Skip to main content

System Requirements

To use the Software Vulnerability Manager console, your system should meet the following requirements:

RequirementDescription
Monitor ResolutionMinimum resolution of 1280 x 1024
BrowserInternet Explorer 11 or higher
Note: Scan results can also be viewed from other browsers.
Internet ConnectionInternet connection capable of connecting to http(s)://svm_server_name/.
Sites to WhitelistYou are required to allow-list the following sites:
  • The http(s)://svm_server_name/ should be allow-listed in the Firewall/Proxy configuration.
  • https://sync.secunia.com​ should be allow-listed for SSL inspection as the CSI server doesn’t trust the packages that are not signed by our server.
Cookie SettingsThe following cookie settings are required:
  • First-party cookie settings at least to prompt (in Internet Explorer)
  • Allow session cookies
PDFA PDF reader is required.
Allow-listed in the Firewall/Proxy configurationThe following addresses should be allow-listed in the Firewall/Proxy configuration:

New CRL distribution URLs:
  • http://*.amazontrust.com
  • http://s.ss2.us
If you require explicit URLs then allow below URLs:
  • http://crl.r2m02.amazontrust.com
  • http://crl.rootca1.amazontrust.com
  • http://crl.rootg2.amazontrust.com
  • http://s.ss2.us
Software Vulnerability Manager uses Amazon Certificate Authority for TLS security certificates. Amazon can change their certificate revocation list - crl - occasionally.

Amazon root certificates are trusted by default by most common browsers, including Google Chrome, Microsoft Internet Explorer and Microsoft Edge, Mozilla Firefox, and Apple Safari.

For the latest certificate revocation lists and firewall rules, refer to Amazon ACM documentation .

Product URLs:
  • https://csi7.secunia.com
  • https://agent.csi7.secunia.com
  • https://dl.csi7.secunia.com
  • https://*.secunia.com
  • https://*.flexera.com
Timestamp URL:
  • http://timestamp.digicert.com
Note: We recommend allowing domain name (timestamp.digicert.com).

Before starting Software Vulnerability Manager, the following should also be present: