Barney's Blog

Blog archive

SolarWinds Shines in Patching

I talk a lot about patching. Every month I give a preview of Patch Tuesday to get you all pumped to plug your systems.

But there is another side to patching, the tools used to get the job done. Microsoft has its own solutions such as WSUS. But in patching, as in nearly every other area, third parties push the envelope, invent the future and have the best answers.

SolarWinds is one of those third parties. Recently Redmond took a close look at SolarWinds Patch Manager.

The review kind of assumes you use WSUS, but don't like hassle of testing all the patches before releasing them on your machines. SolarWinds helps with that problem, at the same time adding much-needed features to WSUS.

One area of help is easing the deployment of non-Microsoft patches such as Adobe and Java, both of which have more patches than a Three Stooges' truck tire.

It also helps to schedule patching tasks, making it easier to manage and making sure that all this patching actually takes place. You can also decide when and how to deploy which patch.

Posted by Doug Barney on 01/11/2013 at 1:19 PM


Featured

  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Shell Hashing Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.