{"id":35509,"date":"2022-07-13T12:33:53","date_gmt":"2022-07-13T11:33:53","guid":{"rendered":"https:\/\/www.n-able.com\/?p=35509"},"modified":"2022-07-14T12:50:52","modified_gmt":"2022-07-14T11:50:52","slug":"learn-patch-management-the-basics","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics","title":{"rendered":"Learn patch management\u2014part 1, the basics"},"content":{"rendered":"<p class=\"p3\"><span class=\"s1\">There is no escape from the need for <a href=\"https:\/\/www.n-able.com\/features\/patch-management?promo=blog\"><span class=\"s2\">patch management<\/span><\/a> and updates. It is true that operating systems and software vendors are getting better, faster, and more efficient about how they make and deploy patches. However, for businesses, patch management remains a time-consuming necessity that has big impacts on security, compliance, and day-to-day operations for IT teams and the businesses they serve.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The reality of patch management is that some planning along with automation is not just nice to have, but rather a need for businesses of any size. The U.S. government\u2019s National Institute of Standards and Technology (NIST) <a href=\"https:\/\/nvd.nist.gov\/general\/visualizations\/vulnerability-visualizations\/cvss-severity-distribution-over-time\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">tracks reported vulnerabilities<\/span><\/a> and the \u201cseverity\u201d of each. Their report shows that there is a new \u201chere to stay\u201d trend in the growing number of vulnerabilities that IT teams cannot keep up with on their own. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The need to understand patch management and how to create a patch management solutions is critical, and no matter what stage in your career, it never hurts to learn and re-learn the best practices and strategies. Therefore, I\u2019m kicking off this multi-part series on patch management with a look at the basics. Yes, this starts off at the beginner level, but stay tuned for deeper insights as we go. <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">What is patch management?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Simply stated, it\u2019s the process of applying updates to software. Though if we are to dig deeper, what is important is the motivation of an update. Meaning, what is the intended update from the vendor? Most commonly this is: <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li3\"><span class=\"s1\">New versions with new features<\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Bugs being fixed<\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Security vulnerabilities that need correcting from their own code or provided by third-party code that is integrated into their software.<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">No matter the motivation of the software vendor (including operating system vendors), they all tend to include multiple types of updates into a single \u201cpatch\u201d. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Fun fact: the term \u201cpatch\u201d in the IT world comes from days when computers used punch cards as their set of inputs. When a card was damaged or inputs changed, it could then get a \u201cpatch\u201d to restore the card to working order. <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">What software and devices need patches?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">My first response to this question is all of them! However, this is not extremely helpful, so let&#8217;s expand on this.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">For many years patch management was limited to servers and workstations. Today this is extended to IOT devices, mobile devices\/applications, and even appliances. If the word \u201csmart\u201d is in front of a product, then there is a good chance it will need updates. For businesses, there should be a focus on:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Windows<\/span><\/a><\/span><span class=\"s1\"> and <a href=\"https:\/\/www.n-able.com\/features\/mac-patching-software?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Mac<\/span><\/a> operating systems<\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">On-premises software<\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Cloud-based applications require patches (even if conducted by the vendor)<\/span><\/li>\n<li class=\"li3\"><span class=\"s1\">Microservices<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">The thought that a cloud or SaaS application means you do not need to worry about patches and updates is not true. When selecting providers and tools, it is always important to keep in mind the level of security that you expect from the vendor, and it should be factored into your selection. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">After all, the cloud is simply somebody else\u2019s computer! <\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">What types of patches are there?