Up Next: What to expect in the N-central 2026.3 Release

Last updated: 11-May-2026
Expected release date: Between first to last week of June

This is an early preview of the release notes; the features and details may change as we move closer to the final release.

Expect further updates in upcoming release notes. The final release notes, including the build number and upgrade details, will be shared as part of the actual release notes that will be published before the end of June.

We’re introducing exciting new features, enhancements, and critical fixes to improve usability, security, and performance. Here’s what’s in the 2026.3 release:

What's New in 2026.3

Modernized Filter & Rule Device Preview Experience

We’ve introduced a major modernization and performance optimization for Filter Preview and Rule Show Devices functionality. This enhancement replaces the legacy preview execution model with a faster, scalable, in-memory evaluation framework while introducing a modernized shared preview grid experience across Filters and Rules.

This approach avoids the legacy preview model, which built full device lists server-side and sent them to the browser. By evaluating matches in memory and returning a limited result set, the preview delivers faster verification of expected devices while reducing server load.

Key behaviors include:

  • Maximum of 50 preview rows returned

  • No pagination

  • Full match count metadata included in the response

The UI now displays messaging such as: This provides visibility into total matches without requiring additional server roundtrips: “Showing first 50 of 347 matching devices”.

The preview grid now supports backend-powered text filtering across key device attributes, including:

  • Customer

  • Site

  • Device Name

  • Network Address

  • Device Class

This allows administrators to quickly narrow results without loading full device datasets into the browser.

Scalable Agent Upgrade Queue & Asynchronous Asset Discovery Processing

N-central 2026.3 introduces major improvements to the Agent Upgrade experience, making large-scale upgrades faster, more reliable, and less disruptive for administrators managing thousands of devices.

Historically, N-central intentionally limited how many agents could upgrade at the same time to protect server stability during post-upgrade processing. While this helped avoid system overload, it also created unnecessary delays for customers trying to deploy important updates quickly across large environments.

What’s improved

N-central can now support significantly higher upgrade concurrency, allowing many more agents and probes to upgrade simultaneously without negatively impacting platform performance.

The primary source of upgrade-related load was not the upgrade itself, but the large burst of asset discovery data submitted by agents after restarting. To address this, N-central now processes post-upgrade asset data asynchronously using a modern queuing architecture powered by NATS JetStream. These changes are especially beneficial for larger customers and enterprise-scale environments managing tens of thousands of devices.

Additional monitoring and queue health visibility improvements help administrators and support teams better understand upgrade processing activity and platform health during large rollout operations.

Windows Agent Trust, Compatibility & Delivery Improvements

We’ve delivered a series of foundational enhancements to the N-central Windows Agent to improve trust, compatibility with security tools, and overall reliability across deployments.

These updates focus on ensuring agent binaries are securely signed, consistently trusted by antivirus and firewall solutions, and built through a more resilient and scalable delivery pipeline.

What’s new

  • Digitally Signed Agent Binaries

    All Windows Agent artifacts are now digitally signed, allowing customers and security tools to verify authenticity, reduce “unknown publisher” warnings, and protect against tampering.

  • Improved Antivirus & Firewall Compatibility

    We’ve worked to ensure N-central Agent binaries are recognized and allowlisted by major AV and firewall vendors, reducing installation and runtime disruptions in security-hardened environments.

N-able Login User Deletion Event Support

This enhancement ensures that when a user is deleted in N-able Login, connected products such as N-central receive and processing the deletion event consistently.

This enhancement helps improve:

  • Consistent user deprovisioning across products.

  • Reduced risk of orphaned or active accounts after SSO deletion.

  • Centralized identity lifecycle management.

  • Better auditability and access governance.

N-central now supports this event flow by:

  • Receiving the MSP SSO user deletion event.

  • Converting the affected SSO user back to a local N-central user.

  • Automatically lock the local account to prevent access.

  • If a deleted MSP SSO user attempts to authenticate N-central after deletion, the account will remain locked and inaccessible until manually addressed by an administrator.

