How to get started
Vulnerability Management view is designed to make managing your devices simple and efficient. Here's everything you need to get up and running quickly.
What You’ll Need
Hosted Users
- A hosted N-able Login or N-able Login with Entra ID.
On-Premises Users
- Opt into Analytics to enable Cloud Eventing, which also activates our Modern agent on devices.
- N-central 2025.2.0.1 or later installed (see 2025.2 Release Notes).
- A valid N-able Login or N-able Login with Entra ID.
All Users
- User / Role permission: Ecoverse > Vulnerabilities > View set to Read Only.
The Default Admin role has the Vulnerability Management permission enabled by default, and the permission cannot be disabled.
Exclusions
You may need to add exclusions to your security solutions (such as firewalls etc.) for the Modern Agent executable and its supporting files (for Ecoverse features) which are downloaded and installed to feature specific directories within the following locations:
Windows
C:\Program Files (x86)\Msp Agent\
Vulnerability Management specific:
C:\Program Files (x86)\Msp Agent\components\software-scanner\<version>\software scanner.exe
C:\Program Files (x86)\Msp Agent\components\software-scanner\<version>\software-management-service\windows\<version>\software-management-service.exe
C:\Program Files (x86)\Msp Agent\downloads\software-scanner\windows\<version>\software-scanner.exe
Linux
/opt/msp-agent/
Vulnerability Management specific:
-
/opt/msp-agent/components/software-scanner/<version>/software scanner
-
/opt/msp-agent/components/software-scanner/<version>/software-management-service/linux/<version>/software-management-service
Access the Vulnerability Management view
Hosted users:
-
Go to Views > Vulnerabilities.
On-premises users:
- From the left panel, select the level to work at.
- Go to Views > Vulnerabilities.
Quick Tips
Here are some tips to help you get the most out of managing your devices effectively. These features make it easier to sort, monitor, and address potential issues while keeping your workflow efficient:
- Use filters to sort devices by things like the vulnerability severity.
- Look for trends or unusual activity that might need attention.
- Use trends to fix small issues before they become big problems.
- Search columns for specific devices by name.