Home » Frequently Asked Questions (FAQ)
 

Frequently Asked Questions (FAQ)

Comprehensive Coverage

Where do we procure the vulnerability data for different vendors?

Our internal researchers procure vulnerability information for Windows Operating systems and other Microsoft products from Microsoft's official security guidance page, and for different Linux distros from the official security advisories of the respective vendors. For third-party products, we obtain the vulnerability data from NVD and CVE details, and the respective vendors' official security advisory pages.

What are the SLAs for new CVEs and zero-days
  • For CVEs, support is provided within 24 hours of its disclosure.
  • For zero-days, support is provided within 7 hours of its disclosure.
How do we arrive at the recommendations for security misconfigurations?

Our internal researchers procure information regarding security misconfigurations from recommendations in STIG and CIS, and also from respective vendor websites.

What is the source of the CIS benchmarks that Endpoint Central uses for its audits?

All the CIS benchmarks that are used for Endpoint Central's audits are arrived at from the official CIS website.

What are the system requirements for the Central server?

Any of the Windows computers in your network with the requirements mentioned here can be hosted as your Central server.

How to identify servers? Are all Linux machines considered servers?

Currently, if the operating systems meet any of the following criteria, we consider them as server machines:

  • If the operating systems' name contains the keyword "server"
  • If the machine with Red Hat Enterprise Linux OS has a Server subscription
  • If the machine has Oracle Linux OS

We recommend purchasing server licenses for any Linux machine when deploying them as servers within the organization.

How to identify servers from the Endpoint Central web console?

Navigate to Agent --> Computers in the console interface. Create a filter for Operating System with tags "server" and "Oracle". The Red Hat Enterprise Linux OS server machines cannot be identified using the web console as its subscription has to be checked.

 

identify servers

How many servers can be managed with the free edition?

The free edition allows management of any number of servers, as long as the total number of endpoints does not exceed 25.

Vulnerability Detection and Remediation

How to adjust endpoint scan schedules for specific endpoints, including changing scan times and frequency to off-hours?

The product automatically scans the endpoints once in every 90 minutes (called the Refresh period), during the startup and during agent installation. You cannot configure scheduling a scan in the product. You can also initiate a manual scan via Agent Tray icon -> Scan -> Initiate Patch Scan or via product console by navigating to Systems -> Scan Systems. Here choose the computers to be scanned and click Scan Systems. To scan all the systems, click Scan All. Please note that this option is limited to a maximum of 100 computers.

Does Endpoint Central include Vulnerability Management for network LAN/WAN?

Endpoint Central does not support scanning network devices for vulnerabilities. This capability is available exclusively in the standalone Vulnerability Manager Plus product.

Why are patches also displayed under the software vulnerabilities tab?

Under software vulnerabilities, patches are displayed as a resolution to fix a known threat or vulnerability.

How does Endpoint Central enumerate vulnerabilities to prioritize response?

Common Vulnerability Scoring System (CVSS v3.0) is used to assess the severity of vulnerabilities based upon the ease of exploit and the approximated potential of impact. Scores range between 1 and 10 with 10 being most severe. Additionally patches can be looked up using their CVE ID

How are web servers and their vulnerabilities detected?

We detect web and database server vulnerabilities by scanning listening ports and identifying the application and its version. Vulnerabilities are identified by comparing the detected version to the vulnerability database. For further clarification on vulnerability applicability, please contact the vendor.

  NOTE: Web/database servers will be detected only when they are actively running.
Does Endpoint Central support vulnerability detection and remediation for cURL?

Endpoint Central does not currently support patching or remediation for cURL-related vulnerabilities as of now. If you wish to see this supported as a part of future release, kindly fill out the feature request form.

How can I add patches for applications that aren't supported by the product?

To add patches for applications that aren't supported by the product, please fill out the feature request form. This will allow us to understand your needs and potentially incorporate support for those applications in future updates. Your feedback is valuable in helping us enhance our offerings to better serve your needs.

How are web server and its vulnerabilities detected for Endpoint Central and other ManageEngine products?

