We will be performing scheduled maintenance to our infrastructure. During this time, there will be a temporary downtime affecting some services.
What to Expect During the Maintenance
During the maintenance window, you can expect the following:
All devices will remain protected, and definition updates will continue. However, during this time, the following services will be unavailable:
Installation of MAV-BD
MAV-BD checks
Engine upgrades for MAV-BD
Running MAV-BD reports
Access to Quarantine
MAV-BD Dashboard Settings options and the N-sight Antivirus tab
Protection Policy screens
Running commands from the contextual menu
Database – Maintenance days
Region
Date
EU-Central
20.11.2025 02:00 AM EST / 06:00 AM UK / 08:00 AM Bucharest for a period of 6 hours
We appreciate your patience as we complete these infrastructure improvements. Device protection and definition updates will continue throughout the maintenance window.
Posted inN-sight|Comments Off on Advanced Notice: Infrastructure (DB) upgrade to N-sight Managed Antivirus – EU-Central
This release delivers powerful new capabilities, critical security enhancements, and long-awaited integrations designed to streamline operations, strengthen protection, and improve overall platform performance.
Whether you’re managing complex environments, integrating with ITSM platforms, or enhancing your security posture, N-central 2025.4 brings the tools and flexibility you need to stay ahead.
Highlights include:
Vulnerability Managementenhancements – Gain deeper threat context and smarter prioritization with exploit intelligence.
Asset Tags – Simplify device organization with flexible, centralized tagging.
Native HaloPSA & Autotask REST API Integration – Unlock seamless ITSM workflows and eliminate platform friction.
Asset Metrics – Access real-time and historical CPU and Memory usage directly in Asset View for faster troubleshooting and improved service quality.
We are pleased to announce the release of a new version of the Patch Management Engine. Due to the urgent need to accommodate Microsoft’s recent changes to patch titles, this version will directly launch to General Availability (GA) for both N-central and N-sight.
Microsoft Patch Title Changes
Microsoft has recently indicated potential modifications to the titles of patches. Consequently, we have implemented compensatory actions in PME to mitigate these structural changes.
Please note that any automatic approvals based on keywords may not function correctly in the future if they rely on the current title structure.
New format: YYYY-MM UpdateType (KBnnnnnnn) (FeatureUpdate.Build)
Support for the 25H2 Feature Update via Enablement Package
Changes have been made to allow users to detect and update to the 25H2 Feature Update using the Enablement Package.
Applies to users on 24H2 with the August Cumulative Update Preview Patch or later already applied.
Enablement Packages enable users to ‘switch on’ the 25H2 update with a small update and a reboot.
For users on earlier editions of Windows 11 or Windows 10, we will soon offer the ESD file route, which employs the OS switch technique, installing a new OS alongside the original.
Approvals.xml issues
We have addressed a problem where errors encountered when trying to connect to Microsoft’s Update servers could lead to unexpected content in the N-central approvals.xml file.
Supersedence improvements
We have improved the logic in our supersedence calculations related to installation dates.
Resolved Bugs Tagged to Support Cases
PMCM-10985: Additional improvements and fixes.
PMCM-10900: Addressed problems where errors encountered when connecting to Microsoft’s Update servers led to unexpected content in the N-central approvals.xml file.
PMCM-9229: Improved the logic in our supersedence calculations related to installation dates.
Application
Version Number
PME
2.13.6.5587
MSPPlatform
2.13.6.5093
PME.Diagnostics
2.13.6.5018
PME.ThirdPartyPatch
2.13.2.5023
Posted inN-central, N-sight|Comments Off on Patch Management Engine PME Update Version 2.13.6.5587 GA
We will be performing scheduled maintenance to our infrastructure. During this time, there will be a temporary downtime affecting some services.
