Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

Understanding Auto Patching in CYRISMA

Auto Patching is a newly introduced feature in CYRISMA that allows for automatic application of security patches for third-party applications detected as vulnerable. This feature enhances security by ensuring that vulnerabilities are addressed in a timely manner while minimizing manual intervention.

Written by Liam Downward

Updated at February 26th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

1. Enabling Auto Patching 2. Patch Application Process Key Features & Benefits 1. Automation for Efficiency 2. Configurable Delay for Patch Installation 3. Improved Security & Compliance Limitations & Considerations 1. Auto Patching Applies Only to Third-Party Applications 2. No Built-In Rollback Option 3. Requires Active & Updated Scanning Best Practices Conclusion

1. Enabling Auto Patching

To enable Auto Patching in CYRISMA:

Navigate to Admin > System Configuration.

Locate the Auto Patch Installation setting.

Toggle "Yes" to enable auto patching.

Specify the Auto Patch Installation Delay, which determines when the patches will be applied after a vulnerability is detected. The default delay is 72 hours, but this can be adjusted as needed.

2. Patch Application Process

Once a vulnerability is detected in a third-party application through a scan, CYRISMA will automatically queue the necessary patch.

The system will wait for the configured delay before applying the patch.

After the patch is installed, CYRISMA logs the update in the Patch History section for reference.

Key Features & Benefits

1. Automation for Efficiency

Reduces the need for manual patching by automatically applying necessary updates.

Ensures security vulnerabilities are addressed without user intervention.

2. Configurable Delay for Patch Installation

Users can set a delay (up to 72 hours) before a patch is applied to allow for internal testing or approval workflows.

3. Improved Security & Compliance

Keeps third-party applications up to date, reducing exposure to known vulnerabilities.

Helps organizations maintain compliance with security standards by automating patching processes.

Limitations & Considerations

1. Auto Patching Applies Only to Third-Party Applications

The feature does not cover Windows OS updates or custom applications outside of CYRISMA’s supported third-party patching system.

2. No Built-In Rollback Option

Once a patch is applied, there is no direct rollback feature in CYRISMA. If an issue arises due to an auto-applied patch, users will need to manually uninstall or revert changes.

3. Requires Active & Updated Scanning

Auto Patching relies on up-to-date scan results to determine which vulnerabilities require patches. Running regular vulnerability scans is essential for effective patch management.

Best Practices

Enable Auto Patching for Critical Applications: Ensure that high-risk third-party applications are covered under Auto Patching.

Monitor Patch History: Regularly review patch logs to track applied updates and ensure successful installations.

Test Before Deployment (If Needed): If concerned about patch compatibility, set a delay before patches are applied to allow time for testing in a controlled environment.

Stay Informed on Patch Releases: Check CYRISMA release notes and vendor updates for details on recent patches and any potential impacts.

Conclusion

Auto Patching in CYRISMA simplifies the patch management process, enhancing security by automatically addressing vulnerabilities in third-party applications. By enabling this feature and following best practices, organizations can ensure their systems remain protected while reducing the manual effort required for patch application.

For further assistance, refer to the Patch History section in CYRISMA or contact CYRISMA Support.

 

auto patching patch system admin config windows third party

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Understanding the Functionality of Critical Security Patches
  • Create a Mitigation
  • Understanding CYRISMA's Internal and External Vulnerability Scans

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand