Submit a ticketCall us

Announcing NCM 7.7
With NCM 7.7, you can examine the rules that make up an access control list for a Cisco ASA device. Then you can apply filters to display only rules that meet the specified criteria, order the rules by line number or by the hit count, and much more.
See new features and improvements.

Home > Success Center > Network Configuration Manager (NCM) > NCM 7.7 Administrator Guide > Firmware vulnerability data

Firmware vulnerability data

Table of contents
No headers
Created by Caroline Juszczak, last modified by Anthony.Rinaldi_ret on Oct 03, 2016

Views: 99 Votes: 0 Revisions: 4

SolarWinds NCM imports into its database the firmware vulnerability warnings provided by National Institute of Standards and Technology (NIST). SolarWinds NCM sources that data into the Firmware Vulnerabilities resources on the Config Summary page.

Click a vulnerability in the summary view to view and manage the vulnerability information. For more information about working with vulnerability data, see Add firmware vulnerability files.


Last modified
13:38, 3 Oct 2016