When does it make sense to decline patches?
- A patch is known to cause compatibility issues
- A patch is known to compromise the system security
- A patch needs extensive testing
- A patch violates compliance standards and regulations
- A patch may arise license issues with legacy apps
- A patch is irrelevant or optional
How to review and decline updates?
Action1 enables you to assess patches before distribution. The Update Approval dashboard lists all pending third-party patches and Windows updates. Before a review, all patches are assigned the New status. Once you review and test a hotfix (for example, by installing it to a small group of test endpoints), select Actions and either approve or decline a patch.
Filtering out updates by their status helps you discover declined patches.
What does excluding updates entail?
Declining problematic patches is a step of the patch management procedure that safeguards your system and makes it accountable. By marking the patch declined, you attest that the patch has been reviewed and hasn’t passed your quality gate. Action1 restrains you from occasionally installing a declined patch while still keeping its details in the system. Such patches can be eventually installed after extensive testing and approval sign-off — be sure to change its status to New or Approved before attempting a new rollout.
Try Action1 Free Patch Management Solution
Unlike many “free” products, Action1 is NOT a disguised free trial bait, and your data is never sold for ads. Every organization – small, large, MSP – gets 100 endpoints free, forever. Subscribe any time to cover beyond 100.
Who benefits and why?
- Small: Grow big first. We’ll reap the growth benefits together later.
- Large/MSP: Start small. Subscribe company-wide when needed.
- Action1: Word-of-mouth displaces old RMMs and propels Action1 to the top.
- Everyone: Feedback from free users builds the best RMM in the world.