Submit a ticketCall us

AnnouncementsFace your biggest database issues head-on

Our new eCourse helps you navigate SQL Server performance blocks by teaching you how to recognize and deal with the three DBA Disruptors: Performance Hog, Blame Shifter, and Query Blocker. Register today to learn how to defend your environment and fend off menacing disruptions.

Register for your free eCourse.

Home > Success Center > Network Configuration Manager (NCM) > NCM Documentation > NCM 7.8 Administrator Guide > Firmware vulnerability data > Access firmware vulnerability settings

Access firmware vulnerability settings

Table of contents
No headers
Created by Caroline Juszczak, last modified by Anthony.Rinaldi_ret on Oct 03, 2016

Views: 705 Votes: 0 Revisions: 4

Updated: May 31, 2018

SolarWinds NCM imports the firmware vulnerability warnings provided by National Institute of Standards and Technology (NIST) and correlates vulnerabilities with managed nodes. Use the firmware vulnerability settings to specify when the matching logic runs or change the default import locations or alert threshold.

  1. Click Settings > All Settings.
  2. Under Product Specific Settings, click NCM Settings.
  3. Under Advanced, click Firmware Vulnerability Settings.
  4. Adjust settings for Vulnerability Search, Vulnerability Data Import, and Vulnerability Alerting.
  5. Click Submit.

 

Last modified

Tags

Classifications

Public