Patch Manager Root Cause Breakdown and Patch Execution

Last updated: December 23, 2025

Overview

Patch Manager in Cyrisma is built around the concept of root cause–driven remediation. Rather than focusing on individual CVEs in isolation, Patch Manager groups vulnerabilities by their underlying cause, allowing users to remediate multiple vulnerabilities efficiently through targeted patch actions.

This article explains how the Root Cause Breakdown works, how patch execution is initiated, and how to interpret patch results.


Root Cause Breakdown Explained

The Root Cause Breakdown is the primary working view within Patch Manager. It aggregates vulnerabilities discovered during scans and organizes them by the software, configuration, or operating system issue responsible for those findings.

Each row in the table represents a single root cause that may affect one or more endpoints.


Root Cause Table Fields

Each root cause entry displays the following information:

Root Cause
The application, component, or configuration issue responsible for one or more vulnerabilities.

Number of CVEs
The count of unique CVEs associated with that root cause. Selecting this value opens a detailed CVE list.

Severity
Visual indicators representing the highest severity level associated with the root cause.

Workstations and Servers
Counts of affected endpoints, separated by asset type. Selecting either value displays the impacted targets.

Total Vulnerabilities
The total number of vulnerabilities across all affected assets for that root cause.

Action
The Patch button, when available, allows scheduling or executing remediation.


Root Cause Filters

The Root Cause Breakdown includes filters that change both visibility and behavior.

Third Party

Displays third-party software detected on Windows endpoints.

Some third-party applications are patchable by Cyrisma, while others are informational only.

Only patchable third-party root causes display the Patch action.


Windows

This filter presents two distinct data sets:

Patchable Windows KB Updates
Displays Windows KB articles that can be patched through Patch Manager.

Windows OS-Level Root Causes
Displays operating system vulnerabilities and configuration-related findings that are not patchable through Patch Manager.

Only the KB patch table supports patch execution.


Linux

Displays Linux operating system–level root causes.

Linux root causes are not currently patchable through Patch Manager.


macOS

Displays macOS operating system–level root causes.

macOS root causes are not currently patchable through Patch Manager.


When the Patch Button Is Available

The Patch button appears only when all required conditions are met.

The Patch button will not appear if:

  • The application or root cause is not supported for patching

  • The endpoint was not scanned by its local agent

  • A patch was already applied but no follow-up scan has occurred

  • The vulnerability is configuration-based rather than software-based

Patch availability is always determined by the most recent scan results.


Scheduling Patch Execution

When the Patch button is selected, users can schedule remediation.

Patch scheduling behavior includes:

  • A single date can be applied across all affected targets

  • Individual scheduling can be adjusted per target

  • Patch execution respects configured Blackout Hours

  • Patches scheduled for offline systems execute when the agent checks in

Patch execution does not require a reboot unless the patched application explicitly requires one.


Patch Execution Behavior

Patch execution is performed by the local Cyrisma agent on each endpoint.

Execution characteristics:

  • Patches run locally on the host machine

  • Execution depends on agent availability and system permissions

  • Failures are recorded with detailed logs

  • Pending patches remain queued until executed or canceled

If a patch is pending, it can be canceled directly from Patch History.


Patch History and Verification

Patch History provides a full audit trail of remediation activity.

Patch History includes:

  • Target name

  • Agent responsible for execution

  • Software patched

  • Execution result

  • Initiating user

  • Timestamp of execution

Patch History entries can be searched and exported for reporting or audit purposes.


Patch Execution and Scanning Relationship

Patch Manager does not automatically refresh vulnerability data after patch execution.

To reflect remediation results:

  • A new vulnerability scan must be run

  • Root Cause Breakdown will update based on new scan data

Until a follow-up scan occurs, previously detected root causes may remain visible even if patching was successful.


Common Scenarios and Clarifications

Patches appear successful but vulnerabilities remain visible
A new scan has not yet been run.

Patch button missing for a known application
The application may be unsupported or was not scanned locally.

Windows KB appears in vulnerability scan but not Patch Manager
The KB may be superseded by a newer cumulative update.

Patch remains pending
The endpoint may be offline or within blackout hours.


Summary

The Root Cause Breakdown is the operational core of Patch Manager in Cyrisma. It enables efficient remediation by grouping vulnerabilities intelligently and executing patches at scale.

Key concepts to remember:

  • Root causes drive remediation, not individual CVEs

  • Patch execution depends on local agent scans

  • Patch Manager does not replace scanning

  • Follow-up scans are required to confirm remediation

Used correctly, Patch Manager allows teams to move from detection to remediation with clarity, control, and audit-ready visibility.