Firmware vulnerability data from NIST vulnerability management can be synced with the DB of Network Configuration Manager. Users can set a time of schedule in order to sync data on a daily basis. When a schedule time is set, the synchronization of vulnerability data happens automatically at the exact time of schedule. Network Configuration Manager also allows you to edit/change the time of schedule as per your convenience. If no schedule time is set, sync happens every night at 2 a.m by default.
Note: For firmware vulnerability sync, we get data from Network Configuration Manager's ManageEngine database: https://ncm.nimbuspop.com. Customers must allow this domain in order to get those data.
If you wish to update the Vulnerability data in the NCM UI immediately instead of the scheduled time, you can give the "Update Now" option. When "Update Now" is given, the latest firmware security vulnerability data will be updated in the Network Configuration Manager's DB.
If your network is closed, you will not be able to update vulnerability database automatically using firmware vulnerability scanning with data from NIST vulnerability management. In that case, you can go for a manual import of vulnerability data.
|Versions supported||Checksum value||Download link|
|For versions 126309 & above||Gbxxtdt13HizjwnV8/p6s2pgG59t0hYfGMwJZsm3LbbEsicahMwNmjVXhjcDbYEf||Download file|
|For versions below 126309||BW3g72FWwR1aTxuw1GD+taAa4pxqYqJLvtj3QbvDNKxmNL88N2HmZa+dYVoTSj30||Download file|
Note: Modification of the imported dump by the customer may lead to corruption of vulnerability dump present in Network Configuration Manager.