Skip to content
SecPod  – Documentation
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
Search this website
Menu Close
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support
  • Docs Home
  • Categories
    • SanerNow CyberHygiene Platform
    • Products
    • Security Intelligence
    • Supported OSs and Platforms
    • How Tos
    • Release Notes
    • Knowledge Base
    • FAQs
  • Other Resources
  • About SecPod
  • Contact Support

SanerNow CyberHygiene Platform

  • Platform Function Guides
  • Getting Started with SanerNow
  • How does SanerNow’s deployment architecture work?
  • Pre-requisites for SanerNow Deployment

Products

SanerNow AVM
  • What’s New in SanerNow?
  • Product User Guides
  • Overview of SanerNow Advanced Vulnerability Management
Vulnerability Management
  • SanerNow Vulnerability Management User Guide
Patch Management
  • SanerNow Patch Management User Guide
Compliance Management
  • SanerNow Compliance Management User Guide
Asset Exposure
  • SanerNow Asset Exposure User Guide
Endpoint Management
  • SanerNow Endpoint Management User Guide
Posture Anomaly
  • SanerNow Continuous Posture Anomaly Management Tool Product Guide

Security Intelligence

  • List of IoA (Indicators of Attack) covered in SanerNow
  • List of Vulnerability to Exploit/Malware Mapping covered in SanerNow
  • Compliance Benchmark Coverage
  • Application and OS Remediation Coverage
  • OVAL Definitions Family-wise Distribution
  • OVAL Definitions Class-wise Distribution
  • OVAL Definitions Platform Coverage
  • Security Content Statistics
  • Overview of Security Content and Intelligence

Supported OSs and Platforms

  • Supported Third-party Applications for Patching
  • Operating Systems and Platforms Supported

How Tos

General
  • How to download and install Saner agent in Mac?
  • How to download and install Saner agent in Linux?
  • How to download and install the Saner agent in Windows?
  • How to update the expiry date of an existing subscription?
  • How to manage users and their preferences using role-based access?
  • How to create a new user in SanerNow?
  • How to onboard a new organization?
  • How to uninstall the Saner agent through SecPod Saner deployer?
  • How to deploy the Saner agent through SecPod Saner deployer?
  • How to install a Saner agent through the command line?
  • How to uninstall the Saner agent through command line?
  • How to create a new account in SanerNow?
  • How to sign-up with SanerNow?
Vulnerability Management
  • How to remediate vulnerabilities from vulnerability management dashboard?
  • How to manage excluded vulnerabilities in SanerNow?
  • How to exclude vulnerabilities in SanerNow?
  • How to automate and schedule vulnerability scans?
Patch Management
  • How to manage excluded patches in SanerNow?
  • How to exclude patches in SanerNow?
  • How to automate patch management in SanerNow?
  • How to roll back patches in SanerNow?
  • How to fix firmware in SanerNow?
  • How to apply missing patches in SanerNow?
  • How to check the status of patching activity?
  • How to apply the most critical patches in SanerNow?
Compliance Management
  • How to run a compliance scan?
  • How to custom create a security policy?
  • How to align with PCI security compliance management?
  • How to align with NIST 800-171 security compliance management?
  • How to align with NIST 800-53 security compliance management?
  • How to align with HIPAA security compliance management?
Asset Exposure
  • How to run an asset scan?
  • How to manage asset licenses?
  • How to blacklist and whitelist applications in SanerNow?
Endpoint Management
  • How to investigate total RAM or CPU threshold (greater than or equal to 80%) in Windows systems?
  • How to collect operating systems information in Windows?
  • How to investigate disks running out of space (<100 MB) in Windows systems?
  • How to collect and investigate disk information on Windows systems?
  • How to collect BIOS information such as serial number, version, manufacturer in Windows systems?
  • How to check the status of Windows Update Server (WSUS/SCCM)?
  • How to collect all software patches that are hidden in the Windows Update server?
  • How to collect all installed patches in Windows systems?
  • How to collect all the important missing patches in Windows systems?
  • How to collect mounted disk information on Linux systems?
  • How to check wireless signal quality in Linux systems?
  • How to check wireless security in Linux systems?
  • How to check all firewall policies on Linux systems?
  • How to collect DNS information on Linux systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Linux systems?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing in Linux?
  • How to check wireless signal quality in Windows systems?
  • How to check wireless security in Windows systems?
  • How to collect all open ports in Windows systems?
  • How to collect all network interfaces in Windows systems?
  • How to investigate DNS cache on Windows systems?
  • How to check all firewall policies on Windows systems?
  • How to collect DNS information on Windows systems?
  • How to collect all Dynamic Host Configuration Protocol (DHCP) information on Windows systems?
  • How to collect all the applications with an unknown publisher in Mac systems?
  • How to collect environment variables set in all operating systems?
  • How to collect all families of operating systems such as Windows, Unix, and macOS?
  • How to collect ARP entries that are created when a hostname is resolved to an IP address and then to a MAC addressing Windows?
  • How to collect all software licenses in Mac systems?
  • How to collect all the applications with an unknown publisher in Windows systems?
  • How to collect a list of applications that are started when you boot your computer?
  • How to identify potentially unwanted programs such as torrent downloaders or unnecessary toolbars running on Windows systems?
  • How to collect all software licenses in Windows systems?
  • How to collect all the applications with an unknown publisher in Linux systems?
  • How to perform system tuning?
  • How to enable/disable devices in SanerNow?
  • How to block blacklisted applications in SanerNow?
  • How to delete and quarantine a file?
  • How to deploy software in SanerNow?
  • How to enable and disable firewall settings in SanerNow?
  • How to start and stop the processes in SanerNow?
Reports
  • How to schedule for the report back up?
  • How to create a custom report in SanerNow?
  • How to configure mail settings to email Report PDF?

