As you begin to build out your new Automox organization, understanding what is available, and having access to best practices will help you to define your organization patch policy standards within the Automox console.
Each organization has its own unique challenges, and there is no one-plan-fits-all solution. This guide is designed to provide you with resources and recommendations to help you define the best use of Automox for your organization.
The following topics are described here:
- Policy Overview - View and Create Policies
- Notifications and Restarts
- Third-Party Software Updates
- Patch Status
- Patch Installation Methods
- Patch Scenarios
- Tips and Best Practices
Policy Overview - View and Create Policies
Types of Patch Policies
Patch All Except
Notifications and Restarts
Windows and macOS patch policies have Restart and Notification functionality built-in. They also have the ability to configure notifications and deferrals prior to patch installation, and before a device restarts.
To reset event notifications manually, use the following command:
sudo tccutil reset AppleEvents
If the amagent is not allowed to control Microsoft AutoUpdate, the latest version in the console will be empty and will not automatically update.
If Automox restarts on a BitLocker managed device, BitLocker is bypassed for the managed restart.
Notifications are currently not supported on Linux systems.
Third-Party Software Updates
Status icons and messages found in the console can be very helpful when checking into device health, connection status, or the state of a policy that is attempting to run, or currently running. Here are a few examples:
Excluded From Reports: This device is flagged as an exception and will not show up in reporting. We will still try to patch according to the policies assigned to the group that it is in.
Unmanaged: This device has been added to Automox, but the group it is in does not have any policies assigned to it.
Patch Installation Methods
The policy runs at the local time for each device defined within the policy.
If notifications are configured, a notification and the defined deferral option appear at the scheduled deployment time, allowing 15 minutes to respond.
If the Automatic Restart option is enabled in the policy, and one or more patches require a restart, the restart message is displayed. In any other scenario with Notifications, the Notification message is displayed.
If Automatic Restart is configured, a final restart notification is displayed after patches are installed allowing 15 minutes, but only if a restart is required to complete the patch installation. The user can click Restart now, or Close. If they select close, or do not respond to a restart notification, the computer will restart at the time specified.
If Restart notification deferrals are enabled, the policy defined deferrals are displayed within the restart notification.
When the If a device misses a patch window, patch it the next time the device checks in checkbox is selected, as long as the machine has run a scan between the time the policy was created, and the policy schedule time, the policy will run when the device next communicates with Automox.
Notifications are only displayed if there is an active user session (only if a user is logged on). If no user is logged in, installation and restart actions run automatically.
Manually Run Policy
You can manually run enabled and assigned policies at any time (this includes scheduled policies).
You can trigger a manual policy run from Device Details (for an individual device) or from the policy Actions menu (on all targeted computers at one time).
Manually running a policy will honor the Automatic Restart configuration, but will not display notifications.
Manually running a Worklet policy will ignore evaluation, and immediately run the remediation code.
Manually running a policy without a schedule set it the only way to trigger the policy to run.
You can install or uninstall (if applicable) updates from device details under the actions column drop-down menu.
No notifications are displayed and no restart is forced when manually installing an individual patch from the Actions drop-down menu.
You can manually trigger a restart after the patch from Devices, or device details.
Patch all like OS devices where patch is missing
You can install a patch for all like OS devices that show a patch is Awaiting installation. From the Software page, search for the patch of interest. One or more versions of the patch might be listed, because the software is displayed by OS as well as patch display name. You can see how many devices require the patch from the Impacted Devices column. (The number in this column is also a hyperlink to the device list of impacted devices). To the right, there is an action drop-down button where you can install the patch on all impacted devices.
Scenario: Patching Pilot - Policies and Groups
Patching a pilot group of systems before patching all production systems can help reduce potential risk incurred by installing updates to applications or operating systems. Here are a few tips:
Build pilot group(s) that include like or similar systems to your production systems. Include devices with the same operating systems, applications, and similar patch levels. This will help to build confidence that your production patch deployment will work as expected when deployed to your production groups.
Ensure that critical applications are reviewed after patching, allowing enough time to make adjustments should a patch negatively impact your app functionality.
Provide enough time to evaluate the pilot devices, to keep the timing between pilot and production releases as short as possible to ensure dynamic rules do not modify the patch set between testing and production deployments.
Example (This is an example, used for demonstration purposes. Please adjust for your environment.)
