Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

SCCM Patch Management Overview

by Stephanie Dunn
December 1, 2016

SCCM Patch Management Overview

Many organizations deploy patch management solutions that can be complex and difficult to manage effectively. Although, these solutions provide the ability to manage clients, deploy software applications, and perform routine patching, additional problems and increase risks can arise for the organization if left unmanaged. This report provides a high-level overview of vulnerabilities reported by Microsoft System Center Configuration Manager (SCCM), which can aid in determining whether vulnerabilities are being patched effectively.

SCCM provides organizations with the ability to deploy operating systems, manage client health, push software patches, and the ability to quickly rebuild systems. Although SCCM can provide an effective patch management solution, organizations must have a strategy in place to assess existing risks, while patching systems in a timely manner. Organizations must also address stand-alone systems or hosts isolated from the main network that may not be a part of an enterprise-wide patch management solution. These systems not managed with SCCM can be easily overlooked by administrators, as scanning and patching these systems manually can leave potentially critical systems and data vulnerable to attack. By continuously testing, monitoring, and rescanning all systems to ensure patches have been applied correctly, organizations can more effectively manage and secure Windows-based systems.

This report provides a comprehensive look at Microsoft vulnerabilities detected by SCCM, as well as other patch management solutions and stand-alone systems. Elements within this report provide an effective comparison between the effectiveness of the existing SCCM patch management system. Analysts can use this information to focus efforts on identifying both current and previously mitigated vulnerabilities. Using the results from active Tenable Nessus scans, analysts can easily compare vulnerability results against those reported by SCCM. This comparison of information is useful in detecting hosts reporting potentially outdated or inaccurate data.

Vulnerabilities detected by Nessus can be used to detect stand-alone systems not managed by SCCM, and aid in comparing the efficacy of patch management efforts. Events reported by SCCM can alert analysts to package deployments and service-related issues that should be reviewed further. Information on SCCM client systems will provide analysts valuable information on hosts that may not be reporting properly, or that are not managed by SCCM. Organizations can use this report to proactively address and strengthen overall network security and patch management efforts across the network.

This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Discovery & Detection. The report requirements are:

  • Tenable.sc 5.4.0
  • Nessus 8.5.1
  • LCE 6.0.0

Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect the organization. Tenable's Tenable.sc is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audit files. Active scanning examines running systems and services, detects vulnerable software applications, and analyzes configuration settings. Passive listening collects data to continuously monitor traffic, collect information about user privilege changes, and administrative activity, along with the discovery of additional vulnerabilities. Host data and data from other security products is analyzed to monitor patch management solutions on the network. Monitoring the network to ensure that all systems are secured against vulnerabilities is essential to ongoing security efforts. Tenable enables powerful, yet non-disruptive, continuous monitoring that will enable organizations with the information needed to proactively respond to threats within the enterprise.

The following chapters are included in this report:

  • Executive Summary: The Executive Summary chapter provides a comprehensive summary of vulnerabilities detected by SCCM. The Elements in this chapter provide trend data on current and previously mitigated vulnerabilities, which helps analysts monitor how systems are being patched effectively. Analysts can obtain valuable information on the most vulnerable hosts, which assists with prioritizing patch mitigation efforts. Each element within this chapter helps organizations gain a better understanding on existing risks, and determine the effectiveness of SCCM systems on the network.
  • SCCM Vulnerability Summary: The SCCM Vulnerability Summary chapter presents a comprehensive view of outstanding vulnerabilities reported by WSUS. Elements included within this chapter are filtered by Critical, High, and Medium severity levels, and present a list of Microsoft Bulletins vulnerabilities reported by patch management systems. Results from each element may include results from multiple patch management systems supported by Tenable. Each table provides targeted information that analysts can use to prioritize remediation efforts and identify the most critical vulnerabilities first.
  • SCCM Client Summary: The SCCM Client Summary chapter presents a comprehensive look at managed SCCM clients across the organization. Information on changes within each subnet can alert analysts to new clients, connection issues on existing clients, or clients that have fallen out of scope. Information presented within this chapter can be useful in identifying hosts within SCCM clients installed, or clients not reporting properly. Additionally, this data to can be used to correlate potential patching issues, or alert security teams to configuration issues within security policies that need to be addressed.
  • SCCM Event Summary: This chapter includes an overview of SCCM events detected on the network. Information included within this chapter can be useful in correlating potential patch management issues that need to be addressed by the analyst. Elements within this chapter can be modified to include specific SCCM event information per organizational requirements.
Try for Free Buy Now
Tenable.io FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning


Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.



Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security


Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Get a Demo

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin


Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a Demo

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.

Request a Demo


Continuously detect and respond to Active Directory attacks. No agents. No privileges. On-prem and in the cloud.