2024.2 Release Notes

Build Number: 2024.2.0.20 Last updated: 5/13/2024

What's New

Security Enhancements

This upgrade includes additional enhancements to address a critical security fix, first addressed in 2023.9 HF1. (CVE-2024-28200 pending).

REST API Endpoint Additions

There are several new REST API endpoints included in 2024.2! These updates include endpoints with GET methods for:

  • Organization Units Custom Properties

  • Device Custom Properties

  • Devices List by FilterID

  • Access Groups

  • Active Issues

  • Job Statuses

  • User Roles

  • Organization Units Children

  • Devices Service Monitor Status

  • Standard PSA Credentials Validation

  • Custom PSA Ticket Details

  • System Version Information

After upgrading to 2024.2, you can view the updated list of REST API endpoints by navigating to your Swagger Documentation page located at https://Your_FQDN/api-explorer/. There is also an ‘API Explorer’ link added to the ‘My Links’ menu in the N-central UI that will navigate to your Swagger page. Note that new endpoints are initially released in a preview state so they will have ‘Preview’ prepended to the endpoint description.

Patch CVSS Score Color Indicators

The patch CVSS scoring that was implemented in 2024.1 has been improved upon to introduce color indicators to the CVSS scores in patch workflows. In addition to seeing the CVSS score for a given patch, you can now correlate the CVSS rating to the given color for that range. For example, a patch with a critical CVSS score (9.0-10.0) will have a red indicator and a patch with a low CVSS score (0.1-3.9) will have a green indicator.

New Mac Device Class and Scripts

A new Device Class has been added for Apple devices called ‘Laptop – Mac’ to add more granularity to Mac device classifications and provide more accurate inventory reporting as a result. Previously, all Mac devices were classified as ‘Workstations – Mac’ regardless of being a workstation or laptop. Rules and filters have been updated to accommodate this new device class.

Many new ‘out-of-the-box’ scripts have also been added to the repository to assist with routine automation for Mac devices. These scripts could previously be found in the automation cookbooks on N-ableMe, but they have been added to the product itself for convenience.

Cove Backup Stock Service Templates

New stock service templates have been added which contain the new ‘Cove Backup Job Status’ and ‘Cove App Monitoring’ services. These service templates will apply the new stock services when Cove backup is detected as installed on a device.

Update Asset Info in Bulk

This release includes the ability to run an 'Update Asset Info' task in bulk, for multiple devices at the same time. To perform a bulk asset info update within the N-central UI, navigate to the 'All Devices' or 'Active Issues' screen, select multiple devices and then select 'Update Asset Info' from the 'Add Task' menu.

Service Template Performance Improvements

This release includes valuable improvements to the performance of service template application/re-application. Applying service templates to many devices will be much faster from leveraging cached data to improve the speed in which this data is processed.

Take Control Mac Viewer Update (6.00.57)

Here's what's new with the Take Control Mac viewer:

  • Fixed several issues with the update process

  • Corrected an issue with folder names that contain special characters

  • Optimized the way that the Viewer is loaded to decrease errors and enhance performance

  • Corrected issues with the display of icons in the Dock

  • Changed the storage location for the session video recordings

  • Fixed German localization issues

Top Big Fixes

NCCF-15587: Daylight savings (DST) is causing incorrectly calculated sessionexpiry resulting in Agent Status services to transition to misconfigured

NCCF-32981: Services such as the Interface Health and Traffic service are not loading the selected Interface when accessing the service a second time

NCCF-137418: Saving Remote Control settings without a timeout value on a device fails with system Error Pop up

NCCF-20749: System Error When Bulk Deleting Devices (5000 Error processing cascading delete)

NCCF-121754: Some Manufacturers Do not Update `Win32_SystemEnclosure` Which Causes Serial Number to Not Be Listed

KUIP-5625: High network utilization after installing N-central agent due to duplicate downloads of ecosystem files

NCCF-72854: Filter "Agent Version" Is Not Including "reportedapplianceversion" resulting in incorrect filter results

NCCF-129738: Depending on options selected in the PSA customer mapping, records may disappear until refreshed

NCCF-130662: Filter imports are failing to detect the name of the filter being imported, resulting in the inability to import filters

NCCF-146113: Windows agent/probe certificate validation needs to handle closed environments that cannot communicate with revocation server

NCCF-163622: Probe updater should kill any N-able process that is still running during update to improve upgrade reliability

NCCF-216121: Leverage ThreadLocal caching for of previous integration checks to improve performance of customerListScanTargets

Post GA releases

New N-able login available for hosted partners!

