Windows Patching – Understanding the Process and Best Practices
Windows patching is a critical process that ensures systems remain secure and up-to-date by applying the latest fixes and updates from Microsoft. This guide provides an overview of how Windows patching works, common challenges, and how to effectively manage patches within CYRISMA.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
How Windows Patching Works
Microsoft regularly releases patches to address security vulnerabilities, fix bugs, and enhance system performance. These patches are typically delivered through cumulative updates, known as roll-up patches, which bundle multiple updates together.
Roll-up Hot Patches
Cumulative Updates: Microsoft consolidates multiple patches into a single roll-up, making it easier to deploy comprehensive updates.
KB Articles: Each roll-up is associated with a KB (Knowledge Base) article, detailing the included fixes.
CVEs Coverage: Although individual CVEs (Common Vulnerabilities and Exposures) may not be listed explicitly in the patching interface, they are covered within the roll-up KB articles.
Managing Windows Patching in CYRISMA
Identifying Relevant Patches
Patch Listings: When reviewing patches in CYRISMA, it's important to note that Windows patches may not list individual CVEs directly.
Roll-up Approach: Instead, patches are displayed as roll-up KBs covering multiple CVEs.
Third-Party Software: Ensure that the "Third Party" section in the patch manager only displays non-Microsoft software. If Windows patches appear here, it is a configuration issue that needs to be addressed.
Applying Patches
Access Patch Manager: Navigate to the Patch Manager in CYRISMA.

Select Windows Patches: Choose the relevant roll-up KB articles that address system vulnerabilities.
Schedule Patching:
Auto-Patch Feature: Enable auto-patching for Windows and third-party applications.
Delay Options: Configure delay settings (e.g., 48-hour delay) to allow time for testing before deployment.
Patch Execution:
Patches are applied based on the schedule.
Tasks are created at midnight to deploy patches according to the configured delay.
Patch Verification
Patch History:
Review applied patches in the Patch History section.
Confirm the successful installation of updates and check for any errors.
Affected Systems:
View which machines are impacted by specific vulnerabilities.
Verify that the appropriate patches have been applied to these systems.
Common Issues & Troubleshooting
Windows Patches in Third-Party Section
Issue: Windows patches incorrectly appear under the third-party section.
Solution: This is a known issue and will be addressed in a future update. Ensure only non-Microsoft applications are listed under third-party patches.
Patch Roll-up Confusion
Issue: Users may be unsure which patches address specific CVEs.
Solution:
Reference the associated KB articles for details on included fixes.
Understand that Microsoft’s roll-up model bundles multiple CVEs into single patches.
Automated Patching Delays
Issue: Automated patches are not applied immediately.
Solution:
Confirm the delay settings in system configuration.
By default, patches may be scheduled with a 48-hour delay to allow for testing.
Best Practices for Windows Patching
Regular Patch Reviews:
Regularly review the patch manager to ensure all critical updates are applied.
Utilize Auto-Patching:
Enable auto-patching for both Windows and third-party applications to streamline the process.
Test Before Deploying:
Use delay settings to test patches in a staging environment before wide-scale deployment.
Monitor Patch Status:
Continuously monitor patch history and system status to ensure patches are applied successfully.
Stay Informed:
Keep up-to-date with Microsoft’s patch release notes and KB articles to understand the scope of each update.
Conclusion
Effective Windows patching is essential for maintaining a secure and stable IT environment. By leveraging CYRISMA’s patch management features and following best practices, organizations can ensure timely and accurate application of patches, reducing vulnerabilities and improving system integrity.
For further assistance or questions about Windows patching, please contact CYRISMA Support.