DMS Framework Cache, Locking & Scalability Improvements

Much of the N-central service layer depends heavily on the DMS ORM caching framework particularly for core entities such as devices, appliance tasks, and business process data improvements in this area can positively impact performance across the entire platform.

As customer environments continue growing toward

  • 40,000+ devices

  • 100,000+ managed endpoints

  • High-frequency automation workflows

  • Large-scale business process execution

existing cache structures and locking mechanisms can become performance bottlenecks.

We are introducing architectural optimization work focused on improving cache efficiency, concurrency handling, and lock contention reduction within the DMS Framework.

This is a back end improvement so no direct user interface changes are included as part of the above change in N-central 2026.3.

Modernized Custom PSA APIs with JWT Authentication

Custom PSA integration AP previously relied on legacy REST endpoints secured through static username and password authentication. These REST endpoints are now brought into the modern API Service framework with JWT-based authentication. This initiative improves security, consistency, and developer experience while maintaining functional parity with existing Custom PSA integrations.

There is no impact to the functionality of the Custom PSA integration APIs to support critical ticket lifecycle operations, including:

  • Create Ticket

  • Update Ticket

  • Get Ticket

  • Close Ticket

  • Reopen Ticket

Halo PSA Integration Reliability & Workflow Improvements

This release hardens the native N-central HaloPSA integration focusing on ticketing workflows, asset export reliability, and operational resilience. Customers will see more predictable ticket reopen behavior, clearer export diagnostics, safer handling of Halo-side mandatory field policies, and an easier migration path from custom integrations via bulk asset sync.

This includes the following changes:

Asset Sync for Faster Migration:

  • New Sync Assets functionality allows customers to bulk match existing Halo PSA assets to N-central devices using serial number matching.

  • Automatically links existing Halo assets to N-central devices, simplifying migration from custom integrations to the native Halo PSA integration.

Improved Export Reliability & Troubleshooting:

  • Export errors are now cleared automatically after a successful retry, reducing confusion during troubleshooting.

  • More detailed API error information is surfaced directly in the export UI to help customers identify issues faster.

  • If a previously exported asset was deleted in Halo, N-central can now properly detect the condition and recreate the asset during re-export.

  • Last logged-in user information can now be synchronized to Halo asset records for improved technician visibility.

  • Improved handling of Halo mandatory field policies helps reduce export and ticket creation failures.

More Predictable Ticketing Workflows:

  • Ticket reopen behavior is now more consistent with standard Halo PSA workflows.

  • Ticket recipient configuration settings such as default assignee and ticket status are now more consistently respected.

  • “Do Not Reopen” preferences are now properly enforced for repeat failures.

  • Improved handling of multi-device notification scenarios helps ensure ticket updates and return-to-normal events behave more reliably.

Operational & Integration Improvements:

  • Better reconciliation of orphaned tickets and assets between N-central and Halo PSA.

  • Improved handling of assets previously created through older custom PSA integrations.

  • Continued alignment with Halo PSA best practices by avoiding direct workflow bypass behavior.

Known Limitations:

  • Some devices do not report a serial number. In Halo environments where serial numbers are mandatory, asset export may fail for those devices. This is expected and outside of N‑central’s control.

  • Upgrade Recommendations:

    • After upgrading, customers are encouraged to run the new Sync Assets function before enabling ticket automations or performing large-scale exports.

    • Review Halo recipient configuration settings such as ticket status, assignee behavior, and reopen preferences to ensure they align with internal workflows.

    • Validate any mandatory field policies configured within Halo PSA to ensure successful ticket and asset synchronization.

  • N‑central does not support Halo workflows for ticket status updates, in Halo environments where workflows are required to control status changes, ticket updates initiated by N‑central may fail or be rejected.

    To use workflows with N‑central, Halo must be configured to allow ticket updates using one of the following approaches:

    • Allow status updates outside workflows

      • In Halo, enable status changes without a workflow action:

        • Configuration > Tickets > General Settings

      • Set "Changing of status outside of an action" to Always allowed.

    • Use a dedicated ticket type for N‑central

      • Create or use a Halo ticket type with no workflows and configure N‑central to create and update tickets using that ticket type.

