Understanding Patch Status, Pending Updates, and Rollbacks
Last updated: December 23, 2025
This article explains how patch status is tracked in Cyrisma, why patches may remain visible after being applied, how pending patches behave when devices are offline, and why patches applied through Cyrisma cannot be automatically rolled back.
How Patch Status Is Determined in Cyrisma
Cyrisma determines patch status based on:
Scan results
Agent check-ins
Operating system feedback after patch application
In some cases, patch status may not update immediately due to system-level requirements or device availability.
Why Patches May Still Appear After Being Applied
Common Cause: Reboot Required
A patch that has been successfully installed may continue to appear in vulnerability results if the device has not been rebooted.
This occurs because:
Some patches are not fully applied until a reboot completes
The system continues to report the vulnerability until the reboot finalizes the change
Recommended Actions
Confirm the patch was successfully applied using system or patch logs
Reboot the device
Allow time for the agent to check in
Run a new vulnerability scan to refresh status
Manual Rescans and Status Refresh
If patches still appear after a reboot:
Initiate a manual vulnerability scan for the affected device
Verify that the scan completes successfully
Recheck the vulnerability or patch status
This ensures Cyrisma has updated data from the endpoint.
Pending Patches on Offline Devices
Why Patches Remain Pending
If a workstation or server is offline:
The agent cannot receive patch instructions
The patch remains in a Pending state
Important Notes
Pending patches do not expire
The patch remains pending until:
The device comes back online and checks in, or
The patch assignment is manually canceled
Once the device reconnects, the agent automatically attempts to apply the pending patch.
Canceling a Pending Patch
If a patch should no longer be applied:
Manually cancel or delete the pending patch assignment in Cyrisma
Canceling a patch prevents it from executing even if the device later reconnects.
This should only be done if the patch is confirmed to be unnecessary or no longer applicable.
Why Patches Cannot Be Automatically Rolled Back
When Cyrisma applies a patch or configuration change:
The change is executed at the system level
There is no automated rollback mechanism within the platform
This design:
Ensures consistent security baselines
Prevents partial or unstable reversions
Reduces the risk of reintroducing known vulnerabilities
What to Do If a Patch Needs to Be Undone
If a rollback is required:
Identify the specific patch or configuration change
Follow manual remediation steps appropriate for the operating system or application
Contact Cyrisma Support for guidance if needed
Manual rollback is required in all cases.
Best Practices to Avoid Patch Issues
Reboot systems after patching unless explicitly stated otherwise
Ensure devices are online and checking in regularly
Schedule scans after patch windows to refresh vulnerability data
Suppress vulnerabilities that should not be auto-patched in sensitive environments
Maintain backups before applying significant updates
Summary
Patches may remain visible until a reboot and rescan occur
Offline devices retain pending patches indefinitely
Pending patches execute automatically when devices reconnect
Cyrisma does not support automatic patch rollbacks
Manual intervention is required to undo applied patches
Understanding patch lifecycle behavior in Cyrisma helps ensure accurate vulnerability reporting and avoids unnecessary troubleshooting.