Patch & Configuration Compliance Automation
Keep your devices secure, compliant, and up to date - without disrupting the business.
Wanstor’s Patch Management
Keeping devices patched is one of the simplest and most effective ways to reduce exposure to known security vulnerabilities. Wanstor’s Managed Patch Management service delivers structured, staged patching across your desktops and servers – backed by monitoring and clear performance targets – so you stay protected without constant internal effort.
Why it matters
Unpatched systems are vulnerable to widely known security issues where fixes already exist. Our managed patching approach focuses on safe, timely installation and controlled rollouts to limit risk while protecting day-to-day operations.
What you get
- Managed patch deployment for operating systems and supported applications across Windows, macOS and Linux devices in scope.
- Staged rollouts (Pilot → Standard → High Impact) to reduce disruption and catch issues early.
- Security-first prioritisation using vendor-aligned severity ratings to drive patch urgency.
- Compliance visibility via a proactive reporting dashboard, including recommended remediations.
- Defined timelines (KPIs) for zero-days, security patches, and non-security updates.
What we patch
Devices in scope
We patch customer desktops and servers running Microsoft Windows, macOS and Linux, as agreed within your managed patching scope.
To ensure accurate coverage, we recommend an inventory scan during onboarding to identify and onboard the right devices.
Software in scope
By default, this includes:
- Supported Operating Systems
- Microsoft applications
- Supported third-party applications
- Anti-virus definition updates
All in-scope software (excluding VMware Tools) is automatically patched unless you request exclusions during onboarding or through our change request process.
How our patching approach works
1. Prioritised by severity
We use ManageEngine Endpoint Central severity ratings (aligned with Microsoft severity guidance) to prioritise updates – so critical vulnerabilities are treated as urgent, while lower-risk items follow an appropriate schedule.
2. Staged deployment to minimise disruption
We group devices during onboarding and roll patches out in phases:
-
- Pilot Group (canary devices across departments/use cases)
- Standard Impact (default group)
- High Impact (disruption-sensitive systems)
This helps you validate patches early and reduce operational risk.
Patch rollout timelines
These KPIs apply to devices that are online and connected to the internet for at least 2 hours within the target period (offline devices update when they’re back online).
Zero-day & critical security patches
If a vendor releases an out-of-cycle patch for a publicly disclosed zero-day, we accelerate deployment:
- Pilot group: within 24 hours
- All affected systems: within 48 hours
All other security patches
For vendor-rated Important / Moderate / Low security updates:
- Patched within 14 days for in-scope systems.
Linux note: Security-only patching is supported for Red Hat where a relevant bulletin exists; for other Linux flavours we trigger an update of all modules and align to the non-security schedule below.
Non-security updates & rollups
For non-security updates, rollups and server service packs:
- Patched within 30 days
Windows 11 feature updates
Choose your preferred model:
- Automatic: rolled out as released
- On-demand: rolled out when you raise a support ticket
Driver updates
- Security driver updates follow the severity/timelines above
- Non-security driver updates are not deployed automatically
FAQ
Will patching disrupt users?
We use staged rollouts and defined patch windows. End-user devices can postpone reboots up to 72 hours (default).
What if devices are offline?
KPIs apply to devices online for at least 2 hours during the target period; offline devices patch when they return online.
What happens if a patch fails?
We attempt remediation by uninstalling/reinstalling as appropriate. For servers, if remediation fails, a restore may be performed from backups.
Can we exclude certain apps or systems?
Yes – exclusions can be agreed during onboarding or via our change request process.
Ready to reduce patch risk?
If you want patching that’s structured, monitored, and aligned to clear timelines, without overloading internal IT - Wanstor can help.