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">There is no straight forward answer to the names or labels that various vendors place on the types of patches, or even severity of patches. However, there is a common-sense approach to this. To begin we will go back to the list we provided on the \u201cmotivations\u201d of a patch. <\/span><\/p>\n<p><strong><span class=\"s1\">Non-security-related patches\u2014these will typically split based on the size of the patch\/update<\/span><\/strong><\/p>\n<ul>\n<li><span class=\"s1\">Patch\u2014would fix a single issue or bug<\/span><\/li>\n<li><span class=\"s1\">Bug fix\u2014is usually an update with multiple bugs being addressed<\/span><\/li>\n<li><span class=\"s1\">Minor release\u2014is typically a roll-up of minor feature changes and bug fixes<\/span><\/li>\n<li><span class=\"s1\">Major release\u2014Contains major feature work as well as all other updates up to this point, including bug fixes. <\/span><\/li>\n<\/ul>\n<p><strong><span class=\"s1\">Security-related patches<\/span><\/strong><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>NOTE: security patches can be released on their own separate from non-security-related patches, however they are often bundled together.<\/i><\/span><\/p>\n<ul>\n<li><span class=\"s1\">Zero day\u2014these are emergency patches which require immediate deployment based on the severity and the volume of attacks which are exploiting it. These tend to be rare.<\/span><\/li>\n<li><span class=\"s1\">Critical Security Patches\u2014these are major security updates that should be taken very seriously and should be the first to be deployed and should protect your most critical devices.<\/span><\/li>\n<li><span class=\"s1\">Important Security Patches\u2014these patches tend to hold less severe consequences than critical but otherwise are still worth deploying and treating with the same care as critical patches.<\/span><\/li>\n<li><span class=\"s1\">Moderate\u2014these are typically minor security updates or fixes that affect very few or are limited in the gains that an attack may get from exploiting it.<\/span><\/li>\n<li><span class=\"s1\">Low\u2014these are very minor security issues that typically have low gains from attackers and high levels of effort to exploit. Meaning, if they are already this far, it might be too late. <\/span><\/li>\n<\/ul>\n<p class=\"p4\"><span class=\"s1\">Now some may believe that the above list is not perfect or is not how XYZ vendor sees the world and that may be true. Though the point here is to simply use a common-sense approach on how to untangle the multitude of naming conventions so that you can relate to what each vendor uses. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">For example, if you click on this link you\u2019ll see the <a href=\"https:\/\/docs.microsoft.com\/en-us\/troubleshoot\/windows-client\/deployment\/standard-terminology-software-updates\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Windows 10 software update types<\/span><\/a><\/span><span class=\"s5\">.<\/span><span class=\"s1\"> They make sense for Microsoft, but they do not apply to all software providers.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">What is the difference between patch management and vulnerability management?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">There are a lot of terms used in the industry to describe the same things and it can get a bit confusing. So, getting a strong understanding of them can help you translate the day-to-day usage that varies from one IT professional to another. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">To start, let&#8217;s cover what are \u201cvulnerabilities\u201d, as this is the broader term. Vulnerabilities are weaknesses in the IT environment. Those weaknesses can come from a multitude of places. While we are not diving deep on vulnerability management, it is important to understand a few examples:<\/span><\/p>\n<ul>\n<li><span class=\"s1\"><b>Configurations:<\/b> how we configure software such as firewalls, how logins are managed, or where data is stored with what permissions are all \u201cconfigurations\u201d that, if not set correctly or protected properly, can leave a network vulnerable. <\/span><span class=\"s1\">Why have Simple Mail Transfer Protocol (SMTP) installed or port 25 open on a server if no email messages need to be sent or received?<\/span><\/li>\n<li><span class=\"s1\"><b>Firmware updates for appliances:<\/b> these are often forgotten, however, appliances simply run operating systems and software just like any other device. As such they too need updated. <\/span><\/li>\n<li><span class=\"s1\"><b>Security patches<\/b>: these are specific patches that software vendors release to correct security problems in their code that would otherwise leave a company vulnerable to be exploited.<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">Security patches are where vulnerability management and patch management overlap and where most of the \u201cjargon\u201d amongst IT professionals comes from. While we learned earlier that the motivation of a \u201cpatch\u201d can vary, the security patches are meant to resolve and protect weaknesses that exist in the software that could be exploited by threat actors. This sounds very similar to what a \u201cvulnerability\u201d is. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">In the end, vulnerabilities cover a broad range of weaknesses in a network, while patch management is specific to software updates, fixes, and security patches.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">How do threat actors use unpatched software?