Setup

Running in under five minutes

Four steps from sign-up to full compliance visibility. No profiles, no admin access, no IT department required.

1

Create your org

Sign up, get your organisation's onboarding domain and DNS record.

You'll get a unique subdomain and a TXT record value. This is how your team's devices will know where to report. The whole process takes about 30 seconds.

2

Set a TXT record

Add a single DNS TXT record to your onboarding subdomain. That's the config.

Not sure how? Every domain registrar has a DNS settings page. It takes about 30 seconds and we'll walk you through it if you get stuck.

3

Install the agent

Team members install monmonmon and enter the domain. Auto-configured in seconds.

The agent is a lightweight menu bar app. It runs quietly in the background, checks security status periodically, and reports back. No admin privileges needed, no MDM profile installed, no device control.

4

Stay compliant

Reports flow in. Get monthly summaries, real-time alerts, and JIRA tickets on deviations.

Your dashboard shows real-time encryption, firewall, and malware protection status for every device. When something changes, you'll know immediately. Monthly reports are generated automatically for your auditors.

Transparency

What the agent does not do

We think you should know exactly what you're installing. Here's what monmonmon will never do.

It cannot wipe or modify your devices

The agent is strictly read-only. It checks security settings and reports status. It has no capability to change, lock, or erase anything on the device.

It does not track location

No GPS, no IP geolocation, no Wi-Fi triangulation. We have no idea where your devices are, and we don't want to know.

It does not read files, emails, or browsing history

The agent checks system-level security configuration only. It never accesses personal data, documents, email, or browser activity.

It does not install software or push configurations

No remote app installs, no policy enforcement, no profile deployment. The agent cannot change what's on the device.

It does not run with elevated or admin privileges

The agent runs as a regular user process. No root access, no kernel extensions, no special permissions.

It does not report anything beyond encryption, firewall, and malware protection status

Three checks. That's it. Disk encryption status, firewall status, and malware protection status. Nothing else leaves the device.

Compliance without compromise

Start monitoring your devices' security posture in minutes, not weeks.

Add to waitlist →

First 30 days are on us when we launch.