Auto Patching Behavior, Limitations, and Best Practices
Last updated: December 23, 2025
Overview
Auto Patching in Cyrisma is an automated remediation mechanism that applies patches for supported third-party applications after vulnerabilities are detected during scanning. The feature is designed to reduce manual effort, improve remediation speed, and maintain consistent security posture across endpoints.
This article explains how Auto Patching behaves, its intentional limitations, and best practices for using it safely and effectively.
How Auto Patching Works
Auto Patching operates on a scan-driven model.
The process follows this sequence:
An internal authenticated vulnerability scan runs on an endpoint
The scan detects a vulnerability tied to a supported third-party application
Cyrisma determines whether the application is patchable
If Auto Patching is enabled, the patch is queued automatically
The patch is applied after the configured installation delay
Patch results are recorded in Patch History
Auto Patching does not run independently of scanning. It is fully dependent on fresh scan data.
Supported Scope
Auto Patching applies only to:
Supported third-party applications
Endpoints scanned using internal authenticated scans
Auto Patching does not apply to:
Windows operating system updates
Unsupported or custom applications
Linux or macOS operating system vulnerabilities
External vulnerability scan results
Windows OS patching must be managed manually or through other tooling.
Timing and Execution Behavior
Auto Patching timing is governed by Patch Manager configuration.
Key behaviors include:
Patches are applied only after the Auto Patch Installation Delay expires
Delays begin at the time the vulnerability is detected, not scan start time
Blackout Hours override both manual and automatic patch execution
If a host is offline, patches are applied when the host checks in
Auto Patching does not retry indefinitely. Successful execution requires the agent to be online and functional.
Relationship to Mitigation Plans
Auto Patching and mitigation plans are intentionally decoupled.
Important distinctions:
Auto Patching performs remediation
Mitigation plans track and document remediation actions
Auto Patching does not automatically complete mitigation plan items
Mitigation plans do not update dynamically after patching
To reflect remediation in a mitigation plan:
A new scan must be run
The updated scan results must be reviewed
Actions must be documented manually within the mitigation plan
This separation ensures mitigation plans remain accurate historical records.
Known Limitations
Auto Patching has several intentional limitations that should be clearly understood.
No Rollback Capability
Once a patch is applied:
Cyrisma cannot automatically undo the patch
Rollbacks must be handled manually on the endpoint
This applies to both manual and auto-applied patches
Because of this, Auto Patching should be enabled only where rollback risk is acceptable.
No Server vs Workstation Separation
Auto Patching does not currently distinguish between:
Servers
Workstations
All eligible endpoints are treated equally unless excluded using configuration controls.
This makes host exclusions and blackout hours critical in mixed environments.
Scan Dependency
Auto Patching requires:
Successful internal authenticated scans
Updated scan data
If scans are not running regularly:
Auto Patching will not trigger
Vulnerabilities may remain unpatched
Third-Party Only
Auto Patching is limited to third-party applications supported by Cyrisma.
It does not:
Patch Windows KB updates
Modify operating system configurations
Address configuration-based vulnerabilities
Best Practices for Auto Patching
Enable Auto Patching Gradually
Start with low-risk applications
Validate patch behavior before broad rollout
Monitor Patch History closely during initial use
Use Installation Delays Strategically
Set delays to allow validation and approval
Use longer delays in production environments
Adjust delays based on operational maturity
Configure Blackout Hours Early
Define blackout windows before enabling automation
Prevent patching during business-critical periods
Ensure blackout windows align with maintenance policies
Use Exclusions Thoughtfully
Exclude sensitive systems using the No Install List
Exclude software managed by other tools
Review exclusions periodically
Maintain Regular Scanning
Schedule internal authenticated scans consistently
Ensure agents remain online and healthy
Treat scanning as a prerequisite for remediation
When Auto Patching Is Not Appropriate
Auto Patching may not be suitable when:
Strict change control processes exist
Rollback capability is mandatory
Servers require manual approval for changes
Applications are highly customized
In these cases, manual patching combined with mitigation plans may be more appropriate.
Summary
Auto Patching in Cyrisma is designed to automate third-party remediation while preserving control and auditability.
Key characteristics:
Scan-driven execution
Third-party application scope
No automatic rollback
Decoupled from mitigation plans
When configured correctly and supported by consistent scanning, Auto Patching can significantly reduce remediation effort without sacrificing governance.