Release Notes

  • Release Notes SanerNow 5.3
  • Release Notes SanerNow 5.2
  • Release Notes SanerNow 5.1
  • Release Notes SanerNow 5.0
  • Release Notes SanerNow 4.8.0.0
  • Release Notes SanerNow 4.7.0.0
  • Release Notes SanerNow 4.6.0.0
  • Release Notes SanerNow 4.5.0.0
  • Release Notes SanerNow 4.4.0.0
  • Release Notes SanerNow 4.3.0.0
  • Release Notes SanerNow 4.2.2.1
  • Release Notes SanerNow 4.2.2.0
  • Release Notes SanerNow 4.2.1.0
  • Release Notes SanerNow 4.2.0.0
  • Release Notes SanerNow 4.1.1.0
  • Release Notes SanerNow 4.0.0.5

FAQs

  • Technical FAQs
  • Home
  • Docs
  • Products
  • Patch Management
  • SanerNow Patch Management User Guide

SanerNow Patch Management User Guide

Table of Contents
  • Device Compliance
  • Asset Compliance
  • Patch by Severity
  • Security Patches
  • Patch by Operating System
  • Patch by Vendor
  • Patch Aging
  • Patching Impact
  • Missing Patches
  • Exclude Patches
  • Exclusion
  • Most Critical Patches
  • Firmware
  • Patches Installed Over Time
  • Installed Patches
  • Rollback
  • Automation
  • Reason for Failure
  • Job Status Summary
  • Status
  • Setting Alerts for Patch Management
  • Patch Report
  • To Back Up Reports

Applying security patches is the primary method for eliminating vulnerabilities in software. Patch management involves deciding what patches should be applied and when they should be applied and applying the patches. SanerNow provides access to the latest vendor patches that experts test. With its capability to identify vulnerabilities and map appropriate patches to remove vulnerabilities, SanerNow automates the process of security patch management and keeps endpoint systems up to date. SanerNow also provides crucial information on the severity of detected vulnerabilities, which helps decide whether to apply patches.

Patch Management automates the end-to-end patching tasks from scanning to deployment to reduce the attack surface and enhance security posture effectively. It supports patching for all major OSs such as Windows, Mac, Linux, firmware, and many third-party applications. Patch Management detects all the missing patches for the vulnerabilities across the network. Patch management help to simplify and automate all the patching needs. With the help of smart patching technology, SanerNow provides an end-to-end automated patch management system.

To access the Patch Management tool:

  1. Log in to SanerNow using your SanerNow credentials.
  2. Suppose an account already exists and the Saner Agent has been deployed on the endpoints; the organization level dashboard is displayed.
  1. To select an account, click All Organizations on the top left corner of the dashboard. All Organization section lists all the organizations. You can see the list of organizations as Org1, Org2, and Org3, as shown below. Select the account, and a dashboard with the summary view of the account is displayed.
  • Click the SanerNow tools icon on the header. It will display all the provision tools, as shown below.
  • Click the Patch Management icon. The Patch Management dashboard is displayed, which provides an overview of all devices and patching activities. And it helps you take action to install patches to remediate vulnerabilities.

