Patch Management is the systematic process of identifying, acquiring, testing, deploying, and verifying software updates (called "patches") across an organization's IT infrastructure — including operating systems, applications, and firmware.
A patch is a set of code changes provided by a software vendor to:
A Patch Management Agent is a lightweight software client installed on each endpoint (workstation, server, laptop) that communicates with a central management console to automate and control the entire patching lifecycle.
| Reason | Description |
|---|---|
| Security | Unpatched systems are the #1 entry point for cyberattacks and ransomware |
| Compliance | Meet regulatory standards like ISO 27001, HIPAA, PCI-DSS, GDPR |
| Bug Fixes | Eliminate software defects that cause crashes and data loss |
| Performance | Optimization patches improve system speed and reliability |
| Consistency | Ensure all devices in your organization run approved, uniform software versions |
| Visibility | Gain full insight into patch status across every endpoint |
| Automation | Eliminate manual, error-prone patch processes across hundreds of machines |
| Business Continuity | Reduce downtime caused by unplanned security incidents or software failures |
Patches are organized into the following categories for better management and filtering:
| Category | Description | Examples |
|---|---|---|
| Security Patches | Fix known vulnerabilities | Windows Security Update, OpenSSL fix |
| Bug Fixes | Resolve functional defects in software | Application crash fix, memory leak patch |
| Feature Updates | Add or improve product features | New UI components, API enhancements |
| Service Packs | Cumulative bundle of fixes and updates | Windows SP1, Oracle Quarterly Update |
| Driver Updates | Update hardware drivers | GPU driver, NIC driver, printer driver |
| Firmware Updates | Low-level device firmware patches | BIOS/UEFI update, SSD firmware |
| Third-Party App Patches | Updates for non-OS software | Chrome, Adobe, Java, Zoom |
| OS Updates | Core operating system updates | Windows Update, kernel patch |
The Patch Management Agent supports 5 deployment policies, each designed for a different level of user interaction and deployment timing.
Overview: This policy allows full user intervention. When patches are ready to be installed, a pop-up notification is displayed to the end user on their screen asking them to initiate or approve the patch installation.
How It Works:
Use Case:
Configuration Options:
| Option | Description |
|---|---|
| Pop-up Timeout | Duration before auto-dismiss (e.g., 60 seconds) |
| Max Snooze Count | How many times user can defer before forced install |
| Deadline Enforcement | Date/time after which install becomes mandatory |
| Custom Message | Admin-defined message displayed in the pop-up |
Overview: This policy allows user intervention with schedule awareness. It asks the user to install patches, but the trigger point is determined by a user-defined or admin-defined schedule. The patch installation prompt is shown based on a time condition — either before 6:00 AM or after 6:00 AM.
How It Works:
Time-Based Trigger Logic:
IF current_time > 06:00 AM → Trigger Policy 2 (show prompt to user) IF current_time < 06:00 AM → Trigger Policy 3 (silent background install) Use Case:
Configuration Options:
| Option | Description |
|---|---|
| Schedule Trigger | Before 6 AM / After 6 AM / Custom time window |
| Prompt Style | Pop-up dialog or system tray notification |
| Fallback Policy | Policy to apply if user doesn't respond within timeout |
| Time Zone | Local device time or server-defined time zone |
Overview: This policy performs a completely silent patch installation — no user pop-up, no notification, no interaction required. The patch is installed automatically in the background when the system is detected as idle / free.
How It Works:
System Idle Conditions Checked:
| Condition | Threshold Example |
|---|---|
| CPU Usage | < 10% for 5 minutes |
| User Input | No keyboard/mouse activity for 10 minutes |
| Active Applications | No foreground user applications running |
| Network Activity | Low background traffic |
Use Case:
Overview: This policy also performs a silent, non-interactive patch installation, but the installation is triggered specifically when the system or a service restarts. This ensures patches are applied at the natural restart lifecycle of the machine without forcing reboots.
How It Works:
Restart Trigger Types:
| Trigger Type | Description |
|---|---|
| 🔄 System Reboot | Full OS shutdown and restart |
| ⚙️ Service Restart | Specific service (e.g., IIS, SQL Server) restart |
| 🔌 Scheduled Restart | Admin-triggered restart at off-hours |
| 🚀 Cold Boot | First startup after system was powered off |
Use Case:
Overview: This is the most aggressive deployment policy — a fully silent, immediate patch installation triggered the moment a deployment request is received. No waiting, no idle check, no restart trigger — the patch is installed right now, transparently in the background.
