bfg9000
Members
-
Joined
-
Last visited
Reputation Activity
-
bfg9000 reacted to Mark G38 in Manage Windows Processes via Endpoint PoliciesCool. Another step in the right direction. It would be awesome if we could have options for self-remediation on these. Hey if this process is stopped, attempt to start it, alert if start fails or alert all the time, etc.
-
@BurseyC Not sure your exact situation, but this seems like you should be able to work around their concerns. I have some clients the same way. I have my patching setup for workstations, to patch but not reboot. I then have a reboot task set up for these clients that reboots their workstations at a specified time that they agreed would not interrupt anyone. Usually something like 1 AM for most. I have one that wants it a little earlier due to an overnight crew. Just set the reboot tasks on schedule and never think about it again. Â
I don't know how big you are, but IMO having to manually check patching at any scale other than maybe a couple, is really a pain and not ideal. Â
I've personally also set up a custom event log alert in which I have a PowerShell script I wrote check for updates on the machine, but also check when the last update was (filtering out Defender definition updates since they happen multiple times a day and it's not in use anyway) and it it finds the last update date was 7+ days ago, it will write an error to the event log, which I then have set up in Pulseway to trigger an alert notification. I also have it populating a custom field with the last update date for my reference. It took some work, but it does work. I'm sure it's not 100% as there are probably some edge cases, but between that and the patch schedules and scheduled reboots, it's been pretty great so far.Â