Full End of Life: Help Desk Manager (HDM) and NetPath

Effective with N-central 2026.3, both Help Desk Manager (HDM) and NetPath have reached full End of Life and are permanently disabled for all customers, including those with existing usage or licenses. This applies to both On-Premises and Hosted (NCOD) deployments.

In N-central 2026.2, a soft deprecation was introduced that hid these features from customers who were not already using or licensed for them. With 2026.3, this deprecation is now complete as these features are no longer accessible to any user.

Help Desk Manager (HDM)

Help Desk Manager was a legacy on-premises ticketing system integrated into N-central, designed to allow MSPs to create, assign, and track service tickets directly within the platform. As the industry has shifted toward dedicated PSA and ITSM tools, HDM was underutilized and no longer aligned with N-central core RMM focus.

What has changed:

  • PSA Integration: HDM has been removed as an option from the PSA Integrations section for all customers.

  • UI: All Help Desk Manager navigation menus, icons, and configuration options have been removed from the N-central UI.

  • Backend: HDM-related services, processes, and integrations have been fully disabled.

  • Billing: HDM billing ceased in February 2026. No further charges will be incurred.

Recommended action: Customers previously using HDM should transition to a dedicated PSA or ITSM solution that integrates with N-central through available APIs and connectors.

NetPath

NetPath, originally by SolarWinds, was an on-premises network monitoring add-on that provided performance metrics and a visual graph of the traversal route of a URL over the web. As part of N-able's decision to retire from low-use components that no longer align with long-term product objectives, NetPath has been fully decommissioned.

Recommended action: There is no direct migration path for an equivalent solution within N-able. Customers who relied on NetPath for network path analysis should evaluate third-party network monitoring tools.

Bug Fixes

A range of high-impact bugs have been resolved in this release. Be sure to review the full list included below for more details.

