N-central 2025.2.1 Generally Available 

We are pleased to make N-central 2025.2.1 Generally Available! This interim release update enhances Asset View with a new resizable Asset Details Panel to improve information visualization, delivers additional support for application integrations, security and compliance, and contains essential bug fixes that address usability, security and performance.  

Please use the following links for Release Notes and Download: 

Detailed Release Notes 

Download link(login required) 

Read more: N-central 2025.2.1 Generally Available  Continue reading
Posted in N-central | Comments Off on N-central 2025.2.1 Generally Available 

Launching Tomorrow (May 21st): Scalable Custom Detection Rules for Adlumin Users

We’re thrilled to announce a major upgrade to the Adlumin Partner Console: Global Custom Detection Rules—available starting May 21st .

Continue reading
Posted in Adlumin | Comments Off on Launching Tomorrow (May 21st): Scalable Custom Detection Rules for Adlumin Users

Patch Management Engine (PME) 2.13.1 GA

We’re pleased to announce that a new version of PME will be released today for both N-sight and N-central.

This release addresses the issue where ESU updates are detected on devices where they are not supported and then fail to install.

Within the update we have implemented a detection mechanism to verify if an OS is licensed for Extended Support by querying WMI. If no license is found, we will not provide the extended support updates to the device.

Posted in N-central, N-sight | Comments Off on Patch Management Engine (PME) 2.13.1 GA

Release Take Control – Linux Viewer 7.44.07 – Bug Fix (Rebuilt)

We’ve issued a rebuild of the Linux Viewer 7.44.07 to fix a crash issue reported by some partners on newer Ubuntu distributions.
While the version number remains the same, the internal build has been updated to resolve this issue.
If you’re experiencing crashes on Linux after installing the Viewer, please download and install the updated build below.

What’s Fixed

  • Resolved an issue where the Linux Viewer crashed continuously after installation on some systems (e.g. Ubuntu 24.04.2).
  • Issue now resolved — please re-download and reinstall the updated build below.

Download Links

Installation Instructions

  • README.txt file is inside the zip
  • Change the permissions of the scripts to restrict installation to admins: sudo chmod +x *
  • Run the installation script for N-central: installNcentral.sh, and for N-sight: installNSight.sh
  • Register the protocol to ensure the browser can open the Viewer when a session is launched: protocolRegister.sh

Uninstallation Instructions

  • Run the uninstall script: For N-central: UninstallNCentral.sh

Posted in Take Control | Comments Off on Release Take Control – Linux Viewer 7.44.07 – Bug Fix (Rebuilt)

New Query Functionality for Adlumin Windows Agent Reinstall

This communication serves as a follow-up to the Tuesday May 13th update “ACTION REQUIRED: UPDATED- Potential Adlumin Windows Agent Reinstall.”

Continue reading
Posted in N-sight | Comments Off on New Query Functionality for Adlumin Windows Agent Reinstall

Risk Intelligence 10.1

We’re pleased to announce an upcoming release for N-able Risk Intelligence, scheduled for delivery starting from Tuesday, May 13, 2025. 
This is a maintenance release to address issues identified in Risk Intelligence 10.0.

Bug fixes:

  • RI-3510 – Issue with conditions applied to reports not saving correctly.
  • Addressed internal bug fixes
  • Addressed issues related to SSO logins

Release Schedule:

  • N-able Risk Intelligence (standalone) Europe – Tuesday, May 13, 2025, between 09:00 and 11:00 UTC
  • N-able Risk Intelligence (standalone) APAC and US – Wednesday, May 14, 2025, between 09:00 and 11:00 UTC
  • N-able Risk Intelligence (integrated into N-sight RMM) all regions – Thursday May 15, 2025, between 09:00 and 11:00 UTC

There may be brief interruptions in service during the release timeframes.

Posted in N-sight, Risk Intelligence | Tagged , | Comments Off on Risk Intelligence 10.1

ACTION REQUIRED: UPDATED- Potential Adlumin Windows Agent Reinstall

Reminder: This event is NOT a security incident.

During an operational incident on May 9th, Adlumin experienced an unexpected system outage that caused some Windows agents to automatically uninstall. Uninstalled Adlumin Windows Agents require re-installation to restore monitoring and protection.

