I was surprised not to see an out-of-box alert for this. The impact could be quite severe if an engineer forgets to save an important change. NCM does a good job at identifying this but does not alert anyone. Periodic reports could be a workaround but it doesn't seem I can omit reports if no new conflicts are found.
Something I feel would be useful with the whole AI interest that is happening at present, how about having AI look at CVEs and then does a true review of them. At present the CVE alert within NCM looks at the IOS version that is running on a node, it doesn't take in to account the commands that need to be enabled for the…
We found that we are unable to add lines in between existing lines when we are editing NCM compliance rules. Currently we have to create a line at the bottom and copy and paste the strings to get them lined up. In the mockup screenshot below, we'd like the ability to be ability to add new lines (as noted by the green…
Recently I encountered an issue while pulling an NCM backup on Cisco devices, when we started looking at it, we realized these devices were configured to use chacha20-polhmac-sha2-256-etm@openssh.com, seems like SolarWinds NCM (even 2024.2) doesn't support this Encryption yet as mentioned in this link…
I'm facing a situation where some folks have MFA authentication behind their switches themselves. Which is a great thing, but means solarwinds needs to be able to accept entry of an MFA token into any scripts that are being run as part of the logon process. Today, you have a username and password. Naturally if this was a…
We needed to disable ssh-rsa as part of our network hardening and currently, ssh-ed25519 is the only public-key algorithm supported. PuTTY can connect to the device but NCM cannot as ssh-ed25519 is not supported.
In NCM under Configuration Management and Transfer Status, you can go look at what jobs you did, but nobody else can see them unless their granted NCM Administrator privileges. I'd like to have an option to allow lower end users/groups to view other jobs. I don't think this option should be tied to full admin privs.
Some time back, they supposedly "fixed" being able to set a Config-Archive directory so that it would be able to be set to a network drive using network credentials. All fine and great, but the broke our ability to change what path we might want it to be on a local drive. Saving to a local drive doesn't require…
We have had a few clients request that we use SSH Key based authentication against their devices and I didn't see an already existing Feature Request for this so here it is.
Please can we have the Nodes custom properties as filters for NCM Baseline? I dont want to search through 189 devices to pick out the 75 I want this applying to when they all have the same custom property, and are in the same group
It looks like you're new here. Sign in or register to get started.