Watch Demo×
×

See NinjaOne in action!

By submitting this form, I accept NinjaOne's privacy policy.

NinjaOne’s 5.3.1 Release: New User Permissions, New Monitoring Templates, Better Reporting

5.3.1-featured-image

Ninja’s feature-packed 5.3.1 release provides a ton of out-of-box functionality, better reporting, and improved user permissions. 5.3.1 also includes major updates to Ninja Ticketing that you can read about here.

New monitoring templates

Ninja has always offered a robust set of condition monitoring templates, and in 5.3.1 we’ve redesigned the UI and added a ton of new templates to make monitoring critical information on endpoints and servers easier for our partners.

Monitoring templates

Monitoring templates are pre-configured policy conditions that allow you to monitor specific system states and trigger alerts, tickets, or automations. In our most recent release, we’ve added over 120 additional monitoring templates including:

  • Popular backup vendors like Veeam, Acronis, Altaro, and StorageCraft
  • Common security solutions, including Sophos, ESET, Windows Defender, and more
  • Common server applications and services including Exchange, SQL, WSUS, and more
  • VMWare and Hyper-V hosts
  • Windows security-related events including user-, log-, and fire-wall related events

We’ve also redesigned the monitoring template interface in the policy management screen, making it easier to find and use monitoring templates.

These new templates are just the first round of new built-in conditions. With our renewed focus on out-of-the-box capabilities, we’re helping our partners shorten their time-to-value and use Ninja’s monitoring capabilities more effectively.

New user permissions model (beta)

Granular and robust user permissions play a critical role in effective security and operational maturity. While Ninja has always allowed administrators to restrict access to appropriate organizations and certain features for individual users, the functionality hasn’t been granular enough or scalable enough, until now.

Ninja’s new user permissions model allows administrators to assign a very granular set of permissions to a role. Each user is then assigned a role or roles to determine which organizations, features, and functionalities they have access to.

Roles can permit or restrict access to:

  • Administrative tasks and configurations
  • Entire organizations
  • Devices data by roles and field type
  • Devices actions (like creating a new device, or launching a remote session)
  • Policy management globally or for individual policies
  • Script management
  • Ticketing and ticket management
  • Documentation and document management

Permission can generally be set to:

  • No Access
  • View
  • View and update
  • View, update, and create
  • View, update, create, and delete

The incredible granularity our new user permission model gives our partners ensures your technicians have the access you need them to have, while the role-based system ensures that permissions can be managed at scale.

Updated report visuals

We felt our reports were looking a little on the old side, so we’ve decided to redesign them. The new report designs look much more modern, standardized, and presentation-ready while presenting data in a more easily consumed format.

This is the first step in our plan to improve Ninja’s reporting capabilities with a drag-and-drop editor and more actionable reports coming soon.

Security enhancements

5.3.1 included several security-related enhancements, primarily around user logins:

  • Users can now log into Ninja via Windows Hello, Mac Touch ID, and other hardware-based login solutions via WebAuthn protocol
  • We’ve released our SAML / SSO integration capabilities to general availability
  • Passwords requirements have increased for all new users

See these new updates for yourself

Book a demo or join us at partner office hours to see these changes in action.

Next Steps

Building an efficient and effective IT team requires a centralized solution that acts as your core service deliver tool. NinjaOne enables IT teams to monitor, manage, secure, and support all their devices, wherever they are, without the need for complex on-premises infrastructure.

Learn more about NinjaOne Endpoint Management, check out a live tour, or start your free trial of the NinjaOne platform.

You might also like

Ready to become an IT Ninja?

Learn how NinjaOne can help you simplify IT operations.

NinjaOne Terms & Conditions

By clicking the “I Accept” button below, you indicate your acceptance of the following legal terms as well as our Terms of Use:

  • Ownership Rights: NinjaOne owns and will continue to own all right, title, and interest in and to the script (including the copyright). NinjaOne is giving you a limited license to use the script in accordance with these legal terms.
  • Use Limitation: You may only use the script for your legitimate personal or internal business purposes, and you may not share the script with another party.
  • Republication Prohibition: Under no circumstances are you permitted to re-publish the script in any script library belonging to or under the control of any other software provider.
  • Warranty Disclaimer: The script is provided “as is” and “as available”, without warranty of any kind. NinjaOne makes no promise or guarantee that the script will be free from defects or that it will meet your specific needs or expectations.
  • Assumption of Risk: Your use of the script is at your own risk. You acknowledge that there are certain inherent risks in using the script, and you understand and assume each of those risks.
  • Waiver and Release: You will not hold NinjaOne responsible for any adverse or unintended consequences resulting from your use of the script, and you waive any legal or equitable rights or remedies you may have against NinjaOne relating to your use of the script.
  • EULA: If you are a NinjaOne customer, your use of the script is subject to the End User License Agreement applicable to you (EULA).