Released: 5/3/2024

N-able login capabilities (MSP SSO) are now integrated into your N-central instance! We encourage you to enroll if you are using local login and shift to this new method of authentication.

We know that our partners use many tools and are burdened with managing multiple vendors and multiple logins per vendor. Our new login solution is set to solve that by providing you with seamless authentication and access to our products and our comprehensive success resources.

By shifting from local authentication to MSP SSO you will gain:

  • Security managed by our ISO certified security standards with MFA.

  • Quick access to our partner success resources such as knowledge, support, N-able University training, communities, and Market Builder.

  • Seamlessly movement between other N-able products such as Cove, Take Control, Passportal, and more.

Looking ahead, we will be integrating with additional 3rd-party identity providers directly in MSP SSO, such as Entra ID, so that you can have a single location to manage your N-able authentication across your entire N-able universe.

To learn how to enroll your users click here.

Analytics Patch Data Model Improvement

Released: 4/30/2024

We've made an improvement to the Analytics Patch Data model that removes patches that are no longer required from your Analytics views. Especially patches in the statuses ‘No Approval’ or ‘Pending’ that don't appear in Patch Management will no longer show in the Analytics Patch Compliance dashboard, improving compliance scores.

N-central Mac Agent Version v1.11.0.562

Released: 5/13/2024

  • New Firewall Status monitor

    A new out-of-the-box monitor has been added to show you the status of the devices' firewall. The monitor accompanies the firewall enable/disable script that was added to the most recent N-central version, allowing you to action changes if needed.

  • Improved Asset information gathering and visibility

    The agent's ability to gather and show asset information has been improved to ensure various asset fields are correctly filled in.

Upgrade Paths and Notes

If you are an On-Prem partner upgrading from 2024.1 and previously applied the performance code drop for 2024.1, please contact support to have an additional code drop applied after upgrading to 2024.2. This will ensure that the fixes in the original code drop are also applied after upgrading.

To upgrade to N-able N-central 2024.2, your N-able N-central server must be running the following version:

  • N-able N-central 2022.7.1.44

  • N-able N-central 2023.4.0.32

  • N-able N-central 2023.5.0.12

  • N-able N-central 2023.6.0.9

  • N-able N-central 2023.7.0.10+

  • N-able N-central 2023.8.0.11+

  • N-able N-central 2023.9.0.25

  • N-able N-central 2023.9.0.26

  • N-able N-central 2023.9.1.30

  • N-able N-central 2024.1.0.17

Note the following when upgrading N-able N-central.

Tasks may expire if the agent on an associated device is being upgraded when the task is scheduled to be completed. Agent upgrades are normally short in duration but a delay may happen if a device re-start is pending.

Included updates in N-able N-central

N-central 2024.2

If you are upgrading from a version prior to 2023.9, please note that because of the PostgreSQL upgrade included with N-central 2023.9, on-premise partners can expect this upgrade to take longer than previous upgrades may have. Please do NOT reboot your N-central server if the upgrade appears to be stuck. Please check the server console for error messages, or contact Support and they can advise on the progress and status of the upgrade.

