
Foxit Reader Windows https://www.foxitsoftware.com
Google Chrome Windows, macOS http://dl.google.com
Huntress Agent Deployment Windows https://huntress.io
Java Runtime Environment 8 (latest update) Windows https://javadl.oracle.com and
https://sdlc-esd.oracle.com
Liongard Agent Windows https://agents.static.liongard.com
Microsoft .NET Desktop Runtime Windows https://builds.dotnet.microsoft.com
Microsoft Office 365 (Current and Semi-Annual Channels) Windows http://dl.delivery.mp.microsoft.com and
https://download.microsoft.com
https://clients.config.office.net
Microsoft Teams Windows https://aka.ms and
https://teams.microsoft.com
Microsoft Visual C++ Redistributable Windows https://aka.ms and https://download.visualstudio.microsoft.com
Mozilla Firefox Windows, macOS https://download.mozilla.org
Mozilla Thunderbird Windows, macOS https://download.mozilla.org and
https://download-installer.cdn.mozilla.net
Notepad++ Windows https://notepad-plus-plus.org
Paint.NET x86/x64 Windows https://www.dotpdn.com
PuTTY Windows https://the.earth.li (official mirror)
Trend Micro Worry-Free Services - Deployment Windows https://wfbs-svc-nabu-aal.trendmicro.com or
https://wfbs-svc-emea-aal.trendmicro.com
(depending on geographical region)
VLC Media Player Windows https://www.mirrorservice.org
https://download.videolan.org
VMWare Tools Windows https://packages.vmware.com
Webroot SecureAnywhere Endpoint Protection Windows https://anywhere.webrootcloudav.com
Windows 10 & 11 Upgrade Components Windows http://dl.delivery.mp.microsoft.com and
https://download.microsoft.com
WithSecure (F-Secure) Various Windows https://download.sp.f-secure.com
Zoom Windows, macOS https://www.zoom.us
https://cdn.zoom.us

Supported TLS Cipher Suites

Certain TLS 1.2 Cipher Suites, which are typically enabled by default on Windows operating systems but can be manually disabled, must be enabled on Windows Servers for the Datto RMM Agent to connect.

Datto RMM utilizes Amazon CloudFront for connections and currently follows the security policy TLSv1.2_2019. When enabled, the following TLS Cipher Suites allow the Datto RMM Agent to connect:

  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

Refer to Supported protocols and ciphers between viewers and CloudFront in the Amazon CloudFront Developer Guide.