Up Next: What to Expect in the 2026.2 Release

Last updated: 19-Mar-2026
Expected release date: Mid-April to last week of April

This is an early preview of the release notes; features, images, and other details may change as we move closer to the final release.

Expect further updates in upcoming release notes. The final release notes, including the build number and upgrade details, will be shared as part of the actual release notes that will be published around the end of March.

What's New in 2026.2

We’re introducing exciting new features, and critical fixes to improve usability and performance. Here’s what’s in the 2026.2 release:

AI Management & Ask N-zo (Preview)

We are introducing AI Management in N-central, giving administrators full control over access to Ask N-zo AI capabilities within Ecoverse. N‑zo is our AI assistant that provides contextual guidance and answers using natural language.

This enhancement allows partners to manage which users can access AI-powered features, ensure controlled adoption while enabling technicians to quickly get contextual help, explanations, and guidance without leaving their workflow.

With this release:

A new AI Management section is available under Administration, providing a single place to configure and monitor AI capabilities.

Access to Ask N-zo is governed by role permissions:

  • Default Administrators can enable AI, manage users, and control settings.

  • Default Technicians can access and use Ask N-zo based on assigned permissions.

  • Users without access will not see AI features in the UI.

AI Audit Log, AI Conversation Log and AI Usage Dashboard will be implemented at a later stage and details will be provided.

Guided Activation Experience

Administrators can enable AI through a structured workflow that includes:

    1. Activate AI capabilities: View the available AI capabilities, request limit and pricing implications for the feature.

    2. AI Features Agreement: Review and accept the AI Features Agreement. Acceptance is required before AI can be activated.

    3. Review your AI settings and features: Review what’s included, choose whether to enable or disable request overage, and confirm activation.

      • User who activated the AI and time and date.

      • Simple AI credit usage chart.

      • Toggle to disable AI.

      • Toggle to disable overage.

      • Description of AI settings and what’s included.

    4. AI Features Activated: After activation, you are redirected to the AI settings page with an inline confirmation banner. Monthly request usage is shown (at 0).

To test N‑zo, select Try Ask AI. You are redirected to the Asset view page, where you can access N‑zo from the top menu using the Ask N‑zo button.

An example query and N-zo's response:

Feature Flag Controlled Rollout

This feature is currently controlled via a feature flag and will be rolled out in phases as part of our ongoing AI capabilities expansion. When disabled, the feature is completely hidden from the UI. To enable this feature, please reach out to us via email ncpreview@n-able.com

Enhanced Device Filtering with Nested AND Conditions

We’ve introduced a major improvement to device filtering in N-central by enhancing how AND conditions are evaluated. Many partners have reported inaccurate filtering results when using AND conditions across properties tied to the same entity (such as applications or services).

For example:

  • Filtering for Microsoft Office AND version 16.0 could return devices where Microsoft Office exists, but version 16.0 belongs to a different application.

  • Filtering for Firefox AND version 1.2.3.4 could return devices where Firefox is installed, but the version condition is satisfied by another application.

This occurred because:

  • Each condition was evaluated independently across multiple records per device

  • Results were combined at the device level rather than the object level

  • Leading to cross-row matches and false positives

What’s Changed

  • Same-object (Correlated) AND Evaluation

  • Nested Conditions (Sub-Conditions)

    Users can now add sub-conditions to a filter using a simple UI. This allows precise targeting such as:

    • Application name AND version

    • OS type AND version

    • Service name AND status

  • Improved Filter Builder Experience

    • Clear property grouping (e.g., Device, Application, Custom Device Property).

    • More intuitive selection of properties, operators, and values.

    • Support for both simple and advanced filtering scenarios.

  • Nestable vs Standalone Properties

    • Nestable properties allow for complex, multi-layered queries by grouping conditions using logical operators.

    • Standalone properties represent already contain complex relationships and cannot be nested.

    • The UI now helps guide users on which properties support nested conditions.

  • Improved OS Filtering

    • OS version comparisons now use numeric, version-aware logic instead of string comparison

    • New OS Type selector simplifies filtering across platforms (Windows, Linux, macOS, etc.)

  • New System Filter for UFA:

    A new predefined filter “Modern Agent Eligible Windows Devices” (System Filter 103) identifies Windows 10+ devices running N-central Classic Agent 23.5+, supporting Unified Agent rollout and reporting.

Security Insights & Remediation Dashboard (Unified Patch & Vulnerability Management) (Preview)

We’ve introduced a new Security Insights Dashboard in N-central, providing a centralized and actionable view of vulnerabilities, patching status, and remediation progress across your environment.

Previously, vulnerability and patch data were available but often fragmented and data-heavy, requiring administrators to manually interpret raw information across multiple views.

A new Security Insights view brings together: All in a single, easy-to-understand interface.

  • Vulnerabilities by severity.