Category Summary Item
Core [Performance] Leverage ThreadLocal caching for of previous integration checks to improve performance of customerListScanTargets NCCF-216121
Core [Performance] AssetDiscoJobSubmit returns a 5000 query failed instead of a 4000 invalid session ID NCCF-215537
Core [Performance] Improved the performance of service template application/re-application NCCF-205439
Core [Performance] There is a UI call that is spamming the API "sysConfigGetByKeys" After Upgrade to 2023.9 NCCF-184739
Core [Performance] String.intern() used by CustomElement beans is slow NCCF-15119
Core [Performance]There is a Hidden Backup Manager profile on N-central Applied to Every Agent which is adding overhead on bulk device changes NCCF-23375
Core [Usability] Make ChatGPT script advice available in a separate box within the AI Assisted Scripting interface NCCF-188756
Core [Usability] Rebranding makes Global Notifications difficult to tell if they are on or off NCCF-17945
Core [Usability] The 'Update Asset Info' button (bulk) should only be visible for users with 'Manage' permission NCCF-15829
Core Filter "Agent Version" Is Not Including "reportedapplianceversion" resulting in incorrect filter results NCCF-72854
Core Agent uninstall request cannot be processed if the device was offline NCCF-33148
Core Services like Interface Health and Traffic are not loading the selected Interface when accessing the service a second time NCCF-32981
Core Patch Status v2 service missing from device monitoring status page NCCF-215925
Core Probe monitored Windows device task asset scan does not update Motherboard Serial Number NCCF-209391
Core System Error When Bulk Deleting Devices (5000 Error processing cascading delete) NCCF-20749
Core Upgraded LaunchDarkly Java SDK from v6.0 to v7.0 NCCF-202278
Core Upgrade LaunchDarkly SDK from 5.x to 6.0 NCCF-202277
Core Links to the SOAP ServerEI/ServerEI2 API JavaDoc are broken NCCF-195486
Core Cannot link imported Microsoft Active Directory users to Azure AD SSO provider NCCF-193938
Core Since the introduction of the Custom UI Port, the WSDL link incorrectly redirects using the custom UI port, which it should not NCCF-193075
Core Ensure EDR migration status is set to In_Progress at start so null value is not defaulted to error when migration is fine NCCF-192297
Core After upgrade, filtering by devices with Cove installed in all sites is not finding Cove devices NCCF-191590
Core LaunchDarkly getCustomersWithFeatureEnabled does not work correctly for Hosted, impacting the behavior of feature flags that take action after a server restart NCCF-188618
Core When EDR services are deleted from the monitoring tab, the deleted services fail to show up after housekeeping maintenance task NCCF-188614
Core Added an 'API Explorer' link to the 'My Links' menu in the N-central UI NCCF-188386
Core EDR Install Status Features icon is sometimes hidden on All Devices page NCCF-187541
Core When starting Take Control using Deep Link, a missing parameter is causing NullPointerException NCCF-183262
Core N-central install does not add manage permission to analytics reports to Default admin and potentially other roles NCCF-169795
Core Probe updater should kill any N-able process that is still running during update to improve upgrade reliability NCCF-163622
Core Updated the device details page to properly indicate whether Cove feature is enabled or disabled for a device NCCF-162108
Core Daylight savings (DST) is causing incorrectly calculated sessionexpiry resulting in Agent Status services to transition to misconfigured NCCF-15587
Core Windows agent/probe certificate validation needs to handle closed environments that cannot communicate with revocation server NCCF-146113
Core Created an agent module to handle the Cove Backup Job services NCCF-139883
Core Saving Remote Control settings without a timeout value on a device fails with system Error Pop up NCCF-137418
Core Due To Some ConnectWise API changes, N-central needs to drop unsupported fields to align with the CW API calls NCCF-132839
Core Filter imports are failing to detect the name of the filter being imported, resulting in the inability to import filters NCCF-130662
Core Depending on options selected in the PSA customer mapping, records may disappear until refreshed NCCF-129738
Core Created stock service templates for the new ‘Cove Backup Job Status’ and ‘Cove App Monitoring’ services NCCF-123609
Core Some Manufacturers Do not Update `Win32_SystemEnclosure` Which Causes Serial Number to Not Be Listed NCCF-121754
Core The "Cannot Sign in Generic SSO user"error appears when trying to sign with Custom IDP provider NCCF-121305
Core When deleting iOS devices the unenroll warning text is not visible NCCF-121065
Core Updated the agent/probe download screen to show support for Debian 11 NCCF-105937
Ecosystem The ecosystem agent should be uninstalled after migration to enhanced EDR if no other ecosystem integrations are enabled KUIP-5666
Ecosystem [Performance] High network utilization after installing N-central agent due to duplicate downloads of ecosystem files KUIP-5625
Patch Management Patches not installing because OnSchedule patches are filtered out on immediate maintenance window + removal of lastKnownClassifications PMCM-7077
Patch Management Added color indicators to the CVSS column in the patch interface PMCM-6926
Patch Management [Performance] Improve locking mechanism around Approvals to resolve potential issues with agent retrieving delta approvals PMCM-5924

