Automatic Approval Rules

Automatic patch approvals let you download and install common or critical patches as soon as they are detected, without manual review.

You can tailor automatic approvals to meet different customer needs. For example:

  • One customer may choose to automatically install all Microsoft patches except device drivers and tools on laptops and workstations.

  • Another customer may prefer a more cautious approach and automatically install only Microsoft Critical and Security updates, while reviewing other patches manually.

When adding or editing approval rules, you can specify the following filters:

  • KB (Knowledge Base)

    Identifies a Microsoft patch. Each KB number links to a Microsoft support article and can be used to filter and approve specific patches. Enter exact KB numbers only (no partial values). Leave the field blank to ignore this filter. To enter multiple KB numbers, separate them with a semicolon.

  • Keywords

    Filters patches based on words in the patch title. Leave the field blank to ignore this filter. To enter multiple keywords, separate them with a semicolon.

  • CVSS score

    Filters patches by vulnerability severity. You can specify a score range to show or approve patches that meet a defined risk threshold (for example, higher‑severity vulnerabilities). Enter decimal values only.

After adding automatic approval for patches to rules, patching can take place without further input from you, or waiting for your review. For information on the approval types definitions, see Approval Definitions.

By default, automatic approvals do not override existing approvals. They apply only to patches that have no current approval, that is, patches with a status of No Approval. You can choose to override existing approvals if required.

To override an existing approval rule:

  1. Select Configuration Patch Management.

  2. Select Automatic Approvals.

  3. Select the check box for the rule, then select Run Rule Now and Clear and Re-evaluate.

This will clear any existing approvals and replace them with the rule you are running.

When you approve a patch, the approval is processed in the background and may take time to complete. As a result, the N-able N-central screen may not immediately reflect your selection.

If Microsoft re‑issues a patch, Patch Management retains the existing approval status. This ensures that your defined approvals remain in effect without requiring you to re‑select or reset them.

To create automatic approvals, ensure that at least the following role permissions are assigned:

  • Patch Management: Patch Approval, Patch Configuration

  • Monitoring: Filters and Rules

Rules only execute in order if the targets are identical.
For example, if five rules target servers - windows and one rule targets servers - windows + exchange servers, running all six will result in the five rules executing in order, while the single rule will run independently.

Select target devices

When you create an automatic approval rule, you can choose which devices it applies to. On the Targets tab, select one or more device collections defined by filtering rules. To add a new device collection, add a new rule.

Set rule priority

Changing the order of automatic approval rules determines which rules take precedence. Reorder the rules by dragging and dropping them on the Automatic Approval Rules page. After you reorder the rules, you can re‑run them to update patch approvals for your customer devices and device groups. This updates which patches are rolled out and when. You can achieve a phased patch rollout by adjusting automatic approval rules over time and configuring approval delays.

How rule order and hierarchy work

Patch approvals ensure that only valid patches are installed on a device and help prevent issues or conflicts. Conflicts can occur when a device is included in multiple patching rules.

When conflicting patch approval statuses are applied to a device from either a rule or a device level approval, the system resolves them by using a strict approval hierarchy, as shown in the table below. To reduce conflicts and simplify management, it’s best to assign devices to a single patching rule .

Example: Automatic Approval workflow

This example shows how new patches move through the automatic approval rules workflow.

Example Scenarios

These examples show how automatic approval rules behave when they target the same devices compared to when they target different devices.