Patch Management
Know how Patch Management helps in deploying and managing the patches.
What is Patch Management?
A patch is a piece of software code applied after the software program is installed to rectify an issue within it. Generally, the software applications roll out several patches after their initial release and keep on releasing the versions to fix any vulnerabilities or bugs in an application. Patch management is the process of managing a network of computers by regularly distributing and applying the updates to software. These patches are often necessary to correct errors.
Benefits
For organizations owning multiple servers and computers, updating patches manually can be both time-consuming and challenging. It can also increase business risks if any critical vulnerability is left unforeseen. The following are the few reasons why Patch Management should be considered:
- Security: It fixes vulnerabilities on software and applications that are susceptible to cyber-attacks, helping the organization reduce its security risk.
- System Reliability: It ensures that software and applications are updated and run smoothly.
- Feature and Functional Improvements: It can go beyond application fixes by providing updates in its feature or functionality.
- Compliance: With the continuous rise in cyber-attacks, organizations require to maintain a certain level of compliance. Patch management is a necessary piece of adhering to compliance standards.
Working
The working of Patch Management depends on whether a patch is being applied to a stand-alone system or to a multiple computer network. While the system is in stand-alone mode, the OS and the applications, will periodically perform an automatic check to see if any patches are available. If found any, the patches will be downloaded and installed automatically.
In contrast to the above, in organizations with huge IT Infrastructure, checking for patches and deploying them on individual computer is a complicated and time-consuming process. In order to overcome this, the larger organizations undergo a centralized patch management rather than manually allowing each computer to download its own patches. Also, conducting centralized patching helps to conserve the Internet bandwidth. Instead of downloading individual patches across all the computers, the server can download, and distribute the patch to all the computers available on the network. This saves the bandwidth consumption.
For security purpose,
When patches (updates or fixes for software) are applied to Red Hat or CentOS systems, it's crucial to ensure the integrity and authenticity of these patches.
The process involves:
Downloading the Patch: The system downloads the patch file from the official source (e.g., Red Hat repositories).
Generating a Checksum: Once the patch file is downloaded on the motadata file server, the Motadata Serviceops application generates a checksum for the file using the SHA-256 algorithm.
noteSHA-256 (Secure Hash Algorithm 256-bit) is a cryptographic hash function that takes an input (or 'message') and returns a fixed-size, 256-bit hash value. It is widely used to ensure data integrity because even a small change in the input will produce a drastically different hash.
Checksum Comparison: Red Hat provides a checksum (hash value) for each patch file they release. This checksum is published alongside the patch file itself.
The generated checksum of the downloaded patch file is compared with the checksum provided by Red Hat. If the checksums matches, it means the file is authentic and has not been tampered with or corrupted during the download process. If they do not match, it indicates a potential issue, such as corruption or tampering, and the patch should not be applied.
Motadata ServiceOps streamlines the process through a centralized patch management repository. This retrieves patches available through third-party application websites and distributes them to the computers on the organization's network.
Architecture
The ServiceOps Architecture includes below:
- Main Server hosted on Cloud and File Server on Premise
- Main Server and File Server hosted on Premise
- Main Server and File Server hosted on Cloud
- Remote Office
a. Main Server hosted on Cloud and File Server on Premise
The architecture mainly consists of the following components:
- Central Patch Repository
- ServiceOps Main Server (Cloud)
- File Server (On Premise)

As shown above, the Motadata Central Patch Repository checks the Internet repeatedly to draw latest patch information from the third-party application websites and stores it. The local patch database regularly updates itself by pulling the updated patch details from the central repository.
The ServiceOps Main server, located in the cloud, synchronizes with the central repository. It periodically downloads the updates and vulnerabilities available in the database.
The scan will automatically determine which updates are needed on each client system, taking into account the operating system, build version, application, and update dependencies. Resulting to this, the missing patch details along with the respective severity for individual computer will be identified and installed into the database.
The entire process of information gathering, patch analysis, and publishing the latest vulnerability database occurs periodically. The updated patches are available for access once the Central Patch Repository and the ServiceOps server both are synchronized. ServiceOps also supports manual sync for patch updates. Comprehensive views of Patch-wise Systems and System-wise patches with installation status can be viewed on the ServiceOps portal.
