Unpatched software leaves your network vulnerable to malware and cyber threats. When a widespread software security incident occurs, system administrators rush to apply the security patch or critical fix to hundreds of thousands of servers and workstations.
Security patches released for Microsoft® or 3rd-party software, including Java™, are important updates that need to be rolled out quickly to a select group of servers or workstations. Failed updates commonly occur when packages are not installed properly, leaving computers vulnerable to security threats.
Patch Manager allows you to:
SolarWinds Patch Manager notifies you of all updates via email and the console window, and extends your existing Microsoft® Windows Server® Update Service (WSUS) or System Center Configuration Manager (SCCM) environment to publish 3rd-party updates as well. To simplify the patch process, the updates are categorized as security, critical, definition, 3rd-party, and service pack updates. You can select the specific Microsoft or 3rd-party update, approve it, and schedule or deploy the update to the select computer group or Active Directory® organizational unit (OU).Learn more about SolarWinds Patch Manager
SolarWinds Patch Manager gives you control over the patch process by automating approval processes, shutdowns, and reboots, defining the correct pre- and post-installation environment, and creating comprehensive reports. For example, after rolling out a critical security update, you can quickly run a Percent Failed or Percent Not Installed report to assess the patch status. This enables you to take swift and appropriate action to deal with any failed updates.
Security patch management in your WSUS/SCCM environment can become more effective and less time-consuming and error-prone with Patch Manager.
WSUS is an excellent tool, but it lacks the ability to effectively schedule patches and report on patch status and inventory.
Despite using SCCM, when it comes to patch management and software distribution of non-Microsoft updates, things can get complicated.
The time between the discovery of an operating system or application vulnerability and the emergence of an exploit is decreasing.