  • Exploitable CVEs.

  • Failed patches.

  • Patch deployment trends and lag.

  • Top critical threats and exploit types.

New Endpoint Remediation Section: A new Endpoint Remediation section has been introduced in the navigation:

  • Serves as the central hub for security operations.

  • Includes the new dashboard as well as Patch and Vulnerability views.

Actionable Insights

  • Quickly identify high-risk devices and vulnerabilities.

  • Prioritize remediation based on severity and exploitability.

  • Monitor patching performance against SLA benchmarks.

Role-Based Access (Leveraging Existing Permissions)

  • Existing Patch and Vulnerability permissions control access

  • The read only permission for Vulnerability and manage permission for Patch is automatically added to the built-in default roles - Default admin and Default tech, no default permissions will be set for the Custom roles

Feature Flag Controlled Rollout

This feature is currently controlled via a feature flag and will be rolled out in phases as part of our ongoing AI capabilities expansion. When disabled, the feature is completely hidden from the UI. To enable this feature, please reach out to us via email ncpreview@n-able.com

Common Audit Log (CAL) (Preview)

We are introducing the Common Audit Log (CAL) in N-central, providing a centralized and consistent audit experience across the platform, powered by Ecoverse permissions, it improves audit transparency, and provides unified audit experience across the N-able ecosystem.

This enhancement enables partners to securely view, export, and manage audit data using existing N-central roles, while leveraging new, granular permission controls.

The Common Audit Log currently lists Ecoverse-generated user audit events. Support for classic N‑central user audit events is planned for a future release.

With this release:

  • Centralized Audit Visibility

  • Partners can access audit records through a dedicated and intuitive UI within N-central, making it easier to track system activity and support compliance needs.

  • Role-Based Access Control (RBAC)

  • Access to the Common Audit Log is governed by user roles and permissions:

    • Administrators can manage permissions, and view logs. Note features to export the audit data and configure audit streaming will be added later.

    • Technicians can view and export audit logs based on assigned permissions.

    • Users without permission will not see the feature in the UI.

Feature Flag Controlled Rollout

This feature is currently controlled via a feature flag and will be rolled out in phases as part of our ongoing AI capabilities expansion. When disabled, the feature is completely hidden from the UI. To enable this feature, please reach out to us via email ncpreview@n-able.com

Enhanced SSO Security with Back-Channel Logout

We’ve enhanced our Authentication Services within the N-able SSO infrastructure by introducing Back-Channel Logout, a new capability designed to strengthen session security and provide more consistent logout behavior across connected applications.

This feature, powered by our Identity Server and aligned with OpenID Connect (OIDC) standards, enables secure server-to-server notifications when a user’s SSO session ends ensuring that all connected applications are automatically logged out without relying on browser activity.

As part of this enhancement, N-central users will now be required to review and acknowledge consent each time they log in, as session tokens are tied directly to this consent.

When a logout is initiated either by the user or another connected application the Back-Channel Logout endpoint is triggered by the identity provider, and all configured client applications receive a logout request.

This ensures that sessions are consistently terminated across the ecosystem, reducing the risk of lingering authenticated sessions and improving overall security posture.

Legacy EDR Upgrade Restrictions

As part of the transition away from our legacy Endpoint Detection and Response(EDR) integration, N‑central introduces additional safeguards to guide on‑premises customers toward our enhanced EDR integration.

Why this matters

  • Supports the End-of-Life transition from legacy EDR to our enhanced EDR integration.

  • Prevents upgrades in unsupported or unstable configurations.

  • Improves platform stability and upgrade success rates.

What’s changing

Systems currently using legacy EDR will now have upgrade restrictions applied to prevent unsupported configurations.

  • Upgrade Protection Enforcement

  • When legacy EDR is detected, system upgrades are restricted and a notification is displayed to inform administrators that the current configuration is not supported for upgrade.

  • Guided Migration Experience

  • These safeguards are designed to help partners transition to our enhanced EDR solution before proceeding with upgrades, ensuring platform stability and compatibility.

Additional Upgrade Safeguards

  • Clear messaging is displayed when an unsupported configuration is detected

  • Administrators are informed of potential risks associated with proceeding without transitioning

  • Additional confirmation steps are required during the upgrade process to ensure awareness

Help Desk Manager End-of-Life (EOL)

Help Desk Manager, N-central’s legacy ticketing capability, has reached End of Life and is being phased out as part of our ongoing platform modernization efforts.

Originally designed to provide lightweight ticketing for smaller MSPs, Help Desk Manager has seen decreased adoption as most partners have transitioned to dedicated PSA (Professional Services Automation) and ITSM (IT Service Management) solutions. These modern tools offer deeper functionality and integrate seamlessly with N-central.

As part of this change:

  • Help Desk Manager will no longer be available to new customers or environments where it was not previously enabled.