After the missing and installed patches are listed, an approval is needed for updating the missing patches into the system. Approved patches are then downloaded from the third-party website on File Server and stored. These patches are then pushed on to the targeted systems for installation as per the deployment policy. Installed patches and service packs are verified and deployed on the systems. These can effectively generate reports for the purpose of monitoring and security compliance.
b. Main Server and File Server hosted on Premise
The architecture mainly consists of the following components:
- Central Patch Repository
- ServiceOps Main Server (On Premise)
- File Server (On Premise)

As shown above, the Motadata Central Patch Repository checks the Internet repeatedly to draw latest patch information from the third-party application websites and stores it. The local patch database regularly updates itself by pulling the updated patch details from the central repository.
The ServiceOps Main server synchronizes with the central repository. It periodically downloads the updates and vulnerabilities available in the database.
The scan will automatically determine which updates are needed on each client system, taking into account the operating system, build version, application, and update dependencies. Resulting to this, the missing patch details along with the respective severity for individual computer will be identified and installed into the database.
The entire process of information gathering, patch analysis, and publishing the latest vulnerability database occurs periodically. The updated patches are available for access once the Central Patch Repository and the ServiceOps server both are synchronized. ServiceOps also supports manual sync for patch updates. Comprehensive views of Patch-wise Systems and System-wise patches with installation status can be viewed on the ServiceOps portal.
After the missing and installed patches are listed, an approval is needed for updating the missing patches into the system. Approved patches are then downloaded from the third-party website on File Server and stored. These patches are then pushed on to the targeted systems for installation as per the deployment policy. Installed patches and service packs are verified and deployed on the systems. These can effectively generate reports for the purpose of monitoring and security compliance.
c. Main Server and File Server hosted on Cloud
The architecture mainly consists of the following components:
- Central Patch Repository
- ServiceOps Main Server (Cloud)
- File Server (Cloud)

As shown above, the Motadata Central Patch Repository checks the Internet repeatedly to draw latest patch information from the third-party application websites and stores it. The local patch database regularly updates itself by pulling the updated patch information from the central repository.
The ServiceOps Main server, located in the cloud, synchronizes with the central repository. It periodically downloads the updates and vulnerabilities available in the database.
The scan will automatically determine which updates are needed on each client system, taking into account the operating system, build version, application, and update dependencies. Resulting to this, the missing patch details along with the respective severity for individual computer will be identified and installed into the database.
The entire process of information gathering, patch analysis, and publishing the latest vulnerability database occurs periodically. The updated patches are available for access once the Central Patch Repository and the ServiceOps Main server get synchronized. ServiceOps also supports manual sync for patch updates. Comprehensive views of Patch-wise Systems and System-wise patches with installation status can be viewed on the ServiceOps portal.
After the missing and installed patches are listed, an approval is needed for updating the missing patches into the system. Approved patches are then downloaded from the third-party website on the File Server and stored in the cloud. These patches are then pushed on to the targeted systems for installation as per the deployment policy. Installed patches and service packs are verified and deployed on the systems. These can effectively generate reports for the purpose of monitoring and security compliance.
d. Remote Office

In the Remote Office setup, the Distribution Server is installed as a component. It synchronizes the missing patch details from the ServiceOps server and downloads the missing patches. The downloaded patches are further distributed to the clients for patch deployment. On completion of the successful deployment, the status is updated to the server.
Prerequisites
Internet Connectivity ServiceOps requires Internet connectivity for the following purposes:
- For updating the Patch Vulnerability from Central Patch Repository.
- For downloading patches from the third-party application website.
Proxy settings will be needed to be configured for production patch management, as direct Internet connectivity will not be available.
Storage As a part of Patch Management, the File Server needs to be installed. It is used for maintaining the downloaded patch and pushing them to the managed clients. As a part of maintenance, space availability check and old data clean up needs to be performed.
For Windows patch management, the 'Windows Update' service should not be disabled.
The ServiceOps patchcentral url "https://patchcatalog.motadataserviceops.com/" must be accessible.
