Technische Ondersteuning

Wat kunnen we voor u betekenen?

 

Panda Patch Management Best Practices

Informatie van toepassing op:

Products
Panda Patch Management

We recommend you follow these best practices for Panda Patch Management:
  • Verify that Panda Patch Management Works Properly
  • Install All Critical Patches Regularly
  • Isolate Vulnerable Computers
  • Make Sure Programs Installed on your Computers are Not End-of-Life
  • Check the Installation History
  • Check the Patch Status of Computers where Incidents Occurred
Verify that Patch Management Works Properly
To confirm that Panda Patch Management works correctly, make sure that all computers on your network:
  • Have a Panda Patch Management license allocated and Patch Management installed and running. To identify issues, use the Panda Patch Management Status tile on the Panda Patch Management Dashboard.

  • Can communicate with the Panda server. To identify computers that might have connection problems, use the Time Since Last Check tile on the Panda Patch Management Dashboard.
  • Have the Windows Update service running with automatic updates disabled. To disable automatic updates, select the Disable Windows Update on Computers option in the Patch Management Settings.

Install All Critical Patches Regularly
When software vendors discover flaws in their products, they publish updates and patches to fix the flaws. We recommend that you install critical patches at least once a month.

To see available patches, use the Available Patches list. Filter the list to identify critical patches or patches for specific computers.



If Patch Management cannot get a download URL to install a critical patch automatically, download the patch manually so you can install it.

Isolate Vulnerable Computers (only for critical situations)
Identify and isolate computers that have not yet received published patches that fix critical known vulnerabilities.

IMPORTANT! This feature is only to be used for critical security issues.

Use the Available Patches list to identify computers that have not received critical patches. To isolate computers, select the check box in one or more rows, then in the toolbar, click Isolate Computer.



Make Sure Programs Installed on your Computers are Not End-of-Life
End-of-life programs do not receive patches or updates from the software vendor. To reduce the attack surface, replace any end-of-life programs installed on your computers.

To identify end-of-life programs, use the End-of-Life Programs list.



Check the Installation History
Use the Installation History list to review the status of patch installations and identify computers where installation errors occurred.



Check the Patch Status of Computers where Incidents Occurred
When incidents occur on a computer, we recommend that you install any available patches on the computer.

To identify available patches, in the Security Dashboard, click a threat, select the affected computer, and then click View Available Patches. The Available Patches list opens and shows available patches for the computer.


You can also see an overview of available patches and end-of-life programs for a computer on the Computer Details page.

Artikelnummer- 20211108 700120 EN
ALTIJD ONLINE OM U TE HELPEN TWITTER FORUM
ALTIJD ONLINE OM U TE HELPEN TWITTER FORUM