Best practices for Patch Management

Introduction

Datto RMM provides two different policy types to configure device patching: Windows Update and Patch Management.

This guide explains how to use these policies to control how your Windows PCs download, install, and report back data on Windows updates. It is intended for users who are new to Datto RMM, but the information may be relevant to users looking to refine their existing setups.

IMPORTANT  It is recommended to follow this guide as closely as possible.

Once you are familiar with how Patch Management works in Datto RMM, you can then introduce customizations by adjusting policies or by using overrides to configure behaviors for device subsets requiring more precise care (for example, SQL Servers).

Applicable operating systems

  • Windows 10 and Windows 11: This guide focuses on the current Windows-as-a-Service operating systems, which are still receiving standard updates.
  • Windows Server 2016 and newer: Because these operating systems are built on the Windows 10 (or newer) codebase, significant portions of this guide apply to them.

NOTE  This guide will indicate where server and workstation operating systems demand separate configurations.

Not applicable

  • Pre-Windows 10 desktop versions (discontinued).

NOTE  In a case where an older Windows OS receives an out-of-band update (for example, to patch a high-severity issue being actively exploited), consult the Windows Update Catalog for a download link to the relevant MSU file, which you will use alongside the Download and Apply Windows Update File components available from the ComStore.

  • This guide has not been tested for relevance with devices receiving Extended Security Updates (ESUs). Some or all of the information may not be pertinent to such devices.

Outline

As follows is an outline of what this guide will instruct you to do. If you are already experienced or on a tight deadline, this outline will prove sufficient.

  • (Optional) Run the Windows Update Toolkit component to ensure devices are patching properly and have expected WSUS options set. Refer to Step 0: Health check (optional).
  • Using a Windows Update policy:

    Refer to Step 1: Configuring a Windows Update policy.

  • Using a Patch Management policy:
    • Schedule Patch Management policies to run at noon on weekdays for workstations and under your own configuration for servers.
    • Configure reboots to happen outside of working hours, with a reminder for the user if the device is not available during reboot time.
    • Approve updates older than X days (where X is the deferment period you configured in your Windows Update policy).
      • (Optional) Alternatively, approve updates with the Security Update or Critical Update category.
    • Approve updates that do not contain the word Driver in the title except for on Microsoft Surface devices.
    • Do not approve updates with a type or category containing the word Driver except on Microsoft Surface devices.
    • Do not approve updates with a description or title containing the word Preview.

    Refer to Step 2: Configuring Patch Management policies for servers and workstations.

  • Also discussed:

Step 0: Health check (optional)

If you are newly onboarding devices into Datto RMM, we recommend running the Windows Update Toolkit component from the ComStore on them. Refer to ComStore.

In addition to providing a complete update and OS history of each device, which may be useful for bookkeeping, the component provides insight into the following:

  • How devices are configured today (WSUS, deferrals, and so forth)
  • If you are running Datto RMM with a Patch Management policy already configured, is it producing errors?
    • Or, did a previous Datto RMM installation leave remnant files that are interfering with the configuration?
  • Can the device connect successfully to the Windows Update service to download the updates it needs?
  • Is the Windows Update Agent installed on the OS causing patch audit failures? Refer to Patch status "No Data" on Windows 10 and 11 devices.

Step 1: Configuring a Windows Update policy

Windows Update policies determine how devices detect which patches are relevant for it and how they are handled. Refer to Windows Update policy.

Expand this section to learn how to disable automatic updates, configure the Semi-Annual update channel (or Windows Update for Business), enable week-long deferrals for feature and quality updates, configure active hours, and learn about other settings and options.

Step 2: Configuring Patch Management policies for servers and workstations

IMPORTANT  A device should have only one Patch Management policy targeting it at any given time. Datto recommends using separate policies for servers and workstations. This guide provides scheduling recommendations for both.

Patch Management policies determine which patches are selected for installation and when they are processed by the device. Refer to Patch Management policy.

Expand the following sections to learn how to configure Patch Management policies and why you should exclude Preview-type updates and Driver updates while permitting important updates.

Step 3: Handling feature updates

Feature updates are what Microsoft once referred to as service packs. They update the entire OS’s release version (for example, 24H2) while keeping the base OS (for example, Windows 11) the same. While they appear within patch scans, they should generally be handled separately.

Other considerations

  • It is recommended to patch servers and workstations separately as part of different Patch Management policies running at different times.
    Some users prefer to put servers on an Audit only schedule and manually perform updates (using Save and deploy now) as opposed to using a scheduler. This allows servers with specific requirements to be catered to individually (for example, Hyper-V servers must have all guest OSs suspended before the system is rebooted).
  • If you have a sufficiently large fleet of devices, you may consider putting some on seven-day deferral and more mission-critical devices on 14-day deferral. This will allow you to treat less crucial devices as test candidates before more mission-critical devices receive the same patches.
  • IMPORTANT  Clustered servers should be excluded from Patch Management policies. They need to use cluster-aware update services.

Supplementary reading