Patch Management and Software Deployment

1. What is Patch Management?

Patch Management is the systematic process of identifying, acquiring, testing, deploying, and verifying software updates (called "patches") across an organization's IT infrastructure — including operating systems, applications, and firmware.

A patch is a set of code changes provided by a software vendor to:

  • Fix security vulnerabilities
  • Resolve software bugs
  • Improve performance or stability
  • Add new features or compliance updates

A Patch Management Agent is a lightweight software client installed on each endpoint (workstation, server, laptop) that communicates with a central management console to automate and control the entire patching lifecycle.


2. Why Use Patch Management?

Reason Description
Security Unpatched systems are the #1 entry point for cyberattacks and ransomware
Compliance Meet regulatory standards like ISO 27001, HIPAA, PCI-DSS, GDPR
Bug Fixes Eliminate software defects that cause crashes and data loss
Performance Optimization patches improve system speed and reliability
Consistency Ensure all devices in your organization run approved, uniform software versions
Visibility Gain full insight into patch status across every endpoint
Automation Eliminate manual, error-prone patch processes across hundreds of machines
Business Continuity Reduce downtime caused by unplanned security incidents or software failures

5. Patch Categories

Patches are organized into the following categories for better management and filtering:

Category Description Examples
Security Patches Fix known vulnerabilities Windows Security Update, OpenSSL fix
Bug Fixes Resolve functional defects in software Application crash fix, memory leak patch
Feature Updates Add or improve product features New UI components, API enhancements
Service Packs Cumulative bundle of fixes and updates Windows SP1, Oracle Quarterly Update
Driver Updates Update hardware drivers GPU driver, NIC driver, printer driver
Firmware Updates Low-level device firmware patches BIOS/UEFI update, SSD firmware
Third-Party App Patches Updates for non-OS software Chrome, Adobe, Java, Zoom
OS Updates Core operating system updates Windows Update, kernel patch

6. Deployment Policies

The Patch Management Agent supports 5 deployment policies, each designed for a different level of user interaction and deployment timing.


📋 Policy 1 — Interactive (User-Visible Pop-Up Prompt)

Overview: This policy allows full user intervention. When patches are ready to be installed, a pop-up notification is displayed to the end user on their screen asking them to initiate or approve the patch installation.

How It Works:

  1. Admin pushes patch deployment with Policy 1 assigned
  2. Agent detects the patch and triggers a pop-up dialog on the user's screen
  3. The dialog displays:
    • Patch name and description
    • Severity level (e.g., Critical, High)
    • Available action buttons: [ Install Now ] | [ Remind Me Later ] | [ Skip ]
  4. User clicks Install Now → patch installation begins immediately
  5. If user clicks Remind Me Later → pop-up re-appears after a configured snooze interval
  6. If user clicks Skip → installation is deferred (admin can enforce a deadline after N skips)

Use Case:

  • End-user workstations where user awareness and consent is important
  • Environments with flexible working hours
  • Non-critical patches where user control is acceptable

Configuration Options:

Option Description
Pop-up Timeout Duration before auto-dismiss (e.g., 60 seconds)
Max Snooze Count How many times user can defer before forced install
Deadline Enforcement Date/time after which install becomes mandatory
Custom Message Admin-defined message displayed in the pop-up

📋 Policy 2 — Custom Schedule with User Intervention (User-Triggered Schedule)

Overview: This policy allows user intervention with schedule awareness. It asks the user to install patches, but the trigger point is determined by a user-defined or admin-defined schedule. The patch installation prompt is shown based on a time condition — either before 6:00 AM or after 6:00 AM.

How It Works:

  1. Admin deploys patch with Policy 2 and sets a time-based trigger
  2. Agent monitors the system clock continuously
  3. When the time condition is met:
    • Trigger: After 6:00 AM → Pop-up appears during the user's working hours
    • Trigger: Before 6:00 AM → Pop-up appears during early morning / off-hours
  4. User is prompted to confirm or schedule the installation
  5. User acknowledges → installation begins as per user response

Time-Based Trigger Logic:

IF current_time > 06:00 AM → Trigger Policy 2 (show prompt to user) IF current_time < 06:00 AM → Trigger Policy 3 (silent background install)

Use Case:

  • Organizations where some users start early and others start late
  • Controlled patch windows with user consent during specific hours
  • Flexible deployments where time-of-day determines interaction level

Configuration Options:

Option Description
Schedule Trigger Before 6 AM / After 6 AM / Custom time window
Prompt Style Pop-up dialog or system tray notification
Fallback Policy Policy to apply if user doesn't respond within timeout
Time Zone Local device time or server-defined time zone

📋 Policy 3 — Silent Installation (System Idle Detection)

Overview: This policy performs a completely silent patch installation — no user pop-up, no notification, no interaction required. The patch is installed automatically in the background when the system is detected as idle / free.