For Windows Patch Management, the following URLs must be accessible:
- http://windowsupdate.microsoft.com
- http://*.windowsupdate.microsoft.com
- https://*.windowsupdate.microsoft.com
- http://*.update.microsoft.com
- https://*.update.microsoft.com
- http://*.windowsupdate.com
- https://catalog.sf.dl.delivery.mp.microsoft.com
- https://catalog.s.download.windowsupdate.com
- https://*.microsoft.com
- http://*.microsoft.com
For Linux Patch Management, the following URLs must be accessible:
View the URLs
- pardus.download.url: https://depo.pardus.org.tr/pardus/
- centos.download.alternative.urls: http://centos.mirrors.estointernet.in
- centos.download.base.url: https://mirror.esecuredata.com/centos
- centos.download.urls: http://centos.mirrors.estointernet.in,http://mirror.centos.org/centos
- ubunt.download.urls: http://in.archive.ubuntu.com
- debian.download.urls: http://ftp.us.debian.org/debian/
- opensuse.download.urls: https://download.opensuse.org
- redhat.download.urls: https://cdn.redhat.com/
- alma.download.urls: https://repo.almalinux.org/almalinux/
- rocky.download.urls: https://dl.rockylinux.org/pub/rocky/
- oracle.download.urls: https://yum.oracle.com/
For Mac Patch Management, the below URL must be accessible:
For Third-Party Patch Applications, the below URLs must be accessible:
View the URLs
- Google: https://dl.google.com/
- Mozilla Firefox: http://download.cdn.mozilla.net/
- Adobe: https://ardownload2.adobe.com/
- WinRAR: https://www.rarlab.com/
- 7zip: https://github.com/ip7z/7zip/releases/download
- Microsoft Office: https://www.microsoft.com/hi-in/download, https://officecdn.microsoft.com/
- Notepad++: https://github.com/notepad-plus-plus/notepad-plus-plus/releases/
- Albony: https://mirror.del.albony.in/*
- Slack: https://slack.com/intl/*
- GitHub: https://github.com/*
- Zoom: https://zoom.us/*
- Mozilla: https://product-details.mozilla.org/*
- PuTTY: https://www.chiark.greenend.org.uk/~sgtatham/putty/*
- TightVNC: https://www.tightvnc.com/*
- LibreOffice: https://download.documentfoundation.org/libreoffice/*
- Docker: https://docs.docker.com/desktoSourcefpe
- Tortoise SVN: https://sourceforge.net/projects/tortoisesvn/*
- Wireshark: https://www.wireshark.org/*
- Node.js: https://nodejs.org/dist/*
- Sourceforge: https://sourceforge.net/p/winscp/*
Supported Devices
| Windows Client OS | Windows Server OS | Linux Client OS |
|---|---|---|
|
|
|
Supported Linux OS Version List:
| Linux OS | Version |
|---|---|
| Ubuntu |
|
| CentOS | 10 Stream, 9 Stream, 9 |
| RedHat | 10, 9.6, 9.5, 9, 8, 7 |
| Mint | 21, 22, and its sub-versions |
| openSUSE | 15.6 |
| Debian | 12, 11 |
| Oracle Linux | 9, 8, 7 |
| Alma Linux | 9.6, 10 |
| Rocky Linux | 9.6, 10 |
To sync the Ubuntu and Mint OS Patches with the Central Repository, kindly upgrade the server to the latest ServiceOps v8.5.0. Backward compatibility is not supported.
Supported Client macOS Upgrade Version List:
| mac OS Version Number | Version Name |
|---|---|
| 15.x | Sequoia |
| 10.15 | Catalina |
| 10.16 | Big Sur |
| 12 | Monterey |
| 13 | Ventura |
| 14 | Sonoma |
Supported Windows Third-Party Patch Applications:
View the applications
| Application | Remarks |
|---|---|
| Hugin | Panorama photo stitcher. |
| Accessibility Insights for Windows | Helps developers find and fix accessibility issues. |
| Colour Contrast Analyser | Tool for checking color contrast. |
| Double Commander | Cross-platform open source file manager. |
| FrostWire | Free and open source BitTorrent client. |
| CrystalDiskInfo | HDD/SSD utility. |
| Hale Studio | Open-source data transformation tool. |
| CellProfiler | Open-source software for quantitative analysis of biological images. |
| GanttProject | Free project scheduling and management tool. |
| Cloudflared | Cloudflare Daemon for Argo Tunnel. |
| FontBase | Cross-platform font manager. |
| UltraViewer | Remote desktop support software. |
| Visual Studio Code | Popular code editor. |
| GIMP | Image manipulation program. |
| Fiddler Everywhere | Web debugging proxy. |
| Opera | Web browser. |
| DBeaver | Universal database tool. |
| Gpg4win | Encryption software for files and emails. |
| DAX Studio | Tool for working with DAX queries. |
| CMake | Cross-platform build system generator. |