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">To understand how threat actors use unpatched software, it is helpful to remind ourselves of the objectives threat actors hold and their motivations. Long gone are the days when threat actors were simply vandals; they are now sophisticated, financially backed criminal organizations that are run like a business. Like any business, they identify their target market with their product or service and attempt to reach as many of those targets as possible. When they do find one, they would like to maximize the value of that target. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">As it relates to patching, the following is a quick list of how unpatched software plays into this: <\/span><\/p>\n<ul>\n<li><span class=\"s1\"><b>Reaching a wide audience<br \/>\n<\/b>Threat actors will look for software applications that are the most widely used by most companies, such as Microsoft OS, Office, Adobe, web browsers, and more.<\/span><\/li>\n<li><span class=\"s1\"><b>Find the easy \u201cwins\u201d<br \/>\n<\/b>They tend to prey on the most vulnerable software, which often is legacy unsupported\/nearly unsupported software and operating systems. Windows 7, or Exchange 2003, are a bit long in the tooth and are prime targets.<\/span><\/li>\n<li><span class=\"s1\"><b>Gain access and persist<\/b><br \/>\nThere are many ways that unpatched software can leave an environment vulnerable to security threats, of which those that provide elevated permissions or access to multiple devices are valuable to threat actors. They will use this access to continue their process and spread out across the network, giving them a better chance of not being caught and access to more data.<\/span><\/li>\n<\/ul>\n<h2 class=\"p3\"><span class=\"s1\">What are the major parts that make up a good patch-management program?<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">As mentioned, this is part one of a multi-part series, therefore we will not go into much more detail on all the bits and bobs of a good patch program. However, the following will provide you with a good place to start that can even be beneficial to those who have been running a program for many years\u2014there are always ways to improve. <\/span><\/p>\n<ul>\n<li><span class=\"s1\"><b>Scope and visibility<\/b><br \/>\nA good patch program needs to start out with the scope of the network you wish to patch. This should include which devices, by group, with some level of importance that relates to reducing the risk of business downtime. The visibility portion should include a plan that continuously allows you to discover devices entering and exiting the business. <\/span><\/li>\n<li><span class=\"s1\"><b>Policies<br \/>\n<\/b>Based on the importance of a device or group of devices, or based on the severity of a patch, you should plan out and maintain documentation of your desired policies for when and which patches are deployed. <\/span><\/li>\n<li><span class=\"s1\"><b>Patch operations<\/b><br \/>\nWhile patch operations are very close to policies, the major difference here is this is all about how you and your teams will manage the day-to-day of patching. Not all patches will work correctly and not all devices need or want the latest patches due to conflicts or legacy application dependance. What is important here is not to overload yourself with all the devices all at once.<\/span><\/li>\n<li><span class=\"s1\"><b>Patch testing and vetting<br \/>\n<\/b>Ensure there is a pilot group of devices that you test that contains a mix of non-critical devices (servers, workstations, etc). This could give you insights into how well or poor your next roll-out might be. <\/span><\/li>\n<li><span class=\"s1\"><b>Reporting<br \/>\n<\/b>Often overlooked, reporting before and after roll-outs is important and should contain the data you need for your security program, your operations, and any compliance regulations you might have. (These are often multiple reports). This will give you a sense of your progress on minimizing risk to your company.<\/span><\/li>\n<li><span class=\"s1\"><b>Governance<br \/>\n<\/b>As we see from the NIST report, more and more security patches are needed each year and there is really no way to keep up manually. It is important that only software that is needed is installed on company devices. This means setting governance and monitoring up to identify and remove any unauthorized software.<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s1\">After reading through this article, you should be in a better position to understand what patch management is, the difference between patches and vulnerabilities, the types of patches, and the major components of a good patch-management program. In part two, we will explore why organizations need a patch-management solution and what to look for when deciding what to <a href=\"https:\/\/www.n-able.com\/blog\/patch-management\"><span class=\"s2\">use<\/span><\/a>.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\"><i>Joe Kern is senior product manager at <a href=\"https:\/\/www.n-able.com\/\" target=\"_blank\" rel=\"noopener\">N&#8209;able<\/a><\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Having a solid patch management program in place is one of the cornerstones of having a strong security posture. Joe Kern sets out the basic you need to know.