For Endpoint Central and other ManageEngine products, we use CVE analysis data from our internal security experts to exclude non-applicable vulnerabilities and display only applicable ones. In the initial days after a CVE is released, vulnerabilities may be detected, but if our analysis determines they are not applicable, they will be removed in subsequent scans after a database sync.

What is the difference between Endpoint Central and Vulnerability Manager Plus?

Endpoint Central and Vulnerability Manager Plus are two distinct products from ManageEngine designed for different IT management needs. Endpoint Central is a unified endpoint management (UEM) solution focused on managing and maintaining endpoints throughout their lifecycle. It offers features such as patch management, software deployment, asset tracking, remote troubleshooting, configuration management, and mobile device management. It is ideal for IT teams looking to centrally manage a large number of diverse devices. On the other hand, Vulnerability Manager Plus is a security-focused solution that specializes in identifying, prioritizing, and remediating vulnerabilities across the network. It provides advanced vulnerability scanning, risk-based prioritization using CVSS scores and threat intelligence, exploit detection, configuration audits, and compliance reporting. While both products include patch and vulnerability management capabilities, Endpoint Central also provide more endpoint administration features, whereas Vulnerability Manager Plus only focusses on vulnerability detection and risk mitigation.

Does the product support Windows updates and where does it download them?

Yes it support Windows updates too. Patches that need to be installed are directly downloaded from the respective vendors' web sites and stored in the Endpoint Central server before deploying them to computers in the network. The agents copy the required patch binaries from this server.

Comply with Specific CIS and STIG Rules

How do I track the status of security configuration deployments?

You can track the status of deployed security configurations from Deployments> Security configurations and re-deploy the failed deployments from here.

Based on what criteria shall I filter misconfigurations?

You can filter the Security Misconfigurations on the basis of:

1. Misconfigurations: Misconfiguration Name, Category, Severity, Remediation Availability and Post Deployment Issue.

2. Systems: Computer Name, Platform, Domain Name, Branch Office, Custom Group, Operating System, Language and Agent Live Status.

You can filter the Web Server Misconfigurations on the basis of:

1. Misconfigurations: Misconfiguration Name, Category, Severity, Web Server Name and DB Server Name.

2. Systems: Computer Name, Platform, Domain Name, Branch Office, Custom Group, Operating System, Language and Agent Live Status.

Which platform does the security configuration management feature currently support?

The product currently supports security configuration management only for systems running on Windows OS

How can I revert the applied secure configurations?

To revert the misconfiguration fixes applied through our product, create a Manual Deployment task using a dummy patch, say Disable Updates Patches. You can search and select them from the Supported Patches view. Then, configure a deployment policy where the necessary custom script to revert the configuration is added as a pre- or post-deployment activity. Select this policy in the manual deployment task to deploy that dummy patch.

Compliance

What happens when a system is quarantined?

When a system is quarantined, it is isolated from the network to prevent potential security risks. Users will be notified, and administrators can take necessary actions to remediate compliance issues.

How patching happens in a system that is quarantined from the network?
  • For On Premises, patches will be downloaded from server as server to agent communication will there irrespective of the system quarantine status so patching process will happen in usual manner.
  • For Cloud agents, patches will be downloaded directly from the vendor websites. If a system is quarantined, while downloading patches, the URL from which the patches need to be downloaded will be temporarily allowlisted. Once the patch is downloaded from that website, the URL will be automatically blocklisted by the quarantine policy.
Can quarantined systems be restored to normal operation?

Yes, once the compliance issues are addressed, administrators can lift the quarantine, allowing the system to resume normal operations.

How often should audits be conducted?

Regular audits are recommended, with the frequency determined by organizational policies. Monthly or quarterly audits are common, but more frequent daily checks may be necessary for highly dynamic environments.

Can the System Quarantine Policy be customized for specific needs?

Absolutely! The policy is highly customizable to accommodate the unique requirements of your organization. Administrators can define rules tailored to specific compliance standards and security policies.