How It Works:

  1. Admin deploys patch with Policy 3 assigned
  2. Agent continuously monitors system resource usage:
    • CPU usage
    • RAM usage
    • Active user sessions
    • Disk I/O activity
  3. When the system meets the "idle" threshold (e.g., CPU < 10%, no active user input for X minutes):
    • Agent silently downloads and installs the patch in the background
    • User sees no interruption or notification
  4. Installation logs are reported back to the central console silently
  5. If a restart is required, it can be deferred to Policy 4 behavior

System Idle Conditions Checked:

Condition Threshold Example
CPU Usage < 10% for 5 minutes
User Input No keyboard/mouse activity for 10 minutes
Active Applications No foreground user applications running
Network Activity Low background traffic

Use Case:

  • Servers and background workstations
  • High-security environments with zero user disruption policy
  • Patches that must not interrupt active user sessions
  • Critical infrastructure patching during off-hours

📋 Policy 4 — Silent Installation on Service/System Restart

Overview: This policy also performs a silent, non-interactive patch installation, but the installation is triggered specifically when the system or a service restarts. This ensures patches are applied at the natural restart lifecycle of the machine without forcing reboots.

How It Works:

  1. Admin deploys patch with Policy 4 assigned
  2. Agent queues the patch and waits — no immediate installation
  3. Agent monitors for a restart event:
    • System Restart — When the user or admin shuts down/reboots the machine
    • Service Restart — When a related Windows/Linux service is restarted
  4. On detecting the restart event → Agent silently installs the patch during the boot sequence or service startup
  5. Installation is completed before the system comes back fully online
  6. Patch status is reported to the console after system resumes

Restart Trigger Types:

Trigger Type Description
🔄 System Reboot Full OS shutdown and restart
⚙️ Service Restart Specific service (e.g., IIS, SQL Server) restart
🔌 Scheduled Restart Admin-triggered restart at off-hours
🚀 Cold Boot First startup after system was powered off

Use Case:

  • Patches that inherently require a restart to apply
  • Minimal disruption — piggybacks on planned maintenance restarts
  • Server environments with scheduled restart windows
  • Avoiding forced reboots mid-workday

📋 Policy 5 — Immediate Silent Deployment (Direct Deploy on Request)

Overview: This is the most aggressive deployment policy — a fully silent, immediate patch installation triggered the moment a deployment request is received. No waiting, no idle check, no restart trigger — the patch is installed right now, transparently in the background.

How It Works:

  1. Admin issues a direct deploy command from the console for a specific patch or patch group
  2. The deploy request is pushed to the agent in real time
  3. Agent receives the request and immediately begins downloading and installing the patch
  4. Installation happens silently with no user notification or interruption
  5. Post-installation status (success / failure / reboot required) is reported instantly to the console

Execution Flow:

Admin Console → Deploy Command → Agent Receives Request ↓ Agent Downloads Patch → Silent Installation Begins → Patch Applied ↓ Status Reported to Console → Dashboard Updated in Real Time

Use Case:

  • Emergency / Zero-Day vulnerability response — immediate patching required
  • Critical security patches that cannot wait for idle state or restart events
  • Admin-controlled urgent deployments across multiple endpoints simultaneously
  • Compliance-driven mandates with tight deadlines

7. Severity-Based Installation

After syncing patch data, patches are classified by severity level to allow priority-based deployment and filtering.

Severity Levels

Severity CVSS Score Range Description Action
🔴 Critical 9.0 – 10.0 Actively exploited vulnerability with catastrophic impact Deploy immediately (Policy 5 recommended)
🟠 High 7.0 – 8.9 Serious vulnerability with significant risk Deploy within 24–48 hours
🟡 Medium 4.0 – 6.9 Moderate risk, limited exploitability Deploy within 7 days
🟢 Low 0.1 – 3.9 Minimal risk, informational or minor Deploy within 30 days
Informational N/A Non-security updates, feature improvements Deploy at next maintenance window

Severity-Based Auto-Deployment Rules

Admins can configure auto-approval rules based on severity:

IF severity == CRITICAL → Auto-approve + Deploy with Policy 5 IF severity == HIGH → Auto-approve + Deploy with Policy 3 IF severity == MEDIUM → Queue for review, Deploy with Policy 1 or 2 IF severity == LOW → Hold for admin approval, Deploy with Policy 1 IF severity == INFO → Manual deployment only

Post-Sync Patch Dashboard View

After syncing, the admin dashboard displays patch inventory organized by:

  • Per User — Which patches are pending/installed on each user's device
  • Per Category — OS, Software,Hardware.
  • Per Severity — Critical → Informational
  • Per Department/Group — IT, Finance, HR, etc.
  • Installation Status — Installed ✅ | Pending ⏳ | Failed ❌ | Excluded ⛔

8. Time-Based Installation

Administrators can define maintenance windows to ensure patches are deployed only during approved time periods.