| grepWin | Powerful search tool for Windows. |
| Graphviz | Graph visualization software. |
| GitHub CLI | Command line interface for GitHub. |
| Sejda PDF Desktop | PDF editor. |
| Archi | ArchiMate modelling tool. |
| Cyberduck | FTP, SFTP, WebDAV, Amazon S3, OpenStack Swift, Backblaze B2, Microsoft Azure & Google Drive browser. |
| HeidiSQL | Free client for MySQL, MariaDB, PostgreSQL, MS SQL, SQLite, and InterBase/Firebird. |
| DB Browser for SQLite | Visual tool to create, design, and edit SQLite database files. |
| Geany | Lightweight IDE. |
| Cherrytree | Hierarchical note-taking application. |
| Draw.io | Diagramming software. |
| GlobalProtect | VPN client. |
| Graylog Sidecar | Collector for Graylog. |
| GLPI Agent | Inventory agent for GLPI. |
| Audacity | Audio editor. |
| Bambu Studio | Slicer software for Bambu Lab 3D printers. |
| HandBrake | Video transcoder. |
| Darktable | Photography workflow application and raw developer. |
| Google Chrome | Supported on Windows & Windows Server v2019/2022. Widely used browser, regular updates. |
| Mozilla Firefox | Open-source browser. |
| WinSCP | Secure file transfer client. |
| Adobe Acrobat Reader | For PDF viewing and editing. |
| Adobe Acrobat DC | For PDF viewing and editing. |
| Adobe Acrobat Reader DC MUI | For PDF viewing and editing. |
| Docker Desktop | Virtualization software for containerized applications. |
| WinRAR | Supported on 64-bit machines only. Popular compression tool. |
| 7-Zip | Free and open-source compression software. |
| Microsoft Office | Essential productivity suite. |
| LibreOffice | Free and open-source office suite. |
| Notepad++ | Lightweight source code editor. Supports various programming languages. |
| Node.js | JavaScript runtime environment. |
| VLC Media Player | Open-source multimedia player. Supports a wide range of audio and video formats. |
| Wireshark | Network protocol analyzer. |
| Zoom | Video conferencing tool for meetings, webinars, and collaboration. |
| Git for Windows | Version control system for developers. |
| PuTTY | Lightweight SSH and telnet client for remote access and management. |
| PeaZip | Free compression utility. Supports over 150 archive formats. |
| Thunderbird | Open-source email client with calendar and chat integration. |
| OBS Studio | Free and open-source software for video recording and live streaming. |
| OpenVPN | Secure VPN client for private and encrypted internet connections. |
| Slack | Messaging app for teams. Enables real-time collaboration and file sharing. |
| Brave Browser | Privacy-focused browser with built-in ad and tracker blocking. |
| Chocolatey GUI | Graphical interface for Chocolatey. Simplifies Windows package management. |
| TightVNC | Remote desktop control software. Lightweight and easy to use. |
| TortoiseSVN | A Subversion client for Windows. |
- Third-party application patches installed at custom path locations are not supported.
- Notepad++ patching is supported only for versions 8.5.6 and above. Installing or detecting versions lower than 8.5.6 may result in patching issues due to version formatting discrepancies.
- To perform Microsoft Office patch management,
- The Main File server must be installed on Windows OS.
- Not supported in DMZ and Proxy servers.
- ServiceOps Patch Management supports patching of Microsoft Office applications only if Click-to-Run (C2R) is enabled. To verify this, follow the below steps:
- Open the Task Manager by pressing the Ctrl + Shift + Esc key or simply right click on the Task bar and select the Task Manager option.
- Go to the Processes tab.
- Look for the process OfficeClickToRun.exe:
- If present, Click-to-Run is enabled.
- If not, Office may be MSI-based and not supported for patching.
Not Supported Windows Patch Categories:
- Drivers Patches
- BIOS Patches
Supported Patch Categories:
| Tools | Feature Packs | Service Packs |
| Update Rollups | Definition Updates (Antivirus Definition Updates) | Critical Updates |
| Updates | Hotfix | Security Updates |
The steps required to be carried out in the ServiceOps portal for Windows and Linux Patch Management would be the same. The user just needs to change the OS specific field and related application as shown in the Automatic Patch Test and Automatic Patch Deployment.