<\/p>\n","protected":false},"author":94,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-35509","post","type-post","status-publish","format-standard","hentry","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Learn Patch Management\u2014the Basics - N-able<\/title>\n<meta name=\"description\" content=\"Having a solid patch management program in place is one of the cornerstones of having strong security. This blog sets out the basics for you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Learn Patch Management\u2014the Basics - N-able\" \/>\n<meta property=\"og:description\" content=\"Having a solid patch management program in place is one of the cornerstones of having strong security. This blog sets out the basics for you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-13T11:33:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-14T11:50:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220708_blogbanner_PatchManagement_P1_TheBasics_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joe Kern\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220708_blogbanner_PatchManagement_P1_TheBasics_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joe Kern\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"9\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics\"},\"author\":{\"name\":\"Joe Kern\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/5fa9b174b65ecd40fa2be3f1bcf02569\"},\"headline\":\"Learn patch management\u2014part 1, the basics\",\"datePublished\":\"2022-07-13T12:33:53+01:00\",\"dateModified\":\"2022-07-14T11:50:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics\"},\"wordCount\":1891,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics\",\"name\":\"Learn Patch Management\u2014the Basics - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2022-07-13T12:33:53+01:00\",\"dateModified\":\"2022-07-14T11:50:52+00:00\",\"description\":\"Having a solid patch management program in place is one of the cornerstones of having strong security. This blog sets out the basics for you.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Patch Management\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/patch-management\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn patch management\u2014part 1, the basics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/5fa9b174b65ecd40fa2be3f1bcf02569\",\"name\":\"Joe Kern\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3653793956585709418b5c7a6be20d36fe5a11ee726ab1da7eda45d5890bc7e9?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3653793956585709418b5c7a6be20d36fe5a11ee726ab1da7eda45d5890bc7e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3653793956585709418b5c7a6be20d36fe5a11ee726ab1da7eda45d5890bc7e9?s=96&d=mm&r=g\",\"caption\":\"Joe Kern\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Learn Patch Management\u2014the Basics - N-able","description":"Having a solid patch management program in place is one of the cornerstones of having strong security. This blog sets out the basics for you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics","og_locale":"de_DE","og_type":"article","og_title":"Learn Patch Management\u2014the Basics - N-able","og_description":"Having a solid patch management program in place is one of the cornerstones of having strong security. This blog sets out the basics for you.","og_url":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-07-13T11:33:53+00:00","article_modified_time":"2022-07-14T11:50:52+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220708_blogbanner_PatchManagement_P1_TheBasics_ss.jpg","type":"image\/jpeg"}],"author":"Joe Kern","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/07\/220708_blogbanner_PatchManagement_P1_TheBasics_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Joe Kern","Gesch\u00e4tzte Lesezeit":"9\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics"},"author":{"name":"Joe Kern","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/5fa9b174b65ecd40fa2be3f1bcf02569"},"headline":"Learn patch management\u2014part 1, the basics","datePublished":"2022-07-13T12:33:53+01:00","dateModified":"2022-07-14T11:50:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics"},"wordCount":1891,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics","url":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics","name":"Learn Patch Management\u2014the Basics - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2022-07-13T12:33:53+01:00","dateModified":"2022-07-14T11:50:52+00:00","description":"Having a solid patch management program in place is one of the cornerstones of having strong security. This blog sets out the basics for you.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/learn-patch-management-the-basics#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Patch Management","item":"https:\/\/www.n-able.com\/de\/blog\/category\/patch-management"},{"@type":"ListItem","position":2,"name":"Learn patch management\u2014part 1, the basics"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/5fa9b174b65ecd40fa2be3f1bcf02569","name":"Joe Kern","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/3653793956585709418b5c7a6be20d36fe5a11ee726ab1da7eda45d5890bc7e9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3653793956585709418b5c7a6be20d36fe5a11ee726ab1da7eda45d5890bc7e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3653793956585709418b5c7a6be20d36fe5a11ee726ab1da7eda45d5890bc7e9?s=96&d=mm&r=g","caption":"Joe Kern"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/35509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=35509"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/35509\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=35509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}