Patching

%3CLINGO-SUB%20id%3D%22lingo-sub-1409008%22%20slang%3D%22en-US%22%3EPatching%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1409008%22%20slang%3D%22en-US%22%3E%3CP%3EWhat%20is%20the%20best%20practice%20for%20Patching%20via%20config%20manager%3F%20And%20best%20practice%20to%20manage%203rd%20party%20app%20patching.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1409050%22%20slang%3D%22en-US%22%3ERe%3A%20Patching%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1409050%22%20slang%3D%22en-US%22%3EThere%20are%20many%20ways%20and%20depends%20on%20complexity%20and%20configuration%20of%20your%20environment.%20%3CBR%20%2F%3EWhat%20I%20would%20recommend%20is%20to%20deploy%20updates%20for%20small%20group%20first%20and%20monitor%20if%20they%20are%20working%20fine%20and%20expand%20deployment%20if%20there%20is%20no%20error.%3CBR%20%2F%3ECheck%20with%20teams%20and%20if%20they%20are%20in%20production%20and%20reaching%20deadlines%2C%20then%20you%20might%20hold%20patching%20unless%20if%20there%20is%20critical%20one.%3CBR%20%2F%3EIt%20is%20same%20for%20third-party%20patching%2C%20you%20should%20be%20careful%20of%20possible%20conflict%20and%20also%20driver%20deployment%20and%20make%20sure%20you%20have%20backup%20policy%20and%20be%20ready%20in%20case%20of%20failure.%3CBR%20%2F%3EAlso%2C%20always%20check%20release%20notes%20before%20deploying%20updates.%3CBR%20%2F%3EMake%20sure%20deploy%20Anti-Malware%20and%20security%20updates%20first%20.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1409065%22%20slang%3D%22en-US%22%3ERE%3A%20Patching%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1409065%22%20slang%3D%22en-US%22%3EHere%20is%20the%20detail%20on%20how%20to%20get%20started%20with%203rd%20party%20patching%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fconfigmgr%2Fsum%2Fdeploy-use%2Fthird-party-software-updates%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fconfigmgr%2Fsum%2Fdeploy-use%2Fthird-party-software-updates%3C%2FA%3E.%20If%20your%20interest%20is%20around%20the%203rd%20party%20patching%20in%20this%20remote%20world%20make%20sure%20you%20subscribe%20to%20a%20catalog%20and%20provide%20those%203rd%20party%20patches%20on%20the%20CMG%2FCDP%2C%20windows%20update%20would%20not%20be%20able%20to%20facilitate%20the%20google%2C%20firefox%2C%20etc.%20product%20patches.%20Here%20is%20another%20link%20to%20the%20CMG%20video%20on%20the%20business%20continuity%20site.%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fbusiness-continuity-and-disaster%2Fcloud-management-gateway-what-you-need-to-know-amp-what-s-next%2Fm-p%2F1358533%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fbusiness-continuity-and-disaster%2Fcloud-management-gateway-what-you-need-to-know-amp-what-s-next%2Fm-p%2F1358533%3C%2FA%3E.%20Another%20good%20link%20is%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F68653%22%20target%3D%22_blank%22%3E%40Rob%20York%3C%2FA%3E's%20blog%20that%20covers%20patching%20in%20the%20remote%2Fwfh%20state%20we%20are%20in%20today.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1409093%22%20slang%3D%22en-US%22%3ERe%3A%20Patching%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1409093%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F675832%22%20target%3D%22_blank%22%3E%40AshishChadha%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHi%20Ashish%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20published%20a%20doc%20on%20best%20practice%20monthly%20patches%26nbsp%3B%20last%20month%20that%20you%20can%20find%20here%20%3A%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fwindows-it-pro-blog%2Foptimize-windows-monthly-update-deployment-for-remote-devices%2Fba-p%2F1309917%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fwindows-it-pro-blog%2Foptimize-windows-monthly-update-deployment-for-remote-devices%2Fba-p%2F1309917%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIt%20covers%20a%20number%20of%20options%2C%20including%20our%20recommendations%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20would%20also%20recommend%20you%20look%20optimizing%20the%20device%20for%20velocity%2C%20which%20can%20be%20found%20here%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fconfirmation.aspx%3Fid%3D101056%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fconfirmation.aspx%3Fid%3D101056%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
New Contributor

What is the best practice for Patching via config manager? And best practice to manage 3rd party app patching. 

3 Replies
Highlighted
There are many ways and depends on complexity and configuration of your environment.
What I would recommend is to deploy updates for small group first and monitor if they are working fine and expand deployment if there is no error.
Check with teams and if they are in production and reaching deadlines, then you might hold patching unless if there is critical one.
It is same for third-party patching, you should be careful of possible conflict and also driver deployment and make sure you have backup policy and be ready in case of failure.
Also, always check release notes before deploying updates.
Make sure deploy Anti-Malware and security updates first .
Highlighted
Here is the detail on how to get started with 3rd party patching: https://docs.microsoft.com/en-us/mem/configmgr/sum/deploy-use/third-party-software-updates. If your interest is around the 3rd party patching in this remote world make sure you subscribe to a catalog and provide those 3rd party patches on the CMG/CDP, windows update would not be able to facilitate the google, firefox, etc. product patches. Here is another link to the CMG video on the business continuity site. https://techcommunity.microsoft.com/t5/business-continuity-and-disaster/cloud-management-gateway-wha.... Another good link is @Rob York's blog that covers patching in the remote/wfh state we are in today.
Highlighted

@AshishChadha 

 

Hi Ashish

 

We published a doc on best practice monthly patches  last month that you can find here : 

https://techcommunity.microsoft.com/t5/windows-it-pro-blog/optimize-windows-monthly-update-deploymen...

 

It covers a number of options, including our recommendations

 

I would also recommend you look optimizing the device for velocity, which can be found here:

https://www.microsoft.com/en-us/download/confirmation.aspx?id=101056