Tags
discoveries network management remote folder TLS TLS1.2 pci dss pci compliance ITarian Portal Endpoint Manager vdi environment vdi clone environment instant clone documentation vendor notice security dashboard events resolution remote tool partner onboard itarian unknown file hunter TLS Encryption procedure parameters pass profiles history performance metrics real time remote endpoints download browse Subscriptions service URL Security Components system Global Software Inventory 2 minutes Integrate intagrate Active Directory Portable Interception SSL enable reporting Rule Threat Protection Rule Advance spam Customize archived outgoing incoming administrator validate domains add Antispam type PCI data loss Location Network information start software session extensions appoinments resource connection computers Comodo Rescue Disk infected opportunity opportunities custom relationship management quote COMODO-CRM protect mac device email notifications registry COM Quarantined point system restore msi contained applications processes security client events Release date department registration particular os section Two Factor Authentication Login interface dashboard report generate Direct Download Link One drive Google drive HIPS mode cleanup automatic suspicious suspicious certificates shellcode injection detect Elevated Access system user access default charging groups move current malware list store push IP address ip installer acronis auto-remediation server machine icon Product Logos Rebrand backup Device Control data Chromoting WebRTC ports Protocol skip offline manual time entries ticket assignee Help Guide Tour schedule Reschedule appointment unknown application protection virtual desktop Local Verdict server manage calculation cost configuration charging SD contract prepaid hours products classification inventory analyze Device list OS patches global search bar Tool bar Windows Defender Security Center file group white Citrix record SPF work billable time onsite email template template variables emails Gmail SMTP disable Add collaborators admin action Audit logs feature requests submit vote remotely Reset proxy swg secure web gateway dome error disk ticket detail page thread section tickets section internal notes Sub-help topic help topic features Application control white_list Patch Management child parent scheduled customized get to headers columns company restrict customer technician remote access list iOS devices field Reports iOS device APN Certificate MAC OS X options Linux block Comodo Client Communication (CCC) allow Comodo Client Security (CCS) network zones active component tray icon hide show packages additional install block port baseline installation package bulk implement restrict firewall endpoints security and communication global export virus import Database folders files define exclusions change staff admin rating check reassign assign permissions new role create for user of device enroll associated use how profile specific Removing Devices Uninstall windows profile Configuration templates latest version clients comodo file ratings monitoring script procedure custom All Devices Ratings Track widgets Agent valkyrie malware files Kill chain report automated establishing endpoint remote session Users prevent Android organization windows assets Mac OS billing identified threats Sort Closed inside Program executed containment service desk remote control Locally runs update scan antivirus SLA Business Hours control CCS Password access Client Auto Specific Device Response Application Third party Status View Logs intended devices alert fails Company Information Configure Verdict Patch Procedures Executable Comodo Internet Security ITSM Analysis Command Line Heuristic Filter Unrecognized Trusted File Rate Malicious Purge Calendar Device Exclusion USB Admin Panel Settings ticket Default system-wide Specific Path Details Monitor Multi Set Currency Connected Who Quick Actions Comparison Version Enterprise Managed Service Provider C1 Portal Remote management Comodo Remote Control ticket management staff panel assign tickets
More

How to check patch status from the dashboard

Release Time
12/30/2018
Views
none
Category
Patch Management
Tags

  • The dashboard contains a series of charts which show real-time data about your managed devices.  Dashboard data comes from various ITarian modules, including Endpoint Manager, Service Desk and Quote Manager.
     
  • The January 2019 release brings three new charts related to patches – 'OS patches by classification', 'OS patches by severity' and 'Third Party Patches'.
     
  • Click on any column in a chart to open the patch details area in Endpoint Manager. This area lets you view further details about the patch and install it if required.
     
  • The dashboard is shown by default right after you login into C1/ITarian. You can also return to the dashboard at anytime by clicking the C1/ITarian logo at top-left. 
     
  • This article covers the three new patching charts on the C1/ITarian dashboard.

 

EM – OS Patches by classification

This chart shows available OS updates by type:

 

  • Update - Fixes a specific, non-critical problem. This type of patch does not address security-related bugs.
  • Definition update - Updates to a product's internal database. For example, an update to the virus signature database for Windows Defender.
  • Critical Update - Fixes a specific, critical OS problem or a critical security-related bug
  • Security update - Fixes a version specific, security related vulnerability.  Security updates are rated by severity – 'Critical', 'Important', 'Moderate' or 'Low'. There is a separate dashboard chart which shows a break-down of these security updates by severity.
  • Update rollup - A collection of updates, hotfixes, security updates and critical updates packaged together for easy deployment. These updates generally target a specific Windows component.
  • Driver - Adds software for controlling peripherals or add-on devices that could be connected to the endpoint
  • Feature pack - Adds new functionality distributed after an OS release.
  • Service pack - Contains a collection of updates, hotfixes, security updates, critical updates and additional fixes.
  • Tool - Installs a utility or feature for a specific task or a set of tasks.
  • Upgrades - Updates the Windows OS version on the endpoint to the latest build.

Click any column to view all patches of that type. For example, you will see the following screen if you click the 'Update' column:

 

 

From this screen, you can inspect and install patches or create a patch procedure.

 

EM – Total Security Patches by Severity

 

This chart classifies the 'Security Update' patches (see above) according to their severity:

 

  • Critical - Vulnerabilities that can be exploited without warnings or prompts. Examples include remote elevation of privileges exploits that allow attackers to write to the file system, or execute arbitrary code without user interaction.  Microsoft recommends you apply critical updates as soon as possible.
     
  • Important - A vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of users data. The distinguishing factor between critical and important is that important vulnerabilities show some warning or prompt to the user. For example, local escalation of privilege exploits or the execution of arbitrary code which requires extensive user action.

    Once, again, important updates should be applied as soon as possible.
     
  • Moderate – The likelihood of exploitation is mitigated to a large degree by factors such as default configuration, auditing, or difficulty of exploitation. Moderate vulnerabilities usually require specific scenarios, locations or other prerequisites. Microsoft recommends you consider applying moderate updates.
     
  • Low - A vulnerability whose exploitation is extremely difficult, or whose impact is minimal. Again, Microsoft recommend that you consider applying low severity updates at your discretion.
     
  • Unspecified – The security update was issued without a severity rating.
     

Click any column to view all patches of that severity level. For example, you will see the following screen if you click the 'Critical' column:

 

From this screen, you can inspect and install patches or create a patch procedure.

 

EM – Patches for third-party applications

 

This chart shows the number of patches available for third-party applications on your endpoints.

The X-axis shows the name of the application. The Y-axis shows the quantity of patches available for the application.

 

Click any column view all patches for the application. For example, you will see the following screen if you click the 'Adobe Air' column:

This screen lets you view all devices on which the patch is needed and install the patch if required.