Device Compliance #

This pane shows the device’s compliance posture and highlights the percentage of up-to-date devices and devices that need to apply patches. You can download an excel sheet of non-patched and up-to-date devices by clicking the CSV icon.

Asset Compliance #

This pane shows the asset’s compliance posture. It highlights the percentage of up-to-date software applications, how many assets need patching activity, and the percentage of vulnerable assets with no patches. You can download an excel sheet of asset compliance details by clicking the CSV icon.

Patch by Severity #

This page shows the patches based on the severity: critical, high, medium, and low. You can download an excel sheet of patch details with severity by clicking the CSV icon.

The patch management dashboard also lists the total number of vulnerabilities, the number of patches, and a total number of devices.

Security Patches #

This pane shows the number of missing patches for devices. Click on the down arrow to expand the missing patches list. Each device’s information, such as operating system, group, size, risk, and device status, is listed on the table. This information will be helpful for a user to deploy the patches.  You can apply filters to view the devices based on groups, operating systems, family, severity, the device status. The search option is provided to search the devices with missing patch information with multiple search options.

Security patches based on the devices and assets are displayed on this page. Click on the asset icon to see the missing patches for the assets. This pane shows the level of risk due to the missing patch, the size, date, vendor who publishes the patch, and whether a reboot will be required to apply the patch. It also shows the number of affected hosts. Search and filter options are available to view specific assets. You can download an excel sheet of patch details based on the devices and assets by clicking the CSV icon.

Patch by Operating System #

This pane shows the distribution of missing patches based on the operating system; it lets you see which operating systems in your organization have the most significant number of missing patches. You can download an excel sheet of missing patches segregated based on the operating system by clicking the CSV icon.

Patch by Vendor #

This pane shows the patches categorized by the vendor, allowing you to understand which assets or vendors have the most updates. You can download an excel sheet of patch details based on the publisher by clicking the CSV icon.

Patch Aging #

This pane shows the number of days since a patch has been available but not applied. You can download an excel sheet of patch details based on age by clicking the CSV icon.

Patching Impact #

This pane highlights the number of vulnerabilities that are removed by applying patches. This helps prioritize patching based on the acceptable vulnerability count, security audits, safety, the criticality of the unpatched systems, etc. You can download an excel sheet of patching impact by clicking the CSV icon.

Missing Patches #

SanerNow detects missing patches through its scheduled or continuous scans. You can set up the scanner to run according to your preferences. You can schedule scans to run at a particular time every day. The patch download time and CPU threshold can also be scheduled. After each Scan, SanerNow displays all details of missing patches, devices, risk levels, etc., to give you an exact picture of what’s happening in your patch management space. This page list the assets with missing patches. It highlights the level of risk due to the missing patch, the size, date, a vendor who publishes the patch, and whether a reboot will be required to apply the patch. 

It also shows the number of affected hosts. You will get detailed asset information with patching details by clicking on the asset below.

You can apply filter options to view the list of missing patches by groups, operating systems, family, severity, and type, and you can search for the required device or group. You create multiple remediation jobs and automation rules for a single device or a group of devices.

You can remediate missing patches in two ways:

  • As a one-time task to apply patches on a device or devices: You can create a Job every time you need to apply missing patches.
  • As an automated task scheduled to apply any missing patches discovered by the last scan executed by the Saner Agent: You can create a scheduled task that will run according to defined parameters. Refer to the Automation section for more details.

Exclude Patches #

SanerNow facilitates excluding the security and non-security patches that are not required. You can exclude missing patches and the most critical patches and view the excluded patches in the Exclusion list.

To exclude patches:

  • In Patch Management, you can exclude patches from Missing patches, Most Critical Patches.
  • Select the desired patches through the check box and click on Exclude.
  • Select Exclude and fill up all the patch exclude details.
  • Give Policy Name and Policy Description.
  • Select the reason for excluding the patch from the dropdown menu: False Positive, Not Applicable, or Risk Accepted.
  • Assign the number of days you want to exclude (the maximum number of days for exclusion is 999).
  • Give comments if required.
  • Apart from the check box, you can custom add the patches for exclusion.
  • Click on Exclude Selected Items. You will find all the excluded patches in the Exclusion section.
  • The excluded patches do not show up on the patch management dashboard as per policy specified reason. However, you can manage the excluded patches in the Exclusion section.

