Patch Manager (Concepts & Behavior)

Last updated: December 23, 2025

Overview

Patch Manager in Cyrisma is the platform’s primary remediation engine for addressing patchable vulnerabilities identified during scanning. It enables users to remediate risk by applying supported patches directly to endpoints through installed agents.

This article explains:

  • What Patch Manager is and is not

  • What types of patches Cyrisma can apply

  • How Patch Manager determines patch eligibility

  • How Patch Manager relates to scans and mitigation plans

  • Key limitations and design considerations

This article is conceptual and behavior-focused. Step-by-step usage and configuration are covered in dedicated Patch Manager and Auto Patching articles.


What Patch Manager Is

Patch Manager is a remediation mechanism that applies patches directly to endpoints based on scan results.

It is used to:

  • Patch supported third-party applications

  • Apply Windows KB updates

  • Remediate certain security configuration findings that are patch-backed

Patch Manager operates at the instance level and is available within each client instance. For MSPs, similar functionality is available centrally through the Centralized Vulnerability Manager (CVM), which is documented separately.


What Patch Manager Is Not

Patch Manager is not:

  • A scan engine

  • A mitigation tracking system

  • A reporting or governance tool

  • A replacement for mitigation plans

Patch Manager does not:

  • Modify historical scan results

  • Automatically close mitigation plans

  • Track remediation ownership or documentation

  • Perform rollback of applied patches

Patch Manager executes remediation actions only.


Supported Patch Scope

Third-Party Applications

Patch Manager supports patching for a defined set of third-party Windows applications detected during internal authenticated scans. Only applications explicitly supported by Cyrisma are eligible for patching.

If an application appears in scan results but is not patchable, it may still appear as a root cause but will not display a Patch action.


Windows Updates

Patch Manager supports patching for Windows KB updates where applicable.

Important behavior:

  • Windows patching relies on Windows Update data reported by the endpoint

  • Vulnerability scans may reference older or superseded KBs

  • Patch Manager always reflects the latest cumulative update required by Windows

As a result, a KB may appear in vulnerability results but not appear directly in Patch Manager if it has been superseded.


Unsupported Platforms

Patch Manager does not currently patch:

  • Linux operating system vulnerabilities

  • macOS operating system vulnerabilities

Linux and macOS root causes may appear for visibility but are not patchable through Cyrisma at this time.


Dependency on Scanning

Patch Manager is scan-driven.

Key requirements:

  • An internal authenticated vulnerability scan must complete successfully

  • The affected endpoint must be scanned by its own local agent

  • Patch data is populated only after scan completion


Root Cause Breakdown Behavior

Patch Manager organizes remediation opportunities using Root Cause Breakdown.

Root causes represent:

  • Patchable third-party software

  • Patchable Windows KB updates

  • Non-patchable operating system findings

Filtering behavior:

  • Third Party shows detected third-party applications, some of which may be patchable

  • Windows displays patchable KB updates and OS-level vulnerability root causes

  • Linux displays OS-level Linux root causes, not patchable

  • macOS displays OS-level macOS root causes, not patchable

The Patch action appears only when Cyrisma supports patching for that root cause and the scan data is eligible.


Scheduling and Execution Model

Patch Manager executes patches through the Cyrisma agent installed on the endpoint.

Key behaviors:

  • Patches can be scheduled manually or applied automatically through Auto Patching

  • If an endpoint is offline, the patch remains pending until the endpoint checks in

  • Pending patches do not expire unless manually canceled

  • Reboots may be required depending on the patch, but are not always necessary

Patch execution is logged and visible in Patch History.


Relationship to Mitigation Plans

Patch Manager and mitigation plans are intentionally decoupled.

Important distinctions:

  • Applying a patch does not update or close an existing mitigation plan

  • Mitigation plans are created from static scan results

  • Users must document remediation actions manually within mitigation plans

  • A new scan is required to reflect remediation outcomes

Patch Manager provides execution.
Mitigation plans provide tracking, ownership, and evidence.

This separation ensures audit integrity and prevents automatic assumptions about remediation completion.


Relationship to Suppressions

Patch Manager does not suppress findings.

Suppressions:

  • Remove findings from future scan results

  • Are time-bound based on system configuration

  • Represent risk acceptance, not remediation

Patching and suppression are separate decision paths.


Key Limitations and Design Considerations

  • Patch Manager cannot roll back patches

  • Patch eligibility is limited to supported software

  • Scan data must be current and agent-based

  • Patch Manager does not distinguish between servers and workstations for execution logic

  • Governance and documentation are handled outside Patch Manager

These limitations are intentional and align with Cyrisma’s separation of execution and governance.


Summary

Patch Manager in Cyrisma is a focused remediation engine designed to apply supported patches directly to endpoints based on scan data.

It:

  • Executes remediation actions

  • Depends on completed internal scans

  • Operates independently of mitigation plans

  • Does not provide tracking or audit documentation

Patch Manager is most effective when used alongside mitigation plans and regular scanning to ensure remediation actions are both executed and properly documented