Patch Management for Windows
N-sight RMM’s Patch Management for Windows currently offers patch rules based on severity. In order to avoid sudden or accidental auto-upgrades to Windows 11, we will offer Windows 11 as a manual patch, so that it is fully in the MSP’s control. It means that once the patch is discovered on a device, it will show as ‘ignored’ regardless of policy. As the MSP you are then able to manually approve the patch at the time of your choosing.
We plan to add support for classification-based approval rules in N-sight RMM in the not-too-distant future, so that you will have additional options for upgrading endpoints to Windows 11.
To ensure you as the MSP are in control of how Patch Management for Windows will make the upgrade available to devices, we are making the following provisions:
- We have fully and successfully tested the Windows 10 to 11 upgrade in-house using the insider updates.
- When Microsoft releases the new version on October 5th, we will begin testing the upgrade in-house with the latest production build.
- We expect to release a Patch Management for Windows Engine (PME) update to add support once testing of the production build completes. This is expected to be later in October.
Threats remain amongst the most disruptive and damaging types of problem experienced in real-world networks today. Attackers target any exploits on unpatched computers in an attempt to compromise security by gaining access to the device itself and / or the network it is connect to (and the information both contain).
Failure to patch computers can soak up a large amount of time and resources both for the customer (through lost productivity as they wait on their devices becoming accessible again) and for the technician when remediating the problem and cleaning-up the affected systems.
As the number and variety of threats exponentially multiple, it becomes increasingly impractical, tedious and time-consuming to manually ensure the customers' networks have installed all of the latest patches from key software vendors without using effective tool to automate this process. Especially as the time taken between the discovery of an exploit and the release of a patch to close this threat reduces.
Using an effective patching solution is one of the most effective pro-active steps you can take towards reducing the customer's exposure to threats and minimizing the level of disruption they may experience with unpatched systems.
Patch Management for Windows provides an effective and efficient solution for Microsoft Windows and Office applications security patches (particular targets for attackers based on their almost ubiquitous presence) and popular non-Microsoft applications such as Adobe Reader, Google Chrome, Mozilla Thunderbird and more.
Patch Management for Windows cannot offer Office 365 or Microsoft Office updates as these are not provided via Windows Update. Please see the Microsoft article: Install Office Updates for update install information for these products.
Patch Management for Apple
To deploy verified third-party updates, use Run Managed Patch task.
To update the Apple OS version on your devices, see Update OS version on Apple devices.
To update App Store purchases on your devices, see App management.
What do you want to do?
- Review the Quick Start Guide
- Enable and Configure Patch Management
- View Patch and Vulnerability Information
- Read the Windows 10 supportability statement
- Manage Patches from the All Devices view on Individual or across Multiple Devices