  • Existing customers who are currently using or licensed for Help Desk Manager will continue to have access during the transition period.

  • Help Desk Manager UI elements will be removed for customers without access.

  • Partners are encouraged to transition to supported PSA integrations such as Halo PSA, ConnectWise, or Autotask for ongoing ticketing needs.

New REST APIs for Agent Deployment & Organization Limits Management

We’ve introduced new REST API capabilities in N-central to improve automation, streamline agent deployment, and enable programmatic management of organization limits.

What’s new:

Agent Download API (Unauthenticated Link)

A new REST API endpoint allows partners to generate a direct download link for an N-central Agent, scoped to a specific organization unit.

  • Generate agent installers for:

    • Service Organization.

    • Customer.

    • Site.

  • Supports unauthenticated download links, enabling seamless integration with external tools and deployment workflows.

  • Ideal for automated provisioning, scripting, and large-scale deployments.

Organization Unit Limits API

New REST API endpoints enable partners to retrieve and update limits across organization units:

  • Supported levels:

    • Service Organization (SO).

    • Customer.

    • Site.

  • GET endpoints.

    Retrieve current limits configuration.

  • PATCH endpoints

    Update limits such as:

    • Device counts.

    • Feature/license allocations (e.g., AV Defender, Backup, Probes, etc.).

  • Designed for partial updates, allowing specific limits to be modified without impacting other settings.

Bug Fixes

A range of high-impact bugs have been resolved in this release. Be sure to review the full list included below for more details.

