Next Topic

Previous Topic

Book Contents

Patch / Update Management

Goal

Provide a routine patch / update management strategy for managed machines to include scanning and patching, patch approval policies, control over patching behavior and visibility of patch status/compliance for decision support and troubleshooting.

Overview

Kaseya Patch Management supports Microsoft Windows patching only. A machines patch status is detected through a Patch Scan, and patch deployment is accomplished through either Automatic Update, Initial Update, Machine Update or Patch Update scheduling. A Patch Scan detects patches that are missing and installed on a machine and so that decisions about how to proceed with the patching strategy can be made. Patches that are detected by a Patch Scan are presented in an array of Patch Policies which can then be used to control which patches are approved to be deployed to machines. Automatic Updates deploys approved patches to machines on a schedule and based on their Patch Policy membership. Initial Updates, Machine Updates, and Patch Updates provide one-off or manual scheduling capabilities to the overall patch strategy. To keep available patch status information about machines up to date so that deployment and approval decisions can be made related to patch, it is important to schedule the Patch Scans audits in some regularly recurring pattern. The deployment of patches on a regular basis is also critical to the goals of Patch Management, so scheduling Automatic Updates to take place is also important. Using the Patch Management content these recurring tasks can be scheduled. The Patch Management content also includes a set of Patch Policies to which different machines can be assigned either automatically or manually. With this Patch Management strategy, there must be easy ways to locate specific systems based on the details of patches installed and/or missing, quantity of missing patches, machines in certain Patch Policies and there must be ways of reporting and effectively acting on these groups of machines if needed. Additional content provided with the package offer some basic support for Macintosh Software Updates, and Linux Package Updates/Upgrades.

Policies

A set of Policies that apply recurring Patch Scan and Automatic Update schedules across the Windows machines supported within the IT infrastructure is provided. These policies enable the recurring detection of patches that are installed and missing across all machines as well as the scheduling of deployment of approved patches. Policies are also included to assign Windows servers and workstations to the appropriate Patch Policies and to support not patching certain machines or setting up a test group for deploying patches prior to a general approval and deployment of new patches. An additional policy that applies recurring Macintosh Software Update schedules across the Macintosh machines supported within the IT infrastructure is provided.

The policies included are located under [System].Core.Org Specific Policies.Patch / Update Management, and are described below.

Patch Approval/Denial Policies

Note: Patch approval/denial "policies" are a specialized type of policy in the Patch Management module that should not be confused with policies defined using Policy Management module. Policy Management policies have been created that specify predefined patch approval/denial policies.

A set of predefined Patch Policies is provided to control approval and denial of various Windows patches applicable to the supported Microsoft software and Windows operating systems.

Patch Policy Name

Description

zz[SYS] Deny Patching

Used for denying all patches in cases where machines must not be patched for particular reasons. The Default Approval Status for new patches of all Microsoft Security Classifications is set to Denied. See Managing Patch Policy Memberships for more information on how machines can be assigned to this Patch Policy.

zz[SYS] Server Patching

Used for approving and denying patches for Windows Servers. The Default Approval Status for new patches of all Microsoft Security Classifications is set to Pending Approval. All Windows Servers are made a member of this Patch Policy when Server Patch Management is enabled through Automated Systems Management.

zz[SYS] Test Patching

Used for approving and denying patches for machines that are to be used for testing patches prior to general deployment to Windows Servers and Workstations. The Default Approval Status for new High Priority Security and Critical Updates based on their Microsoft Security Classifications is set to Approved. All Windows Servers are made a member of this Patch Policy when Server Patch Management is enabled through Automated Systems Management. See Managing Patch Policy Memberships for more information on how machines can be assigned to this Patch Policy.

zz[SYS] Workstation Patching

Used for approving and denying patches for Windows Workstations. The Default Approval Status for new High Priority Security and Critical Updates based on their Microsoft Security Classifications is set to Approved. All Windows Workstations are made a member of this Patch Policy when Workstation Patch Management is enabled through Automated Systems Management.

Views

An array of predefined Views is provided which can be used in all aspects of IT service management and in support of the Patch /Update Management service. These Views provide the ability to filter machines across the system based on their patch configuration, quantity of patches missing, patch reboot status, and patch policy membership, and more. The following Views can be used on both reporting and operational activities.

View Name

Description

zz[SYS] Patch - Deny Patching Policy

Displays all machines assigned as members to the "zz[SYS] - Deny Patching" patch policy.

zz[SYS] Patch - Missing 10+ Approved Patches

Displays all machines that are missing 10 or more approved patches based on the machines patch policy memberships and and the approved patches within those policies.

zz[SYS] Patch - Missing 20+ Approved Patches

Displays all machines that are missing 20 or more approved patches based on the machines patch policy memberships and and the approved patches within those policies.

zz[SYS] Patch - No Policy

Displays all machines that are not assigned to any patch policy

zz[SYS] Patch - Pending Reboot

Displays all machines with a pending patch deployment related reboot

zz[SYS] Patch - Scan Failed

Displays all machines where the last patch scan failed for some reason

zz[SYS] Patch - Scan Not Scheduled

Displays all machines that do not have a patch scan scheduled

zz[SYS] Patch - Server Patching Policy

Displays all machines that are a member of the "zz[SYS] - Server Patching" patch policy

zz[SYS] Patch - Servers w No Policy

Displays all Server machines that are not assigned to any patch policy

zz[SYS] Patch - Test Patching Policy

Displays all machines that are a member of the "zz[SYS] Test Patching" patch policy.

zz[SYS] Patch - Windows Auto Update Enabled

Displays all machines with Windows Automatic Update Enabled based on what was detected during the last Patch Scan

zz[SYS] Patch - Workstation Patching Policy

Displays all machines that are a member of the "zz[SYS] - Workstation Patching" patch policy

zz[SYS] Patch - Workstations w No Policy

Displays all Workstations machines that are not assigned to any patch policy

Agent Procedures

Agent procedures are provided that perform customized automation in support of the Patch /Update Management IT service. These agent procedures are located under the System cabinet of the Agent Procedures > Schedule / Create page.