There are several patch management tools for Windows, including products from Configuresoft, PatchLink, St. Bernard...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Software, Ecora, BigFix and Shavlik Technologies. Shavlick developed the HFNetChk scanning engine that is used by Microsoft's Baseline Security Analyzer. They also have a basic edition of their HFNetChkPro, which targets smaller organizations that don't need advanced patch management functions, such as scheduled scans and e-mail support.
If you are looking for a free Windows Hotfix utility, look into the Windows Hotfix Checker (WHC) by Michael Dunn. WHC is a front-end for HFNetChk. WHC runs HFNetChk, captures its output, and creates a report on the hotfixes that need to be installed. WHC can scan a local computer, remote computer or an entire NT Domain. On Windows 2000 and later, it can also scan an IP address, or a range of IP addresses. Once you've scanned for necessary hotfixes, WHC can also download them from Microsoft. WHC's detailed hotfix report includes hyperlinks to the Microsoft security bulletin and Knowledge Base article for each hotfix, so finding the correct page for hotfixes that are not directly downloadable is easy. Finally, once you have downloaded the necessary hotfix installers, WHC can run them for you.
Hotfixes are often chainable, meaning you can install several at once without having to reboot after each. WHC supports this by using Microsoft's QChain utility. It's important, however, to verify that the hotfixes you add to the install list are chainable, because it doesn't work with product updates that do not use update.exe as the installation program, such as Internet Explorer updates for Windows 2000 and Windows XP. Once you have installed your updates, you can verify that your computers have all the fixes you wanted to install by using the Qfecheck.exe tool.
Dig Deeper on Microsoft Patch Tuesday and patch management
Related Q&A from Michael Cobb
Android for Work's sandboxing tools, which split work and personal profiles, can be bypassed with a proof-of-concept attack. Expert Michael Cobb ...continue reading
Yahoo claimed a vulnerability in its email service enabled attackers to use forged cookies to gain access to user accounts. Expert Michael Cobb ...continue reading
A researcher discovered 76 iOS apps containing sensitive user data that were vulnerable to man-in-the-middle attacks. Expert Michael Cobb explains ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.