5 Consecutive Patch Jobs Failed
This document outlines a monitor designed to detect machines that have experienced five consecutive failed patches for Microsoft-based updates. It details the requirements for effective monitoring, including the necessity of having a minimum number of available patch jobs stored in the patchjobs table.
Admin - Machines Without Patching Configuration
This document provides a detailed overview of a dataview that displays machines where the Microsoft update policy is not set, including various columns that provide insights into the client, location, computer details, and patching status.
Admin - Patching Metrics Overview
This document provides a comprehensive overview of the patching-related statistics for patch-managed Windows computers, categorized by approval age. It includes details on approved and missing patches across different age groups, as well as breakdowns for servers and workstations.
Admin - Service Plan Overview
This document provides a comprehensive overview of the service plan status, onboarding, and patching information for each location, including details on the number of servers and workstations covered under the contract.
Auto Approval Policies
This document provides an overview of the dataview used to examine the Auto Approve, Auto Ignore, and Auto Deny settings of Approval Policies, detailing the various characteristics and statuses related to patch approvals.
Clients - Windows 10 Audit
A thorough examination of Windows 10 computers and their patching status for each client, including details on supported and unsupported systems, patch compliance, and the status of approved, denied, ignored, installed, missing, and failed patches.
Cluster Server Patch Audit Ticket
This client script creates a ticket for all cluster hosts with a Cumulative Update older than 60 days, facilitating manual patching for servers where Automate is not recommended for patching clusters.
cPVAL Cumulative Update Audit Status
Shows the most recently installed Windows Cumulative Update. Useful for verifying patch status and update compliance.
cPVAL Cumulative Update Older than x Days
Lists out the machines which has Cumulative Update Installed older than x days.
CU Compliance Metrics - Clients
This document provides an overview of the Cumulative Update compliance score for Windows computers within the Automate environment. It details the data display for managed patch policies, including the age of updates and the scoring system used to assess compliance across production patching groups.
Cumulative Update Audit
This Script validate the full version of the OS and compares it with Microsoft database of Windows Cumulative Updates to identify which cumulative update the device has. The data is then formatted and stored in the Custom Field.
Cumulative Update Audit
Cumulative Update Compliance - Report
This document outlines the implementation of dataviews to present the cumulative update compliance score for Windows computers with managed patch policies. It details the associated content, dependencies, and step-by-step instructions for setting up the solution in ConnectWise Automate, ensuring that your environment maintains compliance with the latest updates.
CWM - Automate - Patching - Windows 10 CU Patching Sanity Check
This document outlines the purpose and functionality of a monitor designed to identify Windows 10 machines with discrepancies in patching, specifically related to cumulative and security updates. It includes a suggested alert template for automating ticket creation in response to detected issues.
Daytime Patching
This document provides an overview of the internal monitor that detects computers with daytime patching enabled and identifies available patches for installation. It includes dependencies, target scope, and alert template details.
Denied CU Audit
This document provides a detailed overview of the denied cumulative updates within the environment, including relevant approval policies, hotfix IDs, and affected devices.
Denied Patch Audit
This document provides a detailed overview of the denied patches within the environment, including relevant approval policies, hotfix IDs, and affected devices.
Disable Windows Optional/Automatic Updates
This document details the steps to disable Windows optional automatic updates using a script. It includes a sample run, dependencies, and a comprehensive implementation guide with visuals for each step.
Enable Windows Update Access
This document provides a detailed guide on how to enable Windows Update access by overwriting the DisableWindowsUpdateAccess registry key at the computer and user levels. It includes sample runs, task creation steps, and the PowerShell script necessary for implementation.
Feature Update Install (Reboot Pending Machines Validation)
This document outlines a script that monitors computers with pending reboots after executing the Feature Update Install with Tracking task. It verifies whether the update was successful and updates relevant custom fields accordingly.
Feature Update Install With Tracking
This document provides a comprehensive guide on how to create a script for installing the latest Windows feature updates while tracking the installation attempts and handling potential errors. It covers parameters, dependencies, and the step-by-step process to implement the script effectively.
Feature Update Install with Tracking (Reset Custom Fields)
This document provides a comprehensive guide on resetting custom fields for Windows 10 and Windows 11 computers after a successful feature update installation. It includes sample runs, dependencies, script creation, and deployment instructions to ensure proper automation and monitoring.
Get New SQL Updates
Audits and reports on new SQL-related Windows Updates since the last script run.
Get Windows Update Report DV
This document outlines the setup of a monitor set designed to execute the Windows Update Report script weekly across machines with the Managed Patching Policy, optimizing performance by limiting the execution to 200 machines at a time every 15 minutes.
Hide - Windows Update Systray Icon
This script is used to hide windows update icon under the systray
Hide-Unhide Windows Update
This script manages the visibility of