Exclusion #

In Exclusion, you can view all the excluded policies, edit policies, and delete them from the exclusion list.

  • To edit policies, click on edit in the Action section and fill up all the required policy details in Exclude Item(s) window.
  • Click on the Delete button in the Action section to delete the policy.
  • In the Action section, you can also enable or disable the policy.
  • The (i) icon displays the comment given to the policy.
  • You can also export the excluded vulnerabilities through CSV.

To create a task for apply missing patches:

  • Select the patches you want to install. Click on the Apply Selected Patches button at the top right corner of the missing patches page. The Create Patching Task dialog is displayed as shown in the below image.
  • Specify a task name, provide patching notification messages, and select remediation scripts.
  • Select test criteria as shown in the below image.
  • Schedule the job immediately or after a scan and set the time counter accordingly in the test schedule fields. You can also choose to set the job to execute on a different date.
  • Click on the Next button. Specify the details in the Deployment Criteria section. Click on the Test and Deploy Selected Patches button.

You will get a confirmation message that you created the job successfully.

SanerNow supports patch management for Windows, Linux, Mac operating systems, and third-party applications.

Operating System Patches

  1. Microsoft Updates

Patch Management for Microsoft updates works in two ways:

WSUS Server

If a Windows update is configured to contact the WSUS Server, the Saner agent directly contacts the WSUS Server to get the latest available patches. Otherwise, it will contact the Microsoft Update Server.  

Default Microsoft Update Server

If a Windows update is configured to contact the Microsoft Update Server, the Saner agent directly contacts the Microsoft Update Server to get the latest available patches.

  • Linux Machines

For RPM Machines

The Saner solution uses the YUM repository to install RPM package updates, which contacts the respective server to get the latest patches.

For DPKG Machines

SanerNow uses the apt-get package, a default package present in dpkg machines. The agent contacts the respective update server to get the latest patches.

  • Mac OS X Packages

SanerNow uses the software update command to update OS X packages. The agent contacts the MAC OS X Update Server.

Third-party Application Patches

The Saner solution supports the following 97 applications for Patch Management. The application list is constantly updated.

• All Microsoft products
• All Linux distros packages
• All Mac OS X packages
• Activeperl • Adobe AIR
• Adobe Acrobat for Mac
• Adobe Flash Player Npapi
• Adobe Flash Player Ppapi
• Adobe Flash Player ActiveX
• Adobe Shockwave Player
• Adobe Reader
• Adobe Reader DC continuous
• Adobe Reader DC classic
• Adobe Brackets
• Adobe Acrobat DC Classic for Mac
• Adobe Acrobat DC Continuous for Mac
• Adobe Digital Editions
• Apple iTunes
• Apple iCloud
• Apple iBooks Author
• Apple QuickTime
• Apple Safari
• Audacity
• AIMP
• AnyDesk(Windows)
• Cacti
• Calibre
• Ccleaner
• Citrix Receiver
• Dell SupportAssist
• Dropbox
• Docker for Linux
• Elasticsearch
• Evernote
• FlashGet
• Foxit Reader
• Google Chrome
• GhostScript
• Google Earth
• Google Picasa
• Google SketchUp
• Gitlab-ce
• Gitlab-ee for linux
• Git for windows
• iTerm2 for mac
• Inkscape
• K-meleon
• Kubernetes linux
• Kibana for linux
• LibreOffice
• Lan Messenger
• Lenovo System Update
• Mozilla Firefox ESR
• Mozilla Thunderbird ESR
• Mozilla FireFox
• Mozilla SeaMonkey
• Mozilla Thunderbird
• MySQL
• Microsoft Visual Studio Code
• MySQL Connector/Net
• Malwarebytes
• Notepad++
• OpenVPN Client
• Opera
• Oracle Java JDK/JRE
• Oracle VirtualBox
• OpenSSH
• OpenSSL
• Open Office    
• Palemoon
• Puppet Agent
• Pidgin
• PostgreSQL
• Putty
• Python
• Powershell
• RealPlayer
• RealVNC
• Skype
• Sumatra PDF
• TheHive Project Cortex analyzer for linux
• TeamViewer
• TightVNC
• Trillian
• UltraVNC
• VMware Player
• VMware Movie Decoder
• VLC Media Player
• Vmware Tools
• Vsphere Client
• Win amp
• WinRAR
• WinZip
• Winscp
• Wireshark
• .net core
• 7Zip    

Most Critical Patches #

This page lists the most critical patches to the security of the system and organization so that you can prioritize patching. It highlights the size, date, vendor who publishes the patch, and whether a reboot will be required to apply the patch.