The following two updates may require additional action on your part:

Continue reading
Posted in Adlumin | Comments Off on ACTION REQUIRED: UPDATED- Potential Adlumin Windows Agent Reinstall

Action Required: Potential Adlumin Windows Agent Reinstall

  • Outage Identified: May 9, 2025 15:30:44 UTC
  • System Restored: May 9, 2025 17:52:34 UTC

This event is NOT a security event and NOT security related. 

During an engineering unit test today, we experienced an unexpected system outage that may have caused Windows agents to automatically uninstall from your environment. An Adlumin Windows agent re-installation could be required to restore monitoring and protection.

No other data inputs are affected like API’s, Syslog streams, Linux, or MAC endpoints.  

Continue reading
Posted in Adlumin | Comments Off on Action Required: Potential Adlumin Windows Agent Reinstall

Recommended Configuration Change to Mitigate a Potential Attack Bypassing SentinelOne EDR.

To improve control and security around Windows Agent upgrades and downgrades, we recommend enabling Local Upgrade Authorization. Turn it on for your Sites in the Management Console.

Why It Matters

Local Upgrade Authorization acts as a safeguard when Windows Agents are upgraded or downgraded locally. When this setting is enabled for a Site, local upgrade actions are only allowed during approved timeframes and if the Site has been authorized in advance. If these conditions aren’t met, the upgrade or downgrade attempt will be blocked — helping prevent unauthorized or unintended changes.

This is especially useful in environments where Agents are deployed or updated using tools like SCCM, Intune, N-Sight, N-Central or Group Policy, offering an added layer of protection and reducing the risk of accidental or unmanaged updates.

Key Details

  • Available for Windows Agent versions 22.3+
  • Only supported with SentinelOneInstaller EXE packages
  • MSI installers are not supported — attempts using them will fail
  • Applies to upgrades done via:
    • Double-clicking the installer
    • Running it from the command line
    • Using deployment tools

How to Get Started


Local Upgrade Authorization can be turned on at Account, Site or Group level from the Management Console. It is recommended to enable this setting for all non inherited policies. Once enabled, upgrade windows and Site-level authorization must be configured for local actions to succeed.
To determine if a policy is inheriting or not, and enable the setting:

1. At the top left of the Console, click the arrow to open the Scopes panel and select a scope, either Account, Site or Group.
2. In the Sentinels toolbar, click Policy.
3. If the icon at the top of the policy says Inhertied from global | account | site default policy, this policy is inherited and you do not need to make a change.
4. If the icon at the top of the policy says Last modified <time> ago, this policy is not inherited. In the Agent settings, set Local Upgrade/Downgrade: Online Authorization to ON.

As it may be a time-intensive process to enable this setting across all non-inherited policies, N-able has created a script which will automate this process. Click EDR Enable Online Authorization to download the script package containing the PowerShell script and instruction PDF.

Please refer to the ⁠documentation on enabling Local Upgrade Authorization.

Additional Recommendation:

To further enhance your security, we advise updating all EDR agents to the latest version. Utilising the auto-upgrade functionality can ensure smooth and timely updates. For more details, please refer to our updated documentation.

Please note:

Enabling the Upgrade authorization modifies the approval process within the Management Console, making it necessary for approvals to be in place before local upgrades can occur. This increases accountability and auditability in upgrade processes.

Activating local upgrade authorization might affect automated scripts that perform upgrades or downgrades, especially those using tools like SCCM or similar deployment mechanisms. As these scripts traditionally execute upgrades without additional prompts, requiring authorization could necessitate script modifications.

Posted in EDR, N-central, N-sight | Comments Off on Recommended Configuration Change to Mitigate a Potential Attack Bypassing SentinelOne EDR.

Patch Management Engine (PME) 2.13.1RC

We’re pleased to announce that a new version of PME will be released to RC today, accessible exclusively through the N-central RC patch profile option until it reaches General Availability.

This release addresses the issue where ESU updates are detected on devices where they are not supported and then fail to install.

Within the update we have implemented a detection mechanism to verify if an OS is licensed for Extended Support by querying WMI. If no license is found, we will not provide the extended support updates to the device.

Posted in N-central | Comments Off on Patch Management Engine (PME) 2.13.1RC