Patch Management

RMM’s Patch Management currently offers patch rules based on severity. In order to avoid sudden or accidental auto-upgrades to Windows 11, we will offer Windows 11 as a manual patch, so that it is fully in the MSP’s control. It means that once the patch is discovered on a device, it will show as ‘ignored’ regardless of policy. As the MSP you are then able to manually approve the patch at the time of your choosing.

We plan to add support for classification-based approval rules in RMM in the not-too-distant future, so that you will have additional options for upgrading endpoints to Windows 11.

To ensure you as the MSP are in control of how Patch Management will make the upgrade available to devices, we are making the following provisions:

  • We have fully and successfully tested the Windows 10 to 11 upgrade in-house using the insider updates.
  • When Microsoft releases the new version on October 5th, we will begin testing the upgrade in-house with the latest production build.
  • We expect to release a Patch Management Engine (PME) update to add support once testing of the production build completes. This is expected to be later in October.

Please review our Blog Post for further information and updates.

Threats remain amongst the most disruptive and damaging types of problem experienced in real-world networks today. Attackers target any exploits on unpatched computers in an attempt to compromise security by gaining access to the device itself and / or the network it is connect to (and the information both contain).

Failure to patch computers can soak up a large amount of time and resources both for the customer (through lost productivity as they wait on their devices becoming accessible again) and for the technician when remediating the problem and cleaning-up the affected systems.

As the number and variety of threats exponentially multiple, it becomes increasingly impractical, tedious and time-consuming to manually ensure the customers' networks have installed all of the latest patches from key software vendors without using effective tool to automate this process. Especially as the time taken between the discovery of an exploit and the release of a patch to close this threat reduces.

Using an effective patching solution is one of the most effective pro-active steps you can take towards reducing the customer's exposure to threats and minimizing the level of disruption they may experience with unpatched systems.

Patch Management for Windows provides an effective and efficient solution for Microsoft Windows and Office applications security patches (particular targets for attackers based on their almost ubiquitous presence) and popular non-Microsoft applications such as Adobe Reader, Google Chrome, Mozilla Thunderbird and more.

Patch Management does not support Office 365 updates.

For Mac computers use the Run Managed Patch Automated Task to install Patches. Patch Management (N-able) engine 1.1.10 also introduced the ability to install Windows drivers.

Agent 8.5 introduced Patch Management (based on technology licensed from LanGuard) with this enhanced in Agent 10.8.0 RC with a new engine (based on technology licensed from N-able).

What do you want to do?