Configuring Patch Manager

Last updated: December 23, 2025

Overview

Patch Manager configuration in Cyrisma controls how and when supported patches are applied to endpoints after vulnerabilities are detected. These settings apply to third-party application patching and define the automation, timing, exclusions, and maintenance windows used during remediation.

This article explains the available Patch Manager configuration options, how Auto Patching works, and how these settings influence patch behavior across an instance.

This article focuses on configuration concepts and behavior. Detailed patch execution and tracking are covered in separate Patch Manager and Patch History articles.


Where Patch Manager Configuration Lives

Patch Manager configuration is accessed from within a client instance.

Configuration settings apply only to the current instance and affect all endpoints associated with that instance unless explicitly excluded.

Patch configuration does not apply globally across multiple instances.


Patch Configuration Panel

Patch Manager includes a Patch Config option that opens a configuration modal. This modal defines how Cyrisma handles automated and manual patching behavior.

The configuration options include:

  • Auto Patching toggle

  • Auto Patch Installation Delay

  • No Install List

  • Third Party Patch Exclusions

  • Blackout Hours

Each setting influences how patches are queued and executed.


Auto Patching

Auto Patching enables Cyrisma to automatically apply patches for supported third-party applications after vulnerabilities are detected.

When Auto Patching is enabled:

  • Cyrisma queues patches automatically

  • No manual Patch action is required

  • Patch execution follows the configured delay and blackout rules

Auto Patching applies only to supported third-party applications. It does not apply to Windows operating system updates or unsupported software.


Auto Patch Installation Delay

The Auto Patch Installation Delay defines how long Cyrisma waits before applying a patch after a vulnerability is detected.

Available delay options are:

  • 12 hours

  • 24 hours

  • 36 hours

  • 48 hours

  • 72 hours

The delay begins after a successful internal authenticated vulnerability scan identifies a patchable vulnerability.

This delay allows time for:

  • Validation and testing

  • Internal change approval

  • Customer notification

If Auto Patching is disabled, this delay setting has no effect.


No Install List

The No Install List allows administrators to exclude specific host machines from patching.

Behavior:

  • Hosts selected in this list will never receive patches from Cyrisma

  • Applies to both manual and automatic patching

  • The exclusion is instance-specific

This setting is commonly used for:

  • Sensitive servers

  • Legacy systems

  • Devices managed by alternative patching tools

Excluded hosts will continue to appear in scan results but will not receive patch actions.


Third Party Patch Exclusions

Third Party Patch Exclusions allow administrators to prevent Cyrisma from patching specific third-party software across the instance.

Behavior:

  • Selected software will not be patched on any endpoint

  • Applies to both manual and automatic patching

  • Software may still appear as a root cause in scan results

This is commonly used when:

  • Software is managed by a separate update process

  • Vendor-specific update controls are required

  • Compatibility concerns exist

Exclusions do not suppress vulnerabilities. They only prevent patch execution.


Blackout Hours

Blackout Hours define a maintenance window during which patches cannot be applied.

Key behavior:

  • Applies to both manual and automatic patching

  • Patches will not execute during blackout periods

  • Patches cannot be scheduled during blackout periods

Configuration details:

  • Two time values are selected

  • Times are configurable in 30-minute increments

  • The blackout window repeats daily

Blackout Hours are typically used to prevent patching during:

  • Business hours

  • Critical operational periods

  • Maintenance freeze windows


Interaction with Scanning

Patch Manager configuration depends on scanning behavior.

Important considerations:

  • Auto Patching only triggers after an internal authenticated scan

  • Patch eligibility is determined by scan results

  • Changes to configuration do not retroactively apply to completed patches

If scan data is outdated, Auto Patching will not trigger until a new scan completes.


Interaction with Mitigation Plans

Patch Manager configuration does not affect mitigation plan behavior.

Key points:

  • Patching does not automatically update mitigation plans

  • Mitigation plans remain static until a new scan is run

  • Users must document patching actions manually in mitigation plans

Patch Manager handles execution.
Mitigation plans handle governance and documentation.


Configuration Best Practices

  • Enable Auto Patching only for environments with regular scanning

  • Use installation delays to allow validation time

  • Exclude sensitive systems using the No Install List

  • Use software exclusions for externally managed applications

  • Define blackout hours before enabling automation

These practices help prevent disruption while maintaining consistent remediation.


Summary

Patch Manager configuration in Cyrisma defines how automated and manual patching behaves across an instance.

Configuration controls:

  • Whether patches are applied automatically

  • When patches are applied

  • Which hosts and applications are excluded

  • When patching is allowed to occur

Proper configuration ensures predictable, controlled remediation aligned with operational requirements.