Category Updated Summary Issue Key
Core Platform
Core Summary: Improved remote control connectivity reliability. NCCF-1634941
Issue: Remote control sessions could fail when SSH tunnel validation behaved incorrectly, preventing proper failover to HTTP connections.
Fix: Restored a stable SSH tunnel validation process and ensured correct HTTP fallback when SSH connections are unavailable.
Core Summary: Improved Windows OS detection accuracy. NCCF-1441572
Issue: Certain Windows NT 6.x devices could be misidentified due to incorrect OS detection logic.
Fix: Corrected the OS detection logic so affected Windows versions are identified correctly.
Core Summary: Improved device history reliability. NCCF-1216350
Issue: Some devices appeared without corresponding device history records even though audit events existed.
Fix: Updated device history processing to ensure records are created and retained properly.
Automation & Task Execution
Core Summary: Improved reporting for automation task execution. NCCF-1533752
Issue: Tasks configured to run as “Currently Logged on User” appeared in the UI as executed by “Local System.”
Fix: Updated reporting logic to correctly display the user identity executing the task.
Core Summary: Improved PowerShell detection accuracy. NCCF-1504077
Issue: PowerShell could be incorrectly reported as missing when legacy registry entries existed on modern Windows systems.
Fix: Updated detection logic to prioritize valid registry entries and correctly detect installed versions.
Core Summary: Improved automation task cleanup. NCCF-1373077
Issue: Tasks deleted in N-central could continue running on agents due to synchronization issues.
Fix: Updated task synchronization logic so deleted tasks are properly removed from agents.
Core Summary: Improved custom property synchronization. NCCF-1001737
Issue: Changes to custom organization properties were not pushed to agents until another configuration update occurred.
Fix: Updated synchronization logic so property changes are pushed immediately to agents.
Agents & Device Management
Core Summary: Improved Linux agent upgrade compatibility. NCCF-1522323
Issue: Linux agent modules could be removed during server upgrades, causing monitoring services to stop working for agents that have not yet upgraded.
Fix: Updated the upgrade process to retain required modules and maintain monitoring functionality.
Core Summary: Added DDR5 memory monitoring support. NCCF-1380645
Issue: DDR5 memory modules were not previously recognized or monitored by N-central.
Fix: Added support for DDR5 memory detection and monitoring.
Core Summary: Improved asset data updates for video controllers. NCCF-862919
Issue: Video controller asset data updates could be ignored when certain values were reported as zero.
Fix: Updated asset data processing logic so valid updates are stored correctly.
UI & User Experience
Core Summary: Improved scheduled task creation experience. NCCF-1495918
Issue: Fields on the Scheduled Tasks page could become disabled or greyed out until the page was refreshed.
Fix: Corrected UI logic so scheduled task fields remain editable without requiring a page refresh.
Core Summary: Improved Job Status page stability. NCCF-1403787
Issue: Large environments loading tens of thousands of job records could experience slow performance or browser crashes.
Fix: Implemented pagination to limit records loaded at once and improve performance.
Core Summary: Improved login session stability. NCCF-1251372
Issue: Some users encountered a 500 error during login redirects due to a null user profile reference.
Fix: Updated login session initialization to ensure user profile data loads correctly.
Discovery & Asset Collection
Core Summary: Improved credential validation for discovery jobs. NCCF-1388715
Issue: Mac and Linux credentials containing spaces in usernames triggered system errors instead of validation errors.
Fix: Added validation checks to prevent invalid usernames and provide clear error messaging.
Core Summary: Improved asset discovery performance. NCCF-1222713
Issue: Legacy TeamViewer configuration logic caused unnecessary database contention during asset discovery.
Fix: Removed outdated TeamViewer update logic to reduce database locking.
Core Summary: Improved asset job processing efficiency. NCCF-826285
Issue: Frequent scans using “Update Asset Info When Finished” created excessive asset jobs and degraded server performance.
Fix: Optimized asset job creation to prevent unnecessary job generation.
PSA & Integrations  
Core Summary: Improved ConnectWise PSA customer mapping. NCCF-1634249
Issue: Customer mappings could display “Invalid Entry” when toggling mappings in the PSA customer mapping interface.
Fix: Updated mapping refresh logic to prevent validation errors.
Core Summary: Improved PSA export queue stability. NCCF-1511047
Issue: The PSA export queue could become locked and block submit queue processing.
Fix: Improved queue handling logic to prevent locking and maintain queue processing.
Core Summary: Improved Halo PSA discovery notification handling. NCCF-1371235
Issue: Discovery notifications using Halo PSA ticket recipients could trigger null pointer exceptions when device context was missing.
Fix: Updated notification processing to safely handle recipients without device IDs.
Core Summary: Improved Halo PSA ticket recipient management. NCCF-1260135
Issue: Halo ticket recipients could not be deleted due to session validation errors.
Fix: Corrected permission and session validation handling.
Core Summary: Improved Halo PSA ticket closure handling. NCCF-1260099
Issue: Tickets were not automatically closed when monitored services returned to a normal state.
Fix: Updated ticket cleanup logic to correctly process return-to-normal events.
Core Summary: Improved Halo PSA recipient name synchronization. Issue: NCCF-1255378
Renaming ticket recipients did not update related display names in all areas of the system.
Fix: Updated synchronization logic so renamed recipients update consistently.
Core Summary: Improved Autotask API endpoint handling. NCCF-975716
Issue: API requests could fail when sent to incorrect Autotask zone endpoints.
Fix: Updated integration logic to use the correct API zone endpoint.
Core Summary: Corrected PSA export behavior when devices are deleted. NCCF-265726
Issue: Device deletion events could trigger exports across multiple PSA profiles instead of only the configured profile.
Fix: Updated export logic to ensure only the correct profile processes deletion events.
Authentication & SSO
Core Summary: Improved MSP SSO notification settings handling. NCCF-903946
Issue: Editing notification methods for MSP SSO users could invalidate sessions and log users out.
Fix: Updated session handling to prevent session destruction during configuration updates.
Core Summary: Improved MSP SSO auto-provisioning reliability. NCCF-799206
Issue: Some auto-provisioned users were created with an invalid customer ID.
Fix: Updated provisioning validation to ensure users are assigned to the correct organization.
Notifications & Alerting
Core Summary: Improved notification deletion behavior. NCCF-1275775
Issue: Deleting notifications at the Service Organization level did not always remove related child notifications.
Fix: Updated deletion logic to properly cascade notification removals.
Core Summary: Improved notification template compatibility. NCCF-1263720
Issue: HTML escaping changes broke JSON-based PSA notification templates used in integrations.
Fix: Updated template processing to preserve JSON formatting.
Core Summary: Improved notification count reconciliation. NCCF-486698
Issue: Incorrect notification counts could remove active notifications or prevent return-to-normal events from triggering.
Fix: Corrected notification count logic to maintain accurate states.
Performance & Stability
Core Summary: Improved handling of task semaphore delays. NCCF-1094691
Issue: Some processes could pause for extended periods while acquiring semaphores, delaying queue processing.
Fix: Optimized semaphore handling to reduce wait times.
Core Summary: Improved remote control property lookup performance. NCCF-1035009
Issue: Database contention could occur during remote control property lookups in large environments.
Fix: Optimized query logic to reduce lock contention.
Core Summary: Improved operational data storage management. NCCF-1140520
Issue: Prometheus and NATS services stored operational data in uncontrolled directories which could fill system storage.
Fix: Updated configuration to store data in managed directories.
Reporting
Core Summary: Improved license usage report accuracy. NCCF-956676
Issue: Scheduled emailed license usage reports sometimes showed zero usage values even when usage existed.
Fix: Updated report generation logic so emailed reports display accurate totals.

How to Prepare for 2026.2 in Advance

If you would like to participate in the public preview to test the new 2026.2 version in a non-production environment before rolling it out fully, the Public Preview of 2026.2 will be available in the 1st week of April.

Stay Tuned

Be on the lookout for the official N-central 2026.2 release in April 2026. We look forward to delivering these exciting updates. Stay tuned for the full release package!