What to Expect During the Maintenance
During the maintenance window, you can expect the following:
All devices will remain protected, and definition updates will continue. However, during this time, the following services will be unavailable:
Installation of MAV-BD
MAV-BD checks
Engine upgrades for MAV-BD
Running MAV-BD reports
Access to Quarantine
MAV-BD Dashboard Settings options and the N-sight Antivirus tab
Protection Policy screens
Running commands from the contextual menu
Database – Maintenance days
Region
Date
APAC
12.11.2025 07 AM EST / 12 PM UK / 02 PM Bucharest for a period of 6 hours
EU-Central
19.11.2025 02:00 AM EST / 06:00 AM UK / 08:00 AM Bucharest for a period of 6 hours
EU-West
25.11.2025 02:00 AM EST / 06:00 AM UK / 08:00 AM Bucharest for a period of 6 hours
US
27.11.2025 03:00 AM EST / 07:00 AM UK / 09:00 AM Bucharest for a period of 6 hours
We appreciate your patience as we complete these infrastructure improvements. Device protection and definition updates will continue throughout the maintenance window.
Posted inN-sight|Comments Off on Advanced Notice: Infrastructure (DB) upgrade to N-sight Managed Antivirus – APAC
We’re releasing a new version of the N-central Mac Agent today which contains security improvements. We have updated to the latest OpenSSL LTS version to address known vulnerabilities.
Posted inN-central|Comments Off on N-central Mac agent v1.13
As we continue the Public Previewfor Vulnerability Management, we’re excited to announce a major update to Vulnerability Management in N-central and N-sight, designed to help customers better prioritize and respond to threats.
This release introduces exploit intelligence directly into the platform, giving you immediate visibility into vulnerabilities that are actively being exploited in the wild. Alongside this, we’ve added deeper context for vulnerabilities, smarter asset classification, and performance improvements to increase responsiveness, especially in large environments.
What’s New
CISA Known Exploited Vulnerabilities (KEV)
Vulnerabilities now display indicators for Known Exploits and Known Ransomware, sourced from https://www.cisa.gov/known-exploited-vulnerabilities-catalog. This enables faster prioritization by highlighting threats that are currently being exploited in the wild, helping you focus on what matters most.
Each detected vulnerability with a Common Weakness Enumeration identifier now includes a link to https://cwe.mitre.org for that CWE, offering insight into the underlying software weakness. This helps teams understand the root cause of vulnerabilities, assess systemic risks, and improve long-term security posture.
Server/Workstation Role Indicator
Within Vulnerability Managemen, endpoints now display a typical OS role (Server or Workstation) based on their associated operationg system. This allows for smarter prioritization where critical vulnerabilities on servers can be addressed first, reducing risk to core infrastructure and improving operational resilience.
Improved CVE Details Overlay
Clicking on a CVE hyperlink now opens a redesigned Overlay with a direct link to the CVE webpage and detailed CVSS breakdowns, Threat Information, and Affected Assets. This provides deeper context for each vulnerability, helping you assess severity and exploitability without leaving the platform.
Fixes
Database Optimization
We’ve reduced contention on the Asset/Vulnerability mapping view, resulting in faster load times and improved responsiveness in the All Detections and By Vulnerability views. This ensures a smoother experience when navigating large datasets.
Default Filtering for Performance
A new default filter now focuses on Critical and Important vulnerabilities. For large environments, we also recommend removing the Resolved threat status to further reduce load times and surface the most actionable issues.
Have questions or feedback? Reach out to our support team or use your usual communication channels—we’re here to help and always listening.
Posted inN-central, N-sight, Vulnerability Management|Comments Off on Known Exploit Info for 3P Apps Now Available in Vulnerability Management for N-Central and N-Sight
Please note that from Wednesday 5th November the old customer portal URL will no longer be available following the new customer portal release in April.
We thank all the partners who moved their customers to use the new portal.
For MSP Manager partners who still have customer users accessing the old portal URL, they will reach a page which will advise them to contact you to receive a new individual customer portal URL. These custom URLs can be created via Settings > Portal > General > Portal URL Prefix, as seen below.
We are pleased to announce new enhancements to the Customer Management module with the option to enforce DANE (DNS-Based Authentication of Named Entities) validation for the inbound email flow.
N-able considers various features and functionality prior to any final generally available release. As such, comments given in this forum are not (nor should they be interpreted to be) a commitment from N-able that it will deliver any specific feature or, if it delivers such feature, any time frame when that feature will be delivered. N-able is always trying to improve and enhance its products. All discussions herein are based upon product team current interests, and product team plans and priorities can change at any time.
You must be logged in to post a comment.