/build/static/layout/Breadcrumb_cap_w.png

OS Patching with K1000

Hi Everyone,

So we are starting to use the K1000 to patch our servers. Initially we just want to apply critical OS patches.

My problem is that OS as a category is not granular enough and includes SQL, Exchange, Office, Sharepoint. (Found this out during our TEST environment patching)

KQtNPi.png

So I have tried two ways to try to exclude those patches:

1. Smart label for those apps I want to exclude, then the last line, for patch label names not equal to BLOCKED. 
2. Static label for those apps I want to exclude, then the same last line (in case of some weird smart label issue).

Then I load the Critical_OS_Servers patch label and search the the patches to find it does not exclude those. They still show in the list and I do not want to arbitrarily patch my live Exchange against our BES without some more planning.

Any tips to get this working properly? Thanks in advance.

EDIT: Thanks, I  spoke to support and found simple labels are far better to narrow down what I want.

For those interested, we are trying to do security patches for OS.
Label is:
Publisher = Microsoft
Severity is Critical
Operating System is Win 2K8.R2
Name contains Windows Server

Doing one for each OS and applying to patch schedules as needed.

0 Comments   [ + ] Show comments

Answers (1)

Posted by: h2opolo25 8 years ago
Red Belt
0
Besides trying to build a better patch label I don't think there's too much you can do. I manually update servers that are business critical (Exchange, SQL, RDS, etc...) and use KACE for the rest.

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