Category Updated Summary Issue Key
Core Platform
Core Summary: Improved server performance during security token verification. NCCF-2078544
Issue: Under heavy load, token verification could reduce server responsiveness.
Fix: Updated verification handling to prevent performance degradation.
Core Summary: Corrected invalid status reporting for Lightweight services. NCCF-2067007
Issue: Lightweight services could be flagged as invalid despite operating normally.
Fix: Updated service validation to ensure status is reported correctly.
Core Summary: Improved reliability of Report Manager exports. NCCF-2066396
Issue: Exports could time out before completing in larger environments.
Fix: Updated export processing to prevent timeouts on large servers.
Core Summary: Prevented probe installation from affecting other appliances on shared hardware. NCCF-2047154
Issue: Installing or reinstalling a probe could unintentionally remove authentication tokens used by other appliances.
Fix: Updated probe installation logic to preserve existing appliance tokens.
Core Summary: Improved handling when devices exit maintenance windows. NCCF-2028662
Issue: Devices leaving a maintenance window while disconnected could trigger errors.
Fix: Updated processing to handle disconnected devices correctly when maintenance ends.
Core Summary: Improved stability during concurrent self-healing scans. NCCF-2027450
Issue: Running multiple self-healing scans at the same time could cause submit queue errors.
Fix: Resolved a database issue to prevent errors when scans overlap.
Core Summary: Improved service status freshness during heavy processing. NCCF-1989795
Issue: Submit queue backlogs could delay updates and make services appear stale.
Fix: Improved queue processing so service updates are applied reliably.
Core Summary: Corrected administrator credential handling during server reactivation. NCCF-1983444
Issue: Server reactivation could update the wrong administrator account.
Fix: Updated account selection logic to ensure the correct administrator account is updated.
Core Summary: Improved reliability of customer creation through the API under load. NCCF-1908560
Issue: Creating multiple customers at the same time via API could fail under heavy usage.
Fix: Updated API handling to better support concurrent customer creation.
Core Summary: Prevented customer custom properties from saving incorrect values. NCCF-1788756
Issue: Values from a previously viewed customer could be saved to a different customer.
Fix: Updated context handling to ensure values are saved to the correct customer.
Core Summary: Improved export reliability for service templates with large values. NCCF-1786040
Issue: Templates with very large parameter values could fail to export.
Fix: Updated export processing to support large parameter values.
Core Summary: Corrected System Settings permission visibility. NCCF-1767348
Issue: The System Settings permission could be hidden when it should be available.
Fix: Updated role handling so the permission remains visible as expected.
Core Summary: Improved stability when opening Agent Settings. NCCF-1048144
Issue: The Agent Settings page could fail to load in some scenarios.
Fix: Updated handling to ensure Agent Settings loads reliably.
Core Summary: Reduced unnecessary internal processing during background cleanup. NCCF-1759873
Issue: Repeated cleanup activity could increase processing overhead and slow the server.
Fix: Reduced redundant cleanup work to lower internal processing.
Core Summary: Improved resilience of internal message handling. NCCF-1759635
Issue: Oversized internal messages could disrupt server communications.
Fix: Added safeguards to prevent oversized messages from impacting operations.
Core Summary: Ensured updated HP Physical Drive status mappings apply after upgrades. NCCF-1724321
Issue: Updated HP Physical Drive status mappings were not applied during upgrades.
Fix: Updated service mapping metadata so changes apply correctly after upgrade.
Agents & Device Management
Agent Summary: Improved handling of passwords in logs during probe-based remediation. NCCF-2013728
Issue: In some cases, passwords could be included in device history or Linux agent logs after remediation tasks were run through a probe.
Fix: Updated logging behaviour so passwords are properly hidden in device history and Linux agent logs.
Agent Summary: Improved syslog component updates during probe upgrades. NCCF-1873790
Issue: Syslog monitoring components were not updated during some probe upgrades.
Fix: Updated the probe upgrade process to ensure syslog components are updated.
Agent Summary: Added support for discovering Aruba network devices through SNMP. NCCF-1815538
Issue: Aruba network devices could not be discovered through SNMP.
Fix: Added SNMP discovery support for Aruba devices.
Agent Summary: Improved Remote Control session stability after tunnel switching. NCCF-1767153
Issue: Remote Control sessions could disconnect after switching to an HTTPS tunnel.
Fix: Updated session handling to maintain connectivity after tunnel changes.
Agent Summary: Improved automation policy execution on devices with older PowerShell configurations. NCCF-1504077
Issue: Automation policies could fail on devices with older PowerShell configurations.
Fix: Updated execution handling to improve compatibility with older PowerShell environments.
UI & User Experience
Core Summary: Resolved an error when adding maintenance windows using a direct URL. NCCF-1907401
Issue: Adding a maintenance window from a bookmarked or direct link could result in an error.
Fix: Corrected request handling so maintenance windows can be added from direct links.
Core Summary: Corrected sorting behaviour for the Make column in the All-Devices view. NCCF-1896701
Issue: Sorting by manufacturer did not order devices correctly.
