Vulnerability Management view (preview)
The Vulnerability Management view allows you to monitor assets efficiently using filters, searches, and actions. Powered by our new Modern Agent, this view helps identify patterns, trends, and anomalies, uncovering opportunities, risks, and areas for improvement.
You require N-able Login to use the Vulnerability Management view.
You may notice vulnerabilities for an application that you have set Patch Management to auto-approve the patches for. In this scenario it is best to double check 2 things before raising a support case.
- Is the application still supported by the vendor?
- Is Patch Management configured as you expect it to be?
In the event an application is no longer supported by the vendor, there will be no more available patches for it, which means Patch Management cannot update it.
Assuming the application is still supported by the vendor, Patch Management should be patching as updates become available, assuming your configured Protection Policy is set to do so.
N-able recommends that, wherever possible, the application be uninstalled and an alternative application used in its place.
Vulnerability Management view highlights
-
View assets vulnerabilities (based on your view permissions)
-
Create custom filters that allow you to quickly find specific assets or vulnerability severity status.
-
Choose columns to display or hide based on the data you want to view
- Vulnerability Management view data
Column name Description Vulnerability ID The CVE code for the vulnerability. Asset Name The unique identifier assigned to an asset, enabling efficient tracking, management, and troubleshooting. You can update this information within the classic platform (N-central or N-sight). Threat Status Resolved or Unresolved. Severity Critical Important
Moderate
Low
CVSS (Common Vulnerability Scoring System) Numerical score as per CVSS for the vulnerability. Affected Products Product name affected by the vulnerability. Customer Name of the client the asset belongs to. Site The name of the client site where the device resides. Date Published The date the vulnerability CVE was published. First detected Initial detection date for the vulnerability on the device. Last updated The most recent date of the previous vulnerability information update. -
Perform column-specific searches to refine your search based on the data stored in each field
-
Reorder columns
-
Fix columns
Right-click the column to access the menu.
-
Format columns