Case # - 00285679 Currently, NCM job output can be received on mail with it's output in mail body. Also, Job log file is in Notepad format. If there is any kind of request that we need to share Audit report with Customer or Security team, it should be in a format so that can't be changed while communication. As per TAC…
Backup Palo Alto Configuration with SolarWinds NCM Backup PaloAlto Configuration | Con Login in your Paloalto device and navigate to Device > Setup > Operations > SNMP Setup. After that you need to Setup your SNMP here, here i am going to use SNMPv3, enter your SNMP name and enter SNMP parameters like below screenshot.…
I was surprised not to see an out-of-box alert for this. The impact could be quite severe if an engineer forgets to save an important change. NCM does a good job at identifying this but does not alert anyone. Periodic reports could be a workaround but it doesn't seem I can omit reports if no new conflicts are found.
Something I feel would be useful with the whole AI interest that is happening at present, how about having AI look at CVEs and then does a true review of them. At present the CVE alert within NCM looks at the IOS version that is running on a node, it doesn't take in to account the commands that need to be enabled for the…
We found that we are unable to add lines in between existing lines when we are editing NCM compliance rules. Currently we have to create a line at the bottom and copy and paste the strings to get them lined up. In the mockup screenshot below, we'd like the ability to be ability to add new lines (as noted by the green…
Recently I encountered an issue while pulling an NCM backup on Cisco devices, when we started looking at it, we realized these devices were configured to use chacha20-polhmac-sha2-256-etm@openssh.com, seems like SolarWinds NCM (even 2024.2) doesn't support this Encryption yet as mentioned in this link…
I'm facing a situation where some folks have MFA authentication behind their switches themselves. Which is a great thing, but means solarwinds needs to be able to accept entry of an MFA token into any scripts that are being run as part of the logon process. Today, you have a username and password. Naturally if this was a…
We needed to disable ssh-rsa as part of our network hardening and currently, ssh-ed25519 is the only public-key algorithm supported. PuTTY can connect to the device but NCM cannot as ssh-ed25519 is not supported.
In NCM under Configuration Management and Transfer Status, you can go look at what jobs you did, but nobody else can see them unless their granted NCM Administrator privileges. I'd like to have an option to allow lower end users/groups to view other jobs. I don't think this option should be tied to full admin privs.
It looks like you're new here. Sign in or register to get started.