Topic
This article demonstrates how to view vulnerability data within NinjaOne and identify recommended actions.
Environment
NinjaOne Vulnerability Management
Description
Vulnerability Management for networks and systems is an ongoing, iterative process that requires continuous attention and adaptation to emerging threats and vulnerabilities. It's a critical component of an organization's overall cybersecurity strategy, helping to protect assets and data from potential breaches and attacks.
The NinjaOne Vulnerability Management application in NinjaOne helps you identify and remediate known Common Vulnerabilities and Exposures (CVEs) on managed endpoints.
Select a category to learn more:
- Enable Vulnerability Management Features
- Find Vulnerability Data on the Dashboards
- Additional Resources
Enable Vulnerability Management Features
Access the application from Administration → Apps → Installed. Select the NinjaOne Vulnerability Management application and enable it.
Edit the widgets to configure whether data should be visible in the Vulnerabilities tab on the dashboards or whether they should impact device health:
- Enabled: Refer to the section of this article titled Dashboard Vulnerabilities Tab to learn about how NinjaOne presents this data.
- Vulnerabilities impact device health. Refer to the section of this article titled 'Dashboard Health Status' to learn about how NinjaOne presents this data.
Refer to the following table for a description of each section.
| Vulnerability Management Section Name | Definition or Purpose |
|---|---|
| Vulnerabilities from NinjaOne Patching | Configure the behavior of CVEs identified by NinjaOne Patch scanning. |
| Vulnerabilities from Vulnerability Importers | Configure the behavior of CVEs imported from the Vulnerability Importer, CrowdStrike Spotlight, Qualys, Rapid7, Tenable, and Microsoft Defender integrations. For documentation regarding the Vulnerability Importer app page, refer to Vulnerability Management in NinjaOne: Import Scan Data. |

Find Vulnerability Data on the Dashboards
You can view vulnerabilities from several locations on the system, organization, or device dashboards, including:
Dashboard Vulnerabilities Tab
This tab is available on the system, organization, and device dashboards. The page groups data by CVE, with each row of the dashboard's table representing a single CVE and the related devices. This data is filtered by the set of devices visible to the calling user, so the dashboard only contains counts of visible devices.
Refer to NinjaOne Vulnerability Management: Common Vulnerabilities and Exposure (CVE) Data to learn more about this tab.

Dashboard Health Status
Move your cursor over icons next to the organization name on the system dashboard to view the number of devices affected by vulnerabilities and their risk levels.

Click the numbered links in the Device health issues widget on the system or organization dashboard to view vulnerability details. You will navigate to the Devices search page, which NinjaOne filters to show the affected devices; from there, you can perform various device actions. Refer to our Find and Manage Endpoints from the Devices Search Pages article to learn more.

The device dashboard displays a Health Issues widget if an active vulnerability or threat is present. Click the action menu (ellipsis) on the right side of the health status and then click Navigate to vulnerabilities tab.

Dashboard Activities Tab
From the system, organization, or device dashboard, open the Activities tab and select All.
Select "Vulnerability" from the Activity type drop-down filter and then select an option from the Status drop-down filter to organize the data.

Additional Resources
Refer to the following resources to learn more about vulnerabilities and patching in NinjaOne: