2025.3 Release Notes

Build Number: 2025.3.0.14 Last updated: 07/16/2025

Important Notice for OnPrem partners upgrading to 2025.3 from a version earlier than 2025.1.

N-central 2025.1 replaced the underlying operating system on N-central from CentOS to AlmaLinux.

If you are upgrading from a version of N-central earlier than 2025.1 you will be doing a complete operating system migration. This is a significant upgrade to N-central with new system requirements and the upgrade will take longer than a normal upgrade.

We highly recommend reviewing the updated system requirements and release notes for essential details before proceeding with the upgrade.

We’re introducing exciting new features, enhancements, and critical fixes to improve usability, security, and performance. Here’s what’s in the 2025.3 release:

What's New in 2025.3

User Audit Log Export – Additional Audit Events

In past releases 24.6 and 25.2, we introduced the ability to export user audit logs to a Syslog server, capturing key user-initiated events. This functionality continues to expand and i this release, we’ve added auditing for the following new actions:

  • Creation of Discovery Jobs

  • Deleting of Discovery Jobs

  • Editing of Discovery Jobs

  • Device Creation via Agent Install

  • Creation Scheduled Task

To configure Syslog export and take full advantage of these features, see: Configure Syslog Export

Session Enforcement Improvements

Invalidate Sessions When Linking to new SSO IDP provider

When a user is linked to a new IDP provider (e.g., Microsoft Azure), their current session is automatically invalidated and is redirected to login again using your new or updated credentials.

Session Invalidation After SSO Provider Removal

If an SSO provider is removed (manually or via backend constraint), all sessions for linked users are invalidated and are redirected to login.

This ONLY applies to Azure and Generic SSO configurations as N-able SSO cannot be unlinked.

Agent UI Improvements

Device Import – Warning Message on Import for Devices Failing Discovery Pre-Checks

A new warning message has been added to the device import workflow to alert users when devices selected for import have discovery pre-check issues related to core services such as WMI, SNMP, NetBIOS, SSH, Registry Query, or Admin Share. The users will see the following warning message:

You have at least one device without access to some services. This may result in device inaccessibility and/or mapping issues. Are you sure you want to continue? For more detail, check the help article.

New UI for Identifying and Excluding Duplicate MAC Addresses in Discovery Defaults

A new capability has been added to the Discovery Defaults page to help partners identify and manage devices with duplicate MAC addresses by allowing administrators to exclude such devices from the asset import process and preventing false positives due to hardware with shared or reused MAC addresses.

  • A dynamically generated table highlights MAC addresses assigned to multiple distinct devices with the following columns:

    • Selection Checkbox

    • Customer / Site Name

    • MAC Address

    • Device Count

  • Users can select one or more entries and click the new "Exclude" button to move those excluded MAC addresses to the existing "MAC Addresses to Exclude" list with the ability to remove them and MACs already on the exclusion list are automatically hidden from the duplicate table.

  • Devices with excluded MAC addresses will be filtered out from future discovery scans and will not appear in the Discovered Assets view.

  • Settings are propagated across all applicable levels: Partner, SO, and Customer.

Continued Development on CMMC-Compliant Version of N-central for On-Premises Partners

We are continuing development on the CMMC-compliant version of N-central, specifically designed for on-premises partner-hosted instances. This work is part of our broader initiative to ensure CMMC Level 2 compliance, supporting partners managing environments aligned with U.S. Department of Defense (DoD) cybersecurity requirements.

Ongoing Improvements to Analytics

We continue to invest in scalable analytics to help partners make data-informed decisions across their environments by adding further improvements to lay the groundwork for more actionable insights and future analytics-driven features.

Bug Fixes

A range of high-impact bugs have been resolved in this release. Be sure to review the full list included below for more details.

Category

Updated Summary

Issue Key

Most Impacted

Core

Blocked Reports Due to Envoy Restrictions

 

Issue: Some reports failed to load because updated Envoy configurations blocked access to the /reportAction.do endpoint.

Fix: Updated backend configurations to restore access to all affected reports.

NCCF-663428

Core

Stale Service Monitoring from Probes

 

Issue: Monitoring data appeared outdated because of interrupted probe communication.

Fix: Corrected probe-side handling to ensure continuous and accurate service monitoring.

NCCF-626897

 

Core

GSuite Login Redirect Restored

 

Issue: After upgrading to 2025.2.1.8, users logging in via GSuite were not redirected to the Google SSO page as expected.

