Already a NinjaOne customer? Log in to view more guides and the latest updates.

Getting Started with Vulnerability Management Configuration

Topic

This article demonstrates how to view vulnerability data within NinjaOne and identify recommended actions. 

Environment

NinjaOne Vulnerability Management

Description

Vulnerability Management for networks and systems is an ongoing, iterative process that requires continuous attention and adaptation to emerging threats and vulnerabilities. It's a critical component of an organization's overall cybersecurity strategy, helping to protect assets and data from potential breaches and attacks.

The NinjaOne Vulnerability Management application in NinjaOne helps you identify and remediate known Common Vulnerabilities and Exposures (CVEs) on managed endpoints.

Select a category to learn more:

Enable Vulnerability Management Features

Access the application from AdministrationAppsInstalled. Select the NinjaOne Vulnerability Management application and enable it. 

Edit the widgets to configure whether data should be visible in the Vulnerabilities tab on the dashboards or whether they should impact device health: 

  • Enabled: Refer to the section of this article titled Dashboard Vulnerabilities Tab to learn about how NinjaOne presents this data.
  • Vulnerabilities impact device health. Refer to the section of this article titled 'Dashboard Health Status' to learn about how NinjaOne presents this data.

Refer to the following table for a description of each section. 

Vulnerability Management Section NameDefinition or Purpose
Vulnerabilities from NinjaOne PatchingConfigure the behavior of CVEs identified by NinjaOne Patch scanning.
Vulnerabilities from Vulnerability ImportersConfigure the behavior of CVEs imported from the Vulnerability Importer, CrowdStrike Spotlight, Qualys, Rapid7, Tenable, and Microsoft Defender integrations.
For documentation regarding the Vulnerability Importer app page, refer to Vulnerability Management in NinjaOne: Import Scan Data.
vulnerability_edit app.png
Figure 1: Configure vulnerability management options (click to enlarge)

Find Vulnerability Data on the Dashboards

You can view vulnerabilities from several locations on the system, organization, or device dashboards, including:

Dashboard Vulnerabilities Tab

This tab is available on the system, organization, and device dashboards. The page groups data by CVE, with each row of the dashboard's table representing a single CVE and the related devices. This data is filtered by the set of devices visible to the calling user, so the dashboard only contains counts of visible devices.

Refer to NinjaOne Vulnerability Management: Common Vulnerabilities and Exposure (CVE) Data to learn more about this tab.

vulnerabilities dashboard tab.png
Figure 2: Vulnerabilities dashboard tab

Dashboard Health Status

Move your cursor over icons next to the organization name on the system dashboard to view the number of devices affected by vulnerabilities and their risk levels. 

vulnerability icon tooltip.png
Figure 4: Device health icon tooltip (click to enlarge)

Click the numbered links in the Device health issues widget on the system or organization dashboard to view vulnerability details. You will navigate to the Devices search page, which NinjaOne filters to show the affected devices; from there, you can perform various device actions. Refer to our Find and Manage Endpoints from the Devices Search Pages article to learn more. 

vulnerability device health isssues.png
Figure 5: System dashboard → Overview → Device health issues (click to enlarge)

The device dashboard displays a Health Issues widget if an active vulnerability or threat is present. Click the action menu (ellipsis) on the right side of the health status and then click Navigate to vulnerabilities tab.

vulnerabilityhealth issues widet.png
Figure 6: Device dashboard → Overview → Health issues → Actions

Dashboard Activities Tab

From the system, organization, or device dashboard, open the Activities tab and select All. 

Select "Vulnerability" from the Activity type drop-down filter and then select an option from the Status drop-down filter to organize the data. 

activities_vulnerabilities.png
Figure 7: Vulnerability activities in NinjaOne

Additional Resources

Refer to the following resources to learn more about vulnerabilities and patching in NinjaOne: 

FAQ

Next Steps