Fix: Updated sorting logic to order devices by manufacturer name.
Core Summary: Resolved an error when bulk editing devices from the All-Devices view. NCCF-1830274
Issue: Bulk edit actions could fail and display an error.
Fix: Updated bulk edit handling to prevent errors.
Core Summary: Corrected UI label rendering that affected reports and bulk edit workflows. NCCF-1813407
Issue: Some UI labels displayed incorrectly, impacting reporting and bulk edit.
Fix: Updated UI rendering logic to display labels correctly.
Core Summary: Improved stability of the notification profile page. NCCF-1812787
Issue: Certain special characters in profile names could cause the page to crash.
Fix: Updated input handling to safely process special characters.
Notifications & Alerting
Core Summary: Corrected formatting for specific notification variables. NCCF-1921480
Issue: Some notification fields displayed without the intended spacing.
Fix: Updated variable formatting so notification content displays correctly.
Authentication & SSO
Core Summary: Improved server stability during SSO token refresh. NCCF-1927906
Issue: Token refresh activity could stall and delay other server operations.
Fix: Updated refresh handling to prevent blocking behaviour.
Core Summary: Improved reliability of SSO login. NCCF-1283474
Issue: Users could experience intermittent SSO login failures.
Fix: Updated authentication handling to ensure consistent login behaviour.
Core Summary: Resolved a Settings page error for GSuite SSO users. NCCF-1675717
Issue: GSuite SSO users could encounter an error when accessing the device Settings page.
Fix: Updated access handling to allow Settings page access.
PSA & Integrations
PSA Summary: Improved reliability of PSA ticket creation. NCCF-1831625
Issue: A timing issue could prevent tickets being created when notifications triggered.
Fix: Updated ticket creation handling to ensure notifications generate tickets reliably.
Custom PSA Summary: Improved reliability of Custom PSA ticket creation. NCCF-1805266
Issue: Intermittent connectivity issues could cause Custom PSA ticket creation to fail.
Fix: Updated connection handling to improve ticket submission reliability.
Custom PSA Summary: Improved server stability during Custom PSA operations. NCCF-1439680
Issue: Custom PSA activity could consume excessive server resources and impact stability.
Fix: Optimised processing to reduce resource usage during Custom PSA operations.
HaloPSA Summary: Resolved HaloPSA ticket creation failures caused by mandatory field validation. NCCF-1718037
Issue: Ticket creation could fail when mandatory field settings were enabled in HaloPSA.
Fix: Updated the integration so ticket creation succeeds when mandatory fields are configured.
Autotask PSA Summary: Prevented duplicate device entries when moving devices between customers. NCCF-1681853
Issue: Moving devices between customers could create duplicate records in Autotask PSA.
Fix: Updated export handling to prevent duplicate device records.
Patch
Patch Summary: Removed old, non-applicable patches from Analytics views. NCCF-1874139
Issue: Some old patches could remain visible in Analytics dashboards after they were no longer relevant.
Fix: Updated Analytics processing to remove obsolete patch entries.
Analytics
Analytics Summary: Improved scheduling behaviour for Analytics resynchronisation. NCCF-1785854
Issue: Analytics resynchronisation could delay other scheduled tasks such as report generation.
Fix: Updated scheduling logic to reduce the impact of resync tasks on other operations.
API
API Summary: Corrected pagination links returned by the active-issues API. NCCF-1522953
Issue: Pagination links were missing required parameters, preventing navigation through results.
Fix: Updated API responses to include complete pagination parameters.
Backups
Core Summary: Resolved active exports not being detected during backup operations. NCCF-1702570
Issue: Backup operations could proceed while an export was already running.
Fix: Updated backup processing to detect active exports before starting a backup.
Core Summary: Restored secure FTP backup transfer support after upgrades. NCCF-1300319
Issue: SSL/TLS FTP backup transfers could stop working after upgrading the N-central server.
Fix: Updated backup transfer handling so secure FTP transfers work as expected after upgrade.
Reporting
Core Summary: Improved stability of the Detailed Status Report in large environments. NCCF-1484854
Issue: Loading large amounts of report data could cause slow performance or browser instability.
Fix: Updated report data handling to improve performance and stability.
Performance & Stability
Core Summary: Improved stability of warranty update processing. NCCF-1842761
Issue: Warranty updates could overwhelm the server and impact stability.
Fix: Added processing limits to prevent resource exhaustion during warranty updates.
Core Summary: Improved performance when downloading automation policy files. NCCF-1805490
Issue: Downloads could trigger short-term CPU and disk usage spikes on the server.
Fix: Updated download handling to reduce resource usage spikes.
Core Summary: Improved performance when loading Active Issues on large servers. NCCF-1001741
Issue: Loading the Active Issues page could be slow in large environments.
Fix: Updated validation and processing logic to improve responsiveness.

How to Prepare for 2026.3 in Advance

If you would like to participate in the public preview to test the new 2026.3 version in a non-production environment before rolling it out fully, the Public Preview of 2026.3 will be available early June.

Stay Tuned

Be on the lookout for the official N-central – 2026.3 release in June 2026. We look forward to delivering these exciting updates - stay tuned for the full release package!