To apply critical patches

  • Select the patches you want to install. Click on the Apply Selected Patches button at the top right corner of the missing patches page. The Create Patching Task dialog is displayed as shown in the below image.
  • Specify a task name, provide patching notification messages, and select remediation scripts.
  • Select test criteria as shown in the below image.
  • Schedule the job immediately or after a scan and set the time counter accordingly in the test schedule fields. You can also choose to set the job to execute on a different date.
  • Click on the Next button. Specify the details in the Deployment Criteria section. Click on the Test and Deploy Selected Patches button.

You will get a confirmation message that you created the job successfully.

Firmware #

A comprehensive set of patches that cover software and firmware across all nodes to reduce vulnerabilities and security risks to the organization. This page lists assets with the patching details, a vendor who publishes the patch, date, and affected hosts. The filter and search options are provided to view the specific assets. Click on the Apply Selected Patches to create a new patching task. You can download the excel sheet of assets with patching details by clicking on the CSV icon.   

Patches Installed Over Time #

This pane shows the number of vulnerable patches that have been installed over time so that the organization has a patch history. The history will help to understand its security health and plan its actions. You can download an excel sheet of patches installed over time by clicking the CSV icon.

Installed Patches #

This page shows a list of patches applied for assets, the installation date, the size of the patch, the rollback status, and the system that has the asset. The asset view shows detailed information on vulnerable patches already installed on assets.

A toggle option is provided in the installed patches pane to switch between Device and Asset view. The device view shows detailed information on vulnerable patches installed on devices, as shown below.

Click the expand icon if you want to rollback any patches. The Installed Patches page is displayed. You can filter the list of installed patches by groups of devices to traverse the list quickly, or you can search for the required device or group.

Rollback #

Click on the Rollback option at the top right corner of the PM page. It will list the installed patches for each device and asset.

  • Select the assets you want to rollback patching and click on the Revert Selected Patches button.

The Create Rollback Task dialog is displayed.

  • Specify a job name and select rollback schedule from the drop-down menu.
  • Specify whether you want the job done immediately or after a scan and set the time counter accordingly. You can also choose to set the job to execute on a different date.
  • Provide the rollback notification message to display when the task is completed.
  • Click on the Revert Selected Patches button after specifying the details.

Automation #

SanerNow offers a reboot schedule function integrated with its patch automation rules. To run the latest version without delays, you can schedule monthly, weekly, or scheduled reboots according to your requirements. SanerNow supports new patches offered by vendors within 24 hours of release to ensure quick risk mitigation. All patches are pre-tested to check for any compatibility issues and errors. When a vendor releases an important update, SecPod also sends out email alerts to ensure you do not miss them. After the patches are deployed, SanerNow performs a final patch verification on the device to check the patch status. SanerNow also packs additional handy features such as patch rollback to provide further control over patch jobs.

To install missing patches using an automated task, click on the Automation button at the top of the PM page. The Automation page will display the list of vulnerable assets with the publisher’s details.

Select an asset that you want to mitigate vulnerabilities automatically and click on the Create Automation Rule button to schedule a task. Schedule a Task dialog is displayed as shown in the below image.

Select patches based on severity and patch installation type, and click on the Future assets check box if you want to remediate future assets. The vulnerabilities will be remediated based on the above options provided by the user. Click on the Next button.

The user can schedule a remediation task based on his timing. Specify how often you need to run a scan and select the option to reboot. Choose to set the task to execute on a different date, weekly, monthly, or daily. If weekly, specify the dates and times. If monthly, specify the dates and times. Select scripts to run while rebooting, specify the task name and provide the patching notification message to display after completing the activity. You can also select groups to apply the rule settings. Click on the Create Automation Rule button, and a remediation task will be created. The remediation task will run automatically based on the scheduled timing.  

Reason for Failure #

Sometimes, patches may not be successfully installed during patch management. This pane shows the number of hosts on which the patch has failed and categorizes the failed patches under remediation errors, application errors, device errors, download errors, etc. Click the host number or name to see more detail, such as which job failed or which patch was not installed.

Job Status Summary #

This page shows the status of all the remediation tasks and patch installation or rollback jobs that were scheduled.

Click the Expand icon to see a list of all scheduled patch and rollback jobs. Click on any job to view the completion status of the job or the job creation information.

