Submit a ticketCall us

whitepaperYour VM Perplexities Called, and They Need You to Read This.

Virtualization can give you enormous flexibility with future workloads and can be a key enabler for other areas, like cloud computing and disaster recovery. So, how can you get a handle on the performance challenges in your virtual environment and manage deployments without erasing the potential upside? Learn the four key areas you need to be focusing on to help deliver a healthy and well-performing data center.

Get your free white paper.

Home > Success Center > Network Configuration Manager (NCM) > NCM Documentation > NCM 7.9 Administrator Guide > View firmware vulnerability data > Manually download and add firmware vulnerability files

Manually download and add firmware vulnerability files

Table of contents
No headers
Created by Caroline Juszczak, last modified by Melanie Boyd on Jun 03, 2018

Views: 909 Votes: 1 Revisions: 5

Updated: May 31, 2018

If SolarWinds NCM cannot automatically download firmware vulnerability data (for example, because you are on a closed network), you can import vulnerability data files from the National Institute of Standards and Technology (NIST) and then manually add them to your NCM server. NCM will use the information in these files to search for vulnerabilities that could affect your devices.

If you have High Availability (HA) backup servers configured, perform this procedure on both your main polling engine and your HA backup servers.

  1. Download the firmware vulnerability .zip files from NIST.
  2. Log in to your NCM server.
  3. Verify the location of the vulnerability announcements folder. (The default location is C:\ProgramData\SolarWinds\NCM\Vuln\Xml.)
    1. Click Settings > All Settings.
    2. Under Product Specific Settings, click NCM Settings.
    3. Under Advanced, click Firmware Vulnerability Settings.
    4. Under Vulnerability Data Import Settings, verify the location of the folder with vulnerability announcements XML data.
  4. Extract the contents of the .zip files to the location verified above.

  5. Under Vulnerability Search Settings, click Run Now.



Last modified