{"id":31512,"date":"2022-04-13T10:45:29","date_gmt":"2022-04-13T09:45:29","guid":{"rendered":"https:\/\/www.n-able.com\/?p=31512"},"modified":"2023-03-21T14:10:13","modified_gmt":"2023-03-21T14:10:13","slug":"april-2022-patch-tuesday-are-you-ready-for-windows-autopatch","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch","title":{"rendered":"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch?"},"content":{"rendered":"<p class=\"p3\">April\u2019s Patch Tuesday brings a significant increase in the number of vulnerabilities being addressed right on the heels of Microsoft\u2019s announcement of <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/get-current-and-stay-current-with-windows-autopatch\/ba-p\/3271839\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Windows Autopatch<\/span><\/a>. With 119 vulnerabilities receiving fixes, one under active exploitation, and 10 as exploitation more likely, teams responsible for patching may need a little more bandwidth this month than last to get patching done in an acceptable timeframe based on the risk profile of their environments. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24521\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-24521<\/span><\/a> should be on the top of everyone\u2019s prioritization list as the vulnerability under active exploitation.<\/p>\n<p class=\"p3\">We\u2019ll talk about Microsoft\u2019s Windows Autopatch a little further down, so don\u2019t skip that section even if you don\u2019t think you\u2019ll be using it as there are some great takeaways from how it\u2019s planned to be implemented that you can take advantage of in your own patch management workflows.<\/p>\n<h2 class=\"p4\">Microsoft Vulnerabilities<\/h2>\n<p class=\"p3\">The small break we\u2019ve received over the last few months with lower numbers of Microsoft vulnerabilities requiring patches appears to be over. 119 vulnerabilities in all, with one of them being actively exploited, and 10 critical. Plenty to keep you and your team occupied.<\/p>\n<p class=\"p3\">The big vulnerability of note is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24521\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-24521<\/span><\/a> which is the zero-day under active exploitation. It is marked as Attack Complexity: Low, Privileges Required: Low, User Interaction:<i> <\/i>None, and on top of all that, it was reported by the NSA and Crowdstrike. All it\u2019s missing is a flashing neon sign. Make sure this one finds a spot on the top of your priority list.<\/p>\n<p class=\"p3\">It\u2019s also \u2018third time\u2019s a charm\u201d for <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-26904\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-26904<\/span><\/a> receiving another fix this month after bypasses were discovered for the original two fixes. While complexity of attack is high for this vulnerability it is still labeled as Exploitation More Likely.<\/p>\n<h2 class=\"p1\">Microsoft Patch Tuesday <span class=\"s1\">Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p3\">It is important to not just prioritize vulnerabilities based on their severity but also their exploitation likelihood. Vulnerabilities marked as Exploitation More Likely<i> <\/i>are as important, and some may say even more important, to address quickly due to their increased likelihood to cause actual impacts to an environment. These CVEs from Microsoft should be top of the list as they are all marked as Exploitation More Likely, Exploitation Detected, or Critical.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"20%\">\n<p class=\"p5\"><strong>CVE<\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"45%\">\n<p class=\"p5\"><strong>Description<\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"2%\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\" width=\"23%\">\n<p class=\"p5\"><strong>Exploitability<\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\" width=\"10%\">\n<p class=\"p5\"><strong>Severity<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24521%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24521\" target=\"_blank\" rel=\"noopener\">CVE-2022-24521<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Common Log File System Driver Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Detected<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26809%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-26809\" target=\"_blank\" rel=\"noopener\">CVE-2022-26809<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Remote Procedure Call Runtime Remote Code Execution<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24547%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24547\" target=\"_blank\" rel=\"noopener\">CVE-2022-24547<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Digital Media Receiver Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24546%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24546\" target=\"_blank\" rel=\"noopener\">CVE-2022-24546<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows DWM Core Library Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24542%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24542\" target=\"_blank\" rel=\"noopener\">CVE-2022-24542<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Win32k Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24491%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24491\" target=\"_blank\" rel=\"noopener\">CVE-2022-24491<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Network File System Remote Code Execution<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24481%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24481\" target=\"_blank\" rel=\"noopener\">CVE-2022-24481<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Common Log File System Driver Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26914%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-26914\" target=\"_blank\" rel=\"noopener\">CVE-2022-26914<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Win32k Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26904%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-26904\" target=\"_blank\" rel=\"noopener\">CVE-2022-26904<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows User Profile Service Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24474%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24474\" target=\"_blank\" rel=\"noopener\">CVE-2022-24474<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Win32k Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-8927%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2020-8927\" target=\"_blank\" rel=\"noopener\">CVE-2020-8927<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Brotli Library Buffer Overflow<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23259\" target=\"_blank\" rel=\"noopener\">CVE-2022-23259<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Microsoft Dynamics 365 (on-premises) RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-22008\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-22008<\/span><\/a><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows Hyper-V RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24537\" target=\"_blank\" rel=\"noopener\">CVE-2022-24537<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows Hyper-V RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-23257\" target=\"_blank\" rel=\"noopener\">CVE-2022-23257<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows Hyper-V RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24497\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2022-24497<\/span><\/a><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows Network File System RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24528\" target=\"_blank\" rel=\"noopener\">CVE-2022-24528<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Remote Procedure Call Runtime RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p9\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24541\" target=\"_blank\" rel=\"noopener\">CVE-2022-24541<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows Server Service RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-24500\" target=\"_blank\" rel=\"noopener\">CVE-2022-24500<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows SMB RCE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-26919\" target=\"_blank\" rel=\"noopener\">CVE-2022-26919<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows LDAP Remote Code Execution<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\">Cumulative Updates<\/h2>\n<p class=\"p3\">Windows 10 <a href=\"https:\/\/support.microsoft.com\/help\/5012599\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5012599<\/span><\/a>, <a href=\"https:\/\/support.microsoft.com\/help\/5012591\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5012591<\/span><\/a><span class=\"s1\">, <\/span>and Windows 11 <a href=\"https:\/\/support.microsoft.com\/help\/5012592\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5012592<\/span><\/a> are our cumulative updates of note this month but there\u2019s not much to note. They include the expected security updates from previous months and some feature improvements with KB5012592 getting 26 total improvements like better toast notification UX and easier default browser selection.<\/p>\n<h2 class=\"p4\">Windows Autopatch<\/h2>\n<p class=\"p3\">Microsoft is introducing a new feature to offload Windows and Microsoft 365 App updates to them as a service. This functionality is going to feel familiar to any MSP who has ever used a Patch Management solution. While many may just brush this off as Windows Autoupdate with a schedule and a price tag, it\u2019s worth understanding how it works and more importantly what your client perception of it may be if they hear about it and have questions.<\/p>\n<p class=\"p3\">Many MSP clients will not be able to take advantage of Microsoft\u2019s Windows Autopatch since it requires Windows 10 or Windows 11 Enterprise E3 license or above. There is value, though, in taking a look at its deployment and testing rings and copying that philosophy into your own patch management processes if you don\u2019t already have lab vs production testing workflows in place.<span class=\"Apple-converted-space\">\u00a0 <\/span>Check out the Microsoft article about <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/get-current-and-stay-current-with-windows-autopatch\/ba-p\/3271839\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Windows Autopatch<\/span><\/a> and their <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/windows-autopatch-faq\/ba-p\/3272081\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">FAQ<\/span><\/a> to learn more.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">Make sure you have the basics covered. Even with all the new cybersecurity concerns you and your clients are facing, there isn\u2019t anything you should be doing tomorrow that you shouldn\u2019t have already been doing yesterday. Following the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">NIST Cybersecurity Framework<\/span><\/a>, <a href=\"https:\/\/www.cisecurity.org\/controls\/cis-controls-list\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CIS 18 Controls<\/span><\/a>, or other collection of recognized security controls to help guide you.<\/p>\n<p class=\"p3\">As always make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected, and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Patch Management<\/span><\/a> routines.<\/p>\n<p class=\"p11\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/p>\n<p class=\"p12\"><span class=\"s6\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p12\"><span class=\"s6\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month, 119 vulnerabilities receive fixes, with one under active exploitation and 10 marked as exploitation more likely. Lewis Pope looks at what\u2019s in this month\u2019s package of patches.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-31512","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>April 2022 Patch Tuesday: Are You Ready for Windows Autopatch? - N-able<\/title>\n<meta name=\"description\" content=\"April&#039;s Patch Tuesday sees 119 vulnerabilities receive fixes, with one under active exploitation and 10 marked as exploitation more likely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch? - N-able\" \/>\n<meta property=\"og:description\" content=\"April&#039;s Patch Tuesday sees 119 vulnerabilities receive fixes, with one under active exploitation and 10 marked as exploitation more likely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-13T09:45:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-21T14:10:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch?\",\"datePublished\":\"2022-04-13T10:45:29+01:00\",\"dateModified\":\"2023-03-21T14:10:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch\"},\"wordCount\":949,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch\",\"name\":\"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2022-04-13T10:45:29+01:00\",\"dateModified\":\"2023-03-21T14:10:13+00:00\",\"description\":\"April's Patch Tuesday sees 119 vulnerabilities receive fixes, with one under active exploitation and 10 marked as exploitation more likely.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch? - N-able","description":"April's Patch Tuesday sees 119 vulnerabilities receive fixes, with one under active exploitation and 10 marked as exploitation more likely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch","og_locale":"fr_FR","og_type":"article","og_title":"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch? - N-able","og_description":"April's Patch Tuesday sees 119 vulnerabilities receive fixes, with one under active exploitation and 10 marked as exploitation more likely.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-04-13T09:45:29+00:00","article_modified_time":"2023-03-21T14:10:13+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Lewis Pope","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch?","datePublished":"2022-04-13T10:45:29+01:00","dateModified":"2023-03-21T14:10:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch"},"wordCount":949,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch","url":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch","name":"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2022-04-13T10:45:29+01:00","dateModified":"2023-03-21T14:10:13+00:00","description":"April's Patch Tuesday sees 119 vulnerabilities receive fixes, with one under active exploitation and 10 marked as exploitation more likely.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/april-2022-patch-tuesday-are-you-ready-for-windows-autopatch#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"April 2022 Patch Tuesday: Are You Ready for Windows Autopatch?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/31512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=31512"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/31512\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=31512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}