Time Window Configuration

Option Description
Before 6:00 AM Patch during off-hours / overnight (recommended for servers)
After 6:00 AM Patch during business hours (with user consent via Policy 1 or 2)
Custom Window Define any specific start and end time (e.g., 10:00 PM – 4:00 AM)
Blackout Period Block all patching during specific times (e.g., business-critical hours)
Day-of-Week Filter Deploy only on weekdays, weekends, or specific days

Example Time-Based Policy Matrix

Scenario Recommended Policy Time Trigger
Server patching, no downtime allowed Policy 3 or 4 Before 6:00 AM
User workstations, business hours Policy 1 or 2 After 6:00 AM
Emergency zero-day patch Policy 5 Immediate (anytime)
Scheduled maintenance window Policy 4 Custom window

9. User-Based vs Admin-Based Deployment

The portal supports role-based access control for patch deployment operations.

👨‍💼 Admin-Only Mode

Capability Admin
View all endpoint patch status
Create and assign deployment policies
Push immediate deployments (Policy 5)
Approve / reject patches
Configure maintenance windows
View reports and audit logs
Manage patch exclusion lists

👤 User Mode

Capability User
View patches pending on their own device
Install patches via pop-up (Policy 1 & 2)
Defer / snooze patch installation ✅ (within admin limits)
View personal patch history
Approve patches for other devices
Push company-wide deployments
Modify deployment policies

Admin-Only Deployment: Admins can restrict certain critical patch deployments to be admin-initiated only, preventing users from triggering or canceling them.

User-Only Deployment: For self-service scenarios, specific patches (e.g., non-critical app updates) can be made available to users to install on-demand through their self-service portal.


10. Software Deployment Add-On

Beyond OS and security patches, the Patch Management Portal includes a Software Deployment Add-On for complete application lifecycle management.

📦 Features

Feature Description
Direct Application Install Deploy any application (MSI, EXE) to endpoints directly from the portal
Direct Application Uninstall Remotely remove applications from endpoints without physical access
Software Package Library Maintain a catalog of approved, pre-tested software packages ready for deployment
Version Control Track which version of each application is installed on each device
Bulk Deployment Push software installs to hundreds of endpoints simultaneously
Install Status Tracking Real-time visibility into install success, failure, or pending status per device
On-Demand Install Users can request software from an approved catalog, admins approve and deploy

🔄 Software Deployment Workflow

Admin uploads package to portal ↓ Package added to Software Library ↓ Admin selects target devices / user groups ↓ Selects Deployment Policy (1–5) ↓ Agent receives deployment request ↓ Application installed / uninstalled silently or with user prompt ↓ Status reported to console dashboard

📋 Supported Package Types

Package Type Platform
.msi / .msu Windows
.exe (silent flags supported) Windows

11. Sync & Dashboard Overview

🔄 Patch Sync Process

When the admin triggers a Sync, the system:

  1. Connects to vendor patch repositories (Microsoft WSUS, third-party feeds, CVE databases)
  2. Downloads latest patch metadata (ID, name, severity, category, release date, affected versions)
  3. Cross-references installed software on each endpoint
  4. Calculates compliance gap — patches available but not yet installed
  5. Updates the dashboard with the latest patch inventory and device compliance status

📊 Dashboard Views

View Description
User-Wise View Shows all pending and installed patches per individual user/device
Category-Wise View Organizes patches by type: OS, Security, Application, Driver, etc.
Severity-Wise View Groups patches by Critical / High / Medium / Low / Informational
Policy-Wise View Shows which devices are assigned to which deployment policy
Time-Based View Displays patches deployed within a specific date/time range
Compliance Report Shows % of endpoints fully patched vs pending vs non-compliant
Audit Log Complete history of all patch deployments with timestamps and user/admin attribution

📌 Quick Reference Card

Policy 1 → User Pop-Up → Manual user install Policy 2 → Scheduled Pop-Up → Time-triggered user install (before/after 6 AM) Policy 3 → Silent + System Idle → Background install when system is free Policy 4 → Silent + Restart Event → Install triggered on reboot/service restart Policy 5 → Silent + Immediate → Instant install on deploy request (emergency) Severity: Critical > High > Medium > Low > Informational Roles: Admin (full control) | User (self-device only) Add-On: Software Deploy → Install / Uninstall apps via portal

Documentation Version: 1.0 | Patch Management Agent — Internal Reference

We are continuously improving our documentation to ensure it meets your needs. This document will be updated regularly, so please check back for the latest information. If you have any questions or encounter any issues, feel free to reach out to us at support@itassetmanagement.in.