Wondering if anyone has run across anything like we're seeing more and more lately.
We have a separate security team that scans our environment for vulnerabilities using teneable and they let us know when patches either got missed from automatic patching or a new application related vulnerability needs to be updated. What we're seeing more and more is a windows update gets pushed out and things appear fine but then the security software vendor will come back later and state that registry edits need to be made to take full use of a patch that came out.
Is this something that's been happening for a while and we were more in the dark about our patching then we should have been, or is this a new trend happening with windows updates that we need to be aware of, or something else entirely?
We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.
Wondering if anyone has run across anything like we're seeing more and more lately.
We have a separate security team that scans our environment for vulnerabilities using teneable and they let us know when patches either got missed from automatic patching or a new application related vulnerability needs to be updated. What we're seeing more and more is a windows update gets pushed out and things appear fine but then the security software vendor will come back later and state that registry edits need to be made to take full use of a patch that came out.
Is this something that's been happening for a while and we were more in the dark about our patching then we should have been, or is this a new trend happening with windows updates that we need to be aware of, or something else entirely?
Thanks,
Share this post
Link to post
Share on other sites