Known Issues

These items for the current version of the N-able N-central software is composed of material issues significantly impacting performance whose cause has been replicated by N-able and where a fix has not yet been released. The list is not exclusive and does not contain items that are under investigation. Any known limitations set forth herein may not impact every customer environment. The N-able N-central software is being provided as it operates today. Any potential modifications, including a specific bug fix or any potential delivery of the same, are not considered part of the current N-able N-central software and are not guaranteed.

Agents & Probes

Description

Bug

Communication issues may be encountered for N-able N-central Probes installed on Windows servers that have multiple NICs. For more information, refer to 'KBA20020:ConfiguringAServer WithMultipleNICs' in the online Help.

67778

Automation Manager

AV Defender and Backup Manager – D2D

Description

Bug

Running Automation Manager Policies created using Automation Manager 1.6 or earlier may result in Failed to create an EndDate ... errors if the Policies are run on a computer using a different date format. This issue does not affect Policies created using Automation Manager 1.7 or later.

65712

Custom Services

Description

Bug

Custom services may appear as misconfigured when the system locale of the device is not set to English. For example, in Portuguese the default decimal in c#/.net is not a period, ".", it is a comma, ",". If you are having this issue, please contact N-able Technical Support.

65288

Core Functionality

Description

Bug

Installing N-able N-central on Servers that have an Nvidia Video Card

Due to a bug in CentOS 7 with Nvidia's 'Nouveau' driver, installing N-able N-central on servers that have an Nvidia video card may result in the N-able N-central console showing a blank screen, or displaying an Anaconda Installer screen with an error message about the video card driver.

NCCF-11842

If you have the need to use Conditional Access Policies for your Azure AD/Entra ID linked users, there is a known issue that prevents your users from logging in. We have identified a workaround by using Custom (OpenID Connect) instead. To learn more, click HERE. NCCF-31030

HDM does not work with the 'Last 5 Tickets' widget.

NCCF-10855

Dashboards

Description

Bug

Modifying a Dashboard that is associated with a large number of services may cause performance issues when using the Firefox browser.

70326

PSA Integration

Description

Bug

In some instances, tickets closed in PSAs are not being cleared in N-able N-central. This is likely because the ticketing recipient profile in N-able N-central has Do not change the Ticket Status selected (in order to manually configure tickets). Then, when the ticket is removed in the PSA, N-able N-central will not be able to update or resolve the ticket's status and new tickets cannot be created for the same issue. Until a solution is available through the UI for this situation, the work around is to set a Return to Normal status and set a non-used status in the 'updatable statuses' section or set the same status as the return to normal one. This will cause N-able N-central to add a note to the ticket on return to normal but will not alter the ticket's status. This will allow the stale ticket check to remove the ticket from the system.

65620

UI

Description

Bug

When Cove Data Protection is installed on a device, the device details view will not light up the Cove icon in the features row correctly. NCCF-162108

After re-naming, the Names of files or Registry entries may not be displayed properly in the File System window and the Registry window of the Tools tab when using Internet Explorer.

68149

User Access Management

Description

Bug

Login window reappears when new tab is loaded.

When already logged into N-central and a user opens a new tab and browses to N-central from this new tab, the login screen reappears yet the user is already logged in. The left hand navigation is functional.

NCCF-29648