Status #

Since patching is not a one-person and one-time task, they need to be executed and tracked continuously as a process. SanerNow accelerates each stage of the patching process with automation and additional features to quicken the process with minimal supervision. You can create specific patch jobs for a group of devices and track them to finish.

You can automate patching for specific operating systems (Windows, Mac, Linux), third-party applications, and firmware. Create jobs according to OSs, single/groups of applications, and department (device groups and Active Directory hierarchy). It can automate the entire patching cycle according to pre-set rules and conditions.

Users can rollback patches, remove devices, and reboot devices from the Status page. To remove a job applied for the device, select a device, and click on the Remove Device button.

Select a device and click on the Rollback patches button to apply patches to the device. 

Select a device from the device list and click on the Reboot Device button. Specify the task name, reboot message, and select schedule options as immediate or custom date. Click on the Reboot button.

You can scan devices manually at any time. Once the scan is done, and vulnerabilities are known, remediation is performed by creating a job. The remediation job includes vulnerable/non-compliant assets that can be applied to groups. The remediation job can be executed immediately, scheduled on a particular date, or performed after the scheduled scan.

To Scan Devices Manually

1. Click Manage > Devices > Managed Devices.

2. Select device groups and click on the Scan Now button.

Once the Remediation Job is executed, you can generate a patch report again after 20-30 minutes. Compare this report with the report generated prior to the remediation job to identify how many hosts were affected and how many hosts have been remediated successfully.

Setting Alerts for Patch Management #

To stay on top of the patching tasks vital to maintaining security, you can set alerts.

To Set Alerts for Patch Management

  1. Click Alerts > Patch Management.
    1. Set the Subscription status to On.
    1. Specify the email address to which you want the alerts sent.
    1. Specify which conditions you want to receive detection and response alerts.
  2. You can choose to receive alerts related to detection – Important and Critical Patches, All Missing Patches, Critical Missing Patches, and Custom: If you select custom, you must specify the custom values in the Custom Detection box.
  3. You can choose to receive alerts related to response – All failure actions, All successful actions, All actions, and Custom. You must specify the custom values in the Custom Detection box if you select custom.
    1. Click on the Update button to complete the settings.

Patch Report #

The patch report summarizes all the patch information, such as the missing patches, the critical patches, etc.

To generate a patch report

  • Click on the Reports > Saved Report > Patch Report.

To export the report to a PDF.

  • Click on the Download icon to download the PDF report.

To export the report and send it via email:

  • Click on the Mail icon in the saved report section to email the report.
  • Specify the email addresses.

To Back Up Reports #

The backup settings under Reports allow IT, administrators, to obtain report backup. The backup report can be scheduled to run automatically daily or weekly.

To Back Up Reports

To configure backup settings for reports:

  • Click Reports on the left pane.
  • Click on Saved Reports and select the Patch Report option.
  • Select the Settings option beside the Asset Report.
  • Report Settings (Patch Report) pop up will be displayed in the image below.
  • Click the Omit filter statement in the exported report check box, and users can set the on/off button whether they want to back up the report.
  • If the backup is on, select the weekly or daily option.
  • Set a number in the Keep only the latest entry box. The report for the specified number of days is archived. If the number is three and the backup option is daily, then the reports from the last three days are maintained. Older files are deleted. You can maintain backups for a maximum of 30 days.
  • Specify Email ID address. You can enter more than one email address with a comma-separated.
  • Select the organization and accounts you want to apply these settings.
  • Click on the Save button.

Click on the Create Settings button. By default, the scan scheduled time is 12:00 PM. Users can customize scan time and select any number of groups at the bottom and create the settings. Once the settings are created, the server will push these settings to an agent. Then the agent will start its daily scan at a scheduled time.

What are your Feelings
Share This Article :
  • Twitter
  • LinkedIn
Updated on September 26, 2022
Table of Contents
  • Device Compliance
  • Asset Compliance
  • Patch by Severity
  • Security Patches
  • Patch by Operating System
  • Patch by Vendor
  • Patch Aging
  • Patching Impact
  • Missing Patches
  • Exclude Patches
  • Exclusion
  • Most Critical Patches
  • Firmware
  • Patches Installed Over Time
  • Installed Patches
  • Rollback
  • Automation
  • Reason for Failure
  • Job Status Summary
  • Status
  • Setting Alerts for Patch Management
  • Patch Report
  • To Back Up Reports
Copyright 2023 - SecPod. All Rights Reserved. Privacy Policy.