How It Works:
Execution Flow:
Admin Console → Deploy Command → Agent Receives Request ↓ Agent Downloads Patch → Silent Installation Begins → Patch Applied ↓ Status Reported to Console → Dashboard Updated in Real Time Use Case:
After syncing patch data, patches are classified by severity level to allow priority-based deployment and filtering.
| Severity | CVSS Score Range | Description | Action |
|---|---|---|---|
| 🔴 Critical | 9.0 – 10.0 | Actively exploited vulnerability with catastrophic impact | Deploy immediately (Policy 5 recommended) |
| 🟠 High | 7.0 – 8.9 | Serious vulnerability with significant risk | Deploy within 24–48 hours |
| 🟡 Medium | 4.0 – 6.9 | Moderate risk, limited exploitability | Deploy within 7 days |
| 🟢 Low | 0.1 – 3.9 | Minimal risk, informational or minor | Deploy within 30 days |
| ⚪ Informational | N/A | Non-security updates, feature improvements | Deploy at next maintenance window |
Admins can configure auto-approval rules based on severity:
IF severity == CRITICAL → Auto-approve + Deploy with Policy 5 IF severity == HIGH → Auto-approve + Deploy with Policy 3 IF severity == MEDIUM → Queue for review, Deploy with Policy 1 or 2 IF severity == LOW → Hold for admin approval, Deploy with Policy 1 IF severity == INFO → Manual deployment only After syncing, the admin dashboard displays patch inventory organized by:
Administrators can define maintenance windows to ensure patches are deployed only during approved time periods.
| Option | Description |
|---|---|
| Before 6:00 AM | Patch during off-hours / overnight (recommended for servers) |
| After 6:00 AM | Patch during business hours (with user consent via Policy 1 or 2) |
| Custom Window | Define any specific start and end time (e.g., 10:00 PM – 4:00 AM) |
| Blackout Period | Block all patching during specific times (e.g., business-critical hours) |
| Day-of-Week Filter | Deploy only on weekdays, weekends, or specific days |
| Scenario | Recommended Policy | Time Trigger |
|---|---|---|
| Server patching, no downtime allowed | Policy 3 or 4 | Before 6:00 AM |
| User workstations, business hours | Policy 1 or 2 | After 6:00 AM |
| Emergency zero-day patch | Policy 5 | Immediate (anytime) |
| Scheduled maintenance window | Policy 4 | Custom window |
The portal supports role-based access control for patch deployment operations.
| Capability | Admin |
|---|---|
| View all endpoint patch status | ✅ |
| Create and assign deployment policies | ✅ |
| Push immediate deployments (Policy 5) | ✅ |
| Approve / reject patches | ✅ |
| Configure maintenance windows | ✅ |
| View reports and audit logs | ✅ |
| Manage patch exclusion lists | ✅ |
| Capability | User |
|---|---|
| View patches pending on their own device | ✅ |
| Install patches via pop-up (Policy 1 & 2) | ✅ |
| Defer / snooze patch installation | ✅ (within admin limits) |
| View personal patch history | ✅ |
| Approve patches for other devices | ❌ |
| Push company-wide deployments | ❌ |
| Modify deployment policies | ❌ |
Admin-Only Deployment: Admins can restrict certain critical patch deployments to be admin-initiated only, preventing users from triggering or canceling them.
User-Only Deployment: For self-service scenarios, specific patches (e.g., non-critical app updates) can be made available to users to install on-demand through their self-service portal.
Beyond OS and security patches, the Patch Management Portal includes a Software Deployment Add-On for complete application lifecycle management.
| Feature | Description |
|---|---|
| Direct Application Install | Deploy any application (MSI, EXE) to endpoints directly from the portal |
| Direct Application Uninstall | Remotely remove applications from endpoints without physical access |
| Software Package Library | Maintain a catalog of approved, pre-tested software packages ready for deployment |
| Version Control | Track which version of each application is installed on each device |
| Bulk Deployment | Push software installs to hundreds of endpoints simultaneously |
| Install Status Tracking | Real-time visibility into install success, failure, or pending status per device |
| On-Demand Install | Users can request software from an approved catalog, admins approve and deploy |
Admin uploads package to portal ↓ Package added to Software Library ↓ Admin selects target devices / user groups ↓ Selects Deployment Policy (1–5) ↓ Agent receives deployment request ↓ Application installed / uninstalled silently or with user prompt ↓ Status reported to console dashboard | Package Type | Platform |
|---|---|
.msi / .msu | Windows |
.exe (silent flags supported) | Windows |
When the admin triggers a Sync, the system:
| View | Description |
|---|---|
| User-Wise View | Shows all pending and installed patches per individual user/device |
| Category-Wise View | Organizes patches by type: OS, Security, Application, Driver, etc. |
| Severity-Wise View | Groups patches by Critical / High / Medium / Low / Informational |
| Policy-Wise View | Shows which devices are assigned to which deployment policy |
| Time-Based View | Displays patches deployed within a specific date/time range |
| Compliance Report | Shows % of endpoints fully patched vs pending vs non-compliant |
| Audit Log | Complete history of all patch deployments with timestamps and user/admin attribution |
Policy 1 → User Pop-Up → Manual user install Policy 2 → Scheduled Pop-Up → Time-triggered user install (before/after 6 AM) Policy 3 → Silent + System Idle → Background install when system is free Policy 4 → Silent + Restart Event → Install triggered on reboot/service restart Policy 5 → Silent + Immediate → Instant install on deploy request (emergency) Severity: Critical > High > Medium > Low > Informational Roles: Admin (full control) | User (self-device only) Add-On: Software Deploy → Install / Uninstall apps via portal Documentation Version: 1.0 | Patch Management Agent — Internal Reference