Fix: We corrected the redirect logic to ensure GSuite users are seamlessly routed to Google SSO after entering their email without needing to manually click a “Sign in with Google” button.

NCCF-661120

Performance & UI Fixes

Core

Analytics Reporting – NCOD Instance

 

Issue: Some hosted environments lacked analytics data, which prevented users from accessing dashboards and reports.

Fix: Enabled analytics data capture and availability for this instance.

NCCF-649734

Core

Slow Device Deletion Performance

 

Issue: Deleting a large number of devices caused performance slowdowns due to database locking.

Fix: Optimized the deletion process to reduce database contention.

NCCF-546488

Core

Launch Darkly Crash on Legacy Customers

 

Issue: The Launch Darkly client crashed due to missing timestamps for older customers.

Fix: Added fallback logic to handle missing creation time.

NCCF-546103

Core

All Devices View Filtering Incorrectly

 

Issue: The All-Devices view did not respect Service Organization (SO) boundaries during filtering.

Fix: Corrected the filter logic to properly account for SO segregation.

NCCF-538809

 

Core

UI Performance – All Devices page slow performance

 

Issue: The "All Devices" page became slow when using the “More Devices” filter option.

Fix: Improved page performance by optimizing how the filter interacts with large datasets.

NCCF-566023

Core

Take Control reinstalls triggered Too Early

 

Issue: Some devices were flagged for reinstall prematurely due to recovery logic errors.

Fix: Improved recovery checks to avoid unnecessary reinstalls.

NCCF-533915

Core

Device Selection UX in Custom Property Updates

 

Issue: Device selections remained active after custom property edits, leading to UI confusion.

Fix: UI now clears selections properly after applying custom property changes.

NCCF-459877

Core

Slow performance seen for some hosted instances

 

Issue: Some hosted servers suffered from lag and degraded performance.

Fix: Refined background job processing and cache handling.

NCCF-674771
Core

Data Access Object (DAO) Design Bottleneck Causing System Hang and Event Processing Delays

 

Issue: In large environments, especially NCOD, systems were intermittently unresponsive (up to 15 minutes). This was caused by too many background tasks trying to access the same part of the system at once (called the DAO layer), which created a traffic jam and slowed everything down — especially when the system was busy creating or sending event updates. 

Fix: Improved how these tasks access the system, allowing them to take different paths and work in parallel, eliminating the bottleneck and keeping the system responsive.

NCCF-39532 
Core

Inconsistent Patch Data Eventing

 

Issue: Patch data events were consistently delayed, requiring manual intervention  to scrape missed data while the patch data is expected to be live-evented as it is added to the N-central server.

Fix: Improved the eventing mechanism to ensure patch data is emitted in real time, eliminating the need for manual rescrapes.

NCCF-635316
Core

High API Load from Active Issues Scroll Behavior

 

Issue: Hierarchy and customer data were occasionally missing from the reporting warehouse. 

Fix: Addressed ETL gaps and enforced data completeness checks. 

NCCF-555050 
Core

Excessive API Calls When Scrolling in All Devices View

 

Issue: Selecting devices triggered API calls per device instead of per page, causing UI slowdown in large environments.

Fix: Updated pagination logic to batch API calls per page, improving performance and reducing network load.

NCCF-611967

Integration & Experience Fixes

Core

Autotask: Ticket closures issues

 

Issue: Tickets failed to close automatically during maintenance events.

Fix: Updated closure logic to ensure consistent handling with Autotask integration.

NCCF-535280

Core

System Error When Creating Customers with Correlated Notifications

 

Issue: When trying to create a new customer while setting up correlated notifications, the system would show an error and fail to complete the setup. This happened because the system was incorrectly looking for a "profile ID" that didn’t exist, instead of using the correct "correlated profile ID".

Fix: The system now properly uses the correlated profile ID when setting up correlated notifications, preventing the error and allowing customers to be created successfully.

NCCF-674670

 

Core

PSA Integration Stability (ConnectWise / Autotask)

 

Issue: PSA export profile was unintentionally deleted after customer removal from ConnectWise or Autotask.

Fix: Adjusted deletion logic to retain export profiles when associated customers are removed.

NCCF-652816

Core

Data Type Handling in ConnectWise Exports

 

Issue: Exports to ConnectWise did not honor distinctions between “Text” and “Number” fields.

Fix: Field export logic now correctly respects data type definitions.