Build the following groups:
Pilot - Client Systems
Pilot - Servers
Production - Client Systems
Production - Server Systems 1
Production - Server Systems 2
Build the following policies:
Pilot - Client Patch all except (or Advanced)
Pilot - Server Patch All except (or Advanced)
Servicing Stack Updates Pilot
Servicing Stack Updates Client Production
Servicing Stack Updates Server Production
Production Client Patch all except (or Advanced)
Production Server Patch all except (Saturday 10:00pm)
Production Server Patch all except (Sunday 12:00am)
Schedule the Pilot policies to run every Wednesday at 12:00 PM, with restart .
Schedule the Client Production policy to run Fridays at 10:00 AM, Notify users before patching and allow deferral for both patching and restart. Install if the system is offline during scheduled time.
Schedule Servicing Stack Update Pilot policy to install at 10:00 AM every day. Install if the system is offline during scheduled time. No restart or notifications.
Schedule the Servicing Stack Update Client Production policy to run Thursdays and Fridays at 9 AM. No restart or notifications.
Schedule the Servicing Stack Update Server Production policy to run on Saturday at 9pm. No restart or notification .
Schedule the Production Server Patch all except (Saturday 10:00 PM) policy to run every Saturday at 10:00pm. Include restart without deferral .
Schedule the Production Server Patch all except (Sunday at 12:00 AM) policy to run at 12:00 AM every Sunday. Include restart without deferral .
Logic in this scenario:
The industry has determined that it takes an average of seven days for a bad character to take advantage of a new exploit. By patching weekly, you will test and deploy patches released within the previous 7 days.
Pilot and production deployments are scheduled closely together. This allows dynamic policy rules to remain more relevant than scheduling them far apart. As patches are released or superseded, some patches may be added or removed from the dynamic policy patch set. This is a potential drawback to this scenario. The trade off is a set-it and forget-it rule set with the ability to keep your environment up to date with little manual administration effort.
Patch schedules are simple and predetermined. This should simplify communications and employees can plan around the patch schedules.
Tips and Best Practices
Tip: Policies are not inherited based on group hierarchy/structure. Policies must be directly assigned to each group where you want it to be applied.
Tip: Search filters are very helpful. Use a predetermined naming convention for your groups and Policies to get quick views of relevant objects. If you search for Worklet, Patch, or Required Software in the Policies filter, it will filter to that type of policy.
Tip: Each managed device will need access to all update sources when scans and policies run. Notable updates sources are:
WSUS server (if used in your environment)
Here are API scripts (PowerShell) to create the patch policies from the previous Recommended Best Practices article:
Primary Patch Policy
Servicing Stack Update Policy
Windows 10 Feature Update Policy
Optional: Defender Definition Update Policy
Note: Policy rules are best suited for English-based systems. Use of Advanced policies might be more appropriate than Patch All Except policies when international language support is required (when standardized rule sets are preferred).
Integration with WSUS provides a way for you to cache Microsoft updates on-premise to reduce download bandwidth. Third-party updates are not stored in WSUS, and are downloaded from the internet directly.
When you set your Group OS Patch Management "Windows Update Source" to WSUS, and you define your WSUS Server Address, your device will scan for Microsoft-based updates and determine compliance and applicability using your WSUS server as the update source. (Note: you can also use the “Keep Device Settings” options if WSUS policies are already applied and preferred).
Make sure to configure WSUS Products and Classifications to include everything needed, as only the patch metadata available in your WSUS DB (the patches included in the cab downloaded from WSUS) is used to determine what patches are available for compliance or download.
At Scan Time
Automox will direct the device's WU agent to scan for updates against its update source. In this case it will scan against WSUS.
At Policy Run Time
Automox will direct the devices WU agent to download and install the updates it detected in a needed state. It will also verify third-party applications included in the patch policy, and will download them from the internet.
Tip: If you configure your group to use WSUS, your device MUST have access to your WSUS server when scans and policies run.
GPO vs Automox Group settings
GPO and Automox Group Patch Management settings can conflict. GPO Windows Update settings will apply based on the domain schedule (default every 90 minutes).
Automox Patch Management Settings will apply based on the group defined scan interval. If they are different, your device could toggle between patch sources, or temporarily go to default.
This can cause misalignment in needed patches and potentially install updates or feature updates directly from the internet. We suggest using the Automox group Patch Management Settings, and removing the WU settings from GPO to avoid this type of issue.
WU Error codes
Patch troubleshooting resources:
Windows Update Agent and WSUS troubleshooting
Exclusion - Block list