Discovery may take time depending on the number of IP addresses provided. If the subnet contains a large number of IPs, the process could be slower. Try entering one or two known IP addresses to check if discovery is successfully identifying network devices.
Visit the Supported Network Devices page.
When a network device is flagged as “unsupported,” it indicates that the device's firmware or model is not currently recognized by Vulnerability Manager Plus for vulnerability detection. To address this issue, follow these steps:
1. Collect Device Details:
2. Retrieve sysObjectID:
snmpwalk -v2c -c [community_string] [device_ip] .1.3.6.1.2.1.1.2.03. Get Firmware Version via SSH:
show version for Cisco).4. Submit the Details to Support:
Yes, you can apply the same set of credentials as is to multiple devices. To avoid the tedious task of entering credentials for each device individually, Network Device support in VMP allows you to create common credentials and share them across multiple devices.
Since the discovery of network devices follows a credential-less approach, we attempt to retrieve the MAC address to identify the vendor (manufacturer) name. However, the MAC address is accessible only within the same LAN segment. When a response packet passes through multiple routers, the MAC address is not forwarded for security reasons. As a result, some devices listed in the managed devices table may initially show an unknown manufacturer name. This will be resolved once the network device scan is successfully completed.
Yes, it is supported for Cisco and Juniper devices via the VMP server console.
Agent installation is not needed for vulnerability scan in network devices. VMP server will be responsible for all the network devices operations. To perform a vulnerability scan on network devices:
Patch Manager Plus is a dedicated patch management solution from ManageEngine that focuses solely on identifying and deploying patches for operating systems and over 1100 third-party applications across Windows, macOS, and Linux environments. It is available in both cloud and on-premises versions, making it ideal for organizations seeking a straightforward, platform-agnostic patching tool. In contrast, Vulnerability Manager Plus offers a more comprehensive security solution that includes not just all features of patch management but also vulnerability scanning and detection, security configuration audits, and compliance reporting. It is available only as an on-premises solution and is better suited for organizations looking for deeper vulnerability insights and threat-based remediation. In short, while Patch Manager Plus is ideal for focused patching needs, Vulnerability Manager Plus serves as a full-fledged vulnerability management platform with integrated patching capabilities. To know more about the differences, refer to this page.
Currently, ManageEngine Vulnerability Manager Plus is available exclusively as an on-premises solution. A cloud-hosted version will be expected to be released by Q4 of 2025. Meanwhile, Endpoint Central, which includes both patch and vulnerability management feature as a part of its suite, is available as a cloud solution that you can use.
Refer to this page to know all the supported applications. Support is provided only for the mentioned.
As of now, ManageEngine Vulnerability Manager Plus (VMP) is available exclusively as an on-premises solution. On the other hand, Patch Manager Plus (PMP) offers a cloud-based version that provides comprehensive patch management across various operating systems and third-party applications. However, VMP and PMP Cloud are separate products, and there is currently no integration that allows VMP to be used as a SaaS solution with PMP Cloud as an add-on. For organizations seeking a cloud-based vulnerability management solution, use Endpoint Central, which includes both patch and vulnerability management feature as a part of its suite and is available as a cloud solution.
You can renew the license by filling the details in this page.
Yes. We offer support based on the OS version mentioned in this page. Irrespective of the hardware.
For each machine, under specific System summary -> Installed software tab, the installed software table will be available. Export for the same will be available in the right side top of the table.
Vulnerability checks require no specific configuration. Once the agents are installed, the next Vulnerability and Patch scan will automatically use the detection checks available from the Security Research Team's findings through a vulnerability database sync.
No. As of now we do not have provision for checking the files for detecting credentials and passwords.