How to cross-check CIS Compliance rule status from the console?
The console provides detailed information for each rule — including pass/fail/error status — along with the actual value found on the machine and the expected CIS-compliant value. This allows users to verify and troubleshoot compliance issues effectively
Does CIS Compliance support database applications?
Support for database applications is part of our roadmap and will be included in a future release.
User-based rules are failing after configuration. Why?
These rules will only pass if all user accounts on the machine are configured correctly as per the rule's requirements.
How to fix CIS rule failures?
Fixes can be implemented through Domain GPO. Each rule includes a “How to Fix” section outlining the necessary steps for remediation.
Is STIG supported by the Compliance feature?
STIG is not currently supported in the Compliance feature, but it is on our roadmap. For now, customers can use CIS benchmarks compatible with STIG as a workaround. Search for CIS with STIG benchmarks in that Compliance section.
I fixed a policy, but it still shows as non-compliant. What should I do?
Ensure that the GPO is applied on the client machine. Run gpupdate /force to sync policies, then trigger a compliance scan. Also, verify the setting is reflected in the local GPO. If the rule still fails, please share the agent logs with our support team for further investigation.

Vulnerability Audit & Reports

Is there a feature to pull local logs of failed deployments from Endpoint Central?
Can I create a report for systems that need patches older than 30 days?
How do I track the status of High-risk software uninstallation?

You can track the status of high-risk software uninstallation from Deployments> Software uninstallation.

How to download a vulnerability report?

By navigating to Report -> Scheduled Report, you can schedule a specific vulnerability report. Alternatively, an export option is available in the top right corner of each specific table, allowing you to export the table data.

How can I create a custom report for missing patches and detected vulnerability that includes computer names and organizes the data by environment?

In the Detailed Software Vulnerabilities view, you can use Advanced Filters to filter machine vulnerabilities by the 'Patch Availability' criteria set to 'Not Available,' and then export the report.

Exceptions

How long will it take for Dynamic CG exclusion to reflect?

Static group exclusion happens immediately, whereas for Dynamic groups, it reflects after the next scan.

Roadmap

The below-mentioned features will be released with future updates. If you have other feature requests other than the ones mentioned below, please fill out this form.

Does Endpoint Central provide visibility into previously fixed vulnerabilities?
Does Endpoint Central support Vulnerability Management for macOS devices?
Is Network Devices' Firmware Vulnerability Management supported in Endpoint Central?
Is CIS Compliance customization and customizing the misconfiguration rules a planned feature in Endpoint Central?
Yes, CIS Compliance customization and customizing the misconfiguration rules (such as customizing the password length policies) are part of our product roadmap for Endpoint Central. This feature is expected to be released by early 2026. We understand that organizations have unique security requirements, and we are committed to offering flexibility in customizing CIS benchmarks (including auditing for the deprecated CIS policies) or any misconfiguration rules . If you have specific customization needs, we encourage you to share them through our roadmap form.
Does Endpoint Central support CIS Compliance Deployment?
Currently, we provide manual resolutions for CIS compliance checks in Endpoint Central. By implementing these resolutions, you can address and rectify failed rules identified in CIS audits. We're actively working on the CIS Compliance Remediation process (including automated remediation). We are actively working on this feature and will include it in a future release. If you have specific requirements or would like to contribute to the development of this feature, please fill out our roadmap form.
How long does Endpoint Central take to support new CIS benchmarks?
Endpoint Central generally provides support for new CIS benchmarks within one week of their release on the CIS website. This timeline aligns with our swift SLA to ensure your systems remain up-to-date and compliant. To see all the supported CIS benchmarks by Endpoint Central refer to this page. If the compliance policy you are looking for isn’t listed, feel free to submit a request through our roadmap form.
Does Endpoint Central plan to offer more extensive Dashboard and Reports Customization in the future?
Yes, Dashboard and Report Customization feature is a part of our future roadmap. We are actively working on this to release this as a part of our upcoming releases. If you have specific requirements or use cases for dashboard or report customizations, please submit them through our roadmap form, and we’ll make sure they are taken into account.
Will Endpoint Central support Risk Score calculation and Prioritization of threats in future updates?
Yes, Risk Score calculation and Prioritization are part of our future roadmap. We are actively working on enhancing these capabilities to help you prioritize vulnerabilities based on their severity and potential impact. If you have specific requirements or use cases for risk score and prioritization, please fill out our roadmap form, and we’ll make sure they are considered as we develop this feature.