Already a NinjaOne customer? Log in to view more guides and the latest updates.

NinjaOne Vulnerability Management: Getting Started with Configuration and Setup

Topic

This article demonstrates how to view vulnerability data within NinjaOne and identify recommended actions.

The workflow described in this article reflects product improvements contained in our latest release. For the previous version, refer to the PDF document attached to the article's footer.

Environment

NinjaOne Vulnerability Management

Description

Vulnerability Management for networks and systems is an ongoing, iterative process that requires continuous attention and adaptation to emerging threats and vulnerabilities. It's a critical component of an organization's overall cybersecurity strategy, helping to protect assets and data from potential breaches and attacks.

The NinjaOne Vulnerability Management application in NinjaOne helps you identify and remediate known Common Vulnerabilities and Exposures (CVEs) on managed endpoints.

Select a category to learn more:

Activate the Vulnerability Management Feature

Access the application from AdministrationAppsInstalled. Select the NinjaOne Vulnerability Management application and activate it. 

Edit the widgets to configure whether data should be visible in the Vulnerabilities tab on the dashboards or whether they should impact device health:

  • Status is Enabled: Refer to the section of this article titled Dashboard Vulnerabilities Tab to learn about how NinjaOne presents this data.
  • Impact device health is Yes. Refer to the section of this article titled Dashboard Health Status to learn about how NinjaOne presents this data.

Refer to the following table for a description of each section. 

Vulnerability Management Section NameDefinition or Purpose
NinjaOne PatchConfigure the behavior of CVEs identified by NinjaOne Patch scanning.
Real-Time Software AssessmentConfigure behavior of CVEs identified by the NinjaOne Real-Time Software Assessment. As software changes on devices, the associated Common Vulnerabilities and Exposures (CVEs) update automatically, without endpoint impact. Refer to Vulnerability Management: Real-time Software Scanning Assessment Overview for more information.
vulnerability_edit general settings.png
Figure 1: Configure vulnerability management options (click to enlarge)

Find Vulnerability Data on the Dashboards

You can view vulnerabilities from several locations on the system, organization, or device dashboards, including:

Dashboard Vulnerabilities Tab

This tab is available on the system, organization, and device dashboards. The page groups data by CVE, with each row of the dashboard's table representing a single CVE and the related devices. This data is filtered by the set of devices visible to the calling user, so the dashboard only contains counts of visible devices.

Refer to

Figure 2: Vulnerabilities dashboard tab

Dashboard Health Status

Move your cursor over icons next to the organization name on the system dashboard to view the number of devices affected by vulnerabilities and their risk levels. 

Figure 3: Device health icon tooltip (click to enlarge)

Click the numbered links in the Device health issues widget on the system or organization dashboard to view vulnerability details. You will navigate to the Devices search page, which NinjaOne filters to show the affected devices; from there, you can perform various device actions. Refer to our

Figure 4: System dashboard → Overview → Device health issues (click to enlarge)

The device dashboard displays a Health Issues widget if an active vulnerability or threat is present. Click the actions menu and then click Navigate to vulnerabilities tab.

vulnerabilityhealth issues widet.png
Figure 5: Device dashboard → Overview → Health issues → Actions

Dashboard Activities Tab

From the system, organization, or device dashboard, open the Activities tab and select All. 

Select Vulnerability from the Activity type drop-down menu and then select an option from the Status drop-down menu to organize the data. 

activities_vulnerabilities.png
Figure 6: Vulnerability activities in NinjaOne

Additional Resources

Refer to the following resources to learn more about vulnerabilities and patching in NinjaOne: 

FAQ

Next Steps