NCCF-559109

Core

Asset Scans not running according to schedule

 

Issue: Scheduled asset scans were not triggering at expected intervals.

Fix: Fixed internal scheduling mechanisms to restore consistent scan execution.

NCCF-638003

Core

User Access Control / Permissions

 

Issue: Misconfigured permission logic allowed users unauthorized access to privileged pages.

Fix: Applied proper permission restrictions to prevent escalated access.

NCCF-606073

Core

LDAP to SSO Account Migration Logic

 

Issue: Standard LDAP accounts were incorrectly migrated to MSP SSO, causing login and account management issues.

Fix: Refined account migration rules to exclude standard LDAP users from MSP SSO transitions.

NCCF-600010

Core

Endpoint Detection and Response (EDR) Service Assignment

 

Issue: EDR monitoring services were not automatically assigned to newly onboarded devices.

Fix: Ensured automatic assignment of EDR services during device provisioning.

NCCF-555283

Core

Server Connectivity – EDS Communication

 

Issue: N-central server experienced periodic disconnections from the External Data Store (EDS).

Fix: Improved connection stability and retry mechanisms to maintain persistent communication.

NCCF-541976

Core

SNMP Parsing – Linux Custom Types

 

Issue: SNMP failed to correctly parse custom entries of type "String" on Linux systems.

Fix: Fixed string-type handling logic in SNMP implementations.

NCCF-125587

Ecoverse

LDAP User Login Name Validation Appears Incorrectly After Import

 

Issue: LDAP user accounts displayed a validation error on the Login Name field when editing, despite this field being non-editable for LDAP users. This prevented any updates to the account.

Fix: The Login Name field for imported LDAP accounts is now correctly disabled, and the erroneous validation error has been removed.

FSN-11683

Ecoverse/

Core

Device Provisioning & Remote Access (Tools / Take Control)

 

Issue: After upgrading to 2024.6, devices failed to receive configuration, causing tools and Take Control to stop working. This was due to missing or unavailable Ecoverse URLs.

Fix: Introduced fallback logic and improved error handling to ensure devices can still be provisioned even when Ecoverse URLs are missing, restoring functionality for tools and Take Control.

NCCF-530680

Core

PSA-System Error with Halo Customer Mapping

 

Issue: Errors surfaced when mapping customers using Halo PSA integration. 

Fix: Adjusted field validation to resolve mapping inconsistency.  Android N-central Mobile App – 2FA Entry Clears Login Fields-

NCCF-723031 
Core

Android N-central Mobile App – 2FA Entry Clears Login Fields

 

Issue: After 2025.2 release, users (primarily on Samsung devices running Android OS 15) experienced an issue where switching to an authenticator app to retrieve a 2FA code caused the N-central login fields (server, username, password) to be cleared.

Fix: Issue resolved in the latest version of the Android N-central mobile app. Users can now retrieve 2FA codes from external apps without losing login field data.

NCCF-679715
MSAD

NC Agent/Probe startup fails due to missing AM Agent executable

Issue: The NC Agent or Probe fails to start on systems where the AM Agent service executable is not present. This resulted in service startup errors, preventing normal operation.

Fix: Updated the installer to ensure the AM Agent service executable is properly deployed and verified during startup.

MSAD-4688

MSAD-5041

Core

N-central Incorrectly Invalidating Agent Sessions

 

ssue: Agent sessions were being incorrectly invalidated because they were misclassified as UI sessions.

Fix: Updated logic to correctly identify agent-originated sessions and prevent unnecessary termination.

NCCF-672962
Core

Devices Not Loading Due to Incorrect Cove Backup Check

 

Issue: An incorrect detection method for Cove Backup Manager caused all devices to fail loading.

Fix: Replaced the faulty logic with a stricter Cove detection approach and after jetty start, the Cove sync maintenance task will auto-correct affected devices.

NCCF-663257
Core

Missing Audit Logs on NCOD Servers

 

Issue: Certain audit events were not being logged in NCOD-hosted environments. 

Fix: Restored events capture paths and ensure reliable log generation. 

NCCF-666647 
Core

Scheduled Task Suspension Was Deleting Agent-Side Task

 

Issue: Suspending a scheduled task in N-central caused it to be deleted from the agent, rather than suspended. When re-enabled after the original scheduled time, the task would execute immediately as the original window had passed.

Fix: Updated task handling to suspend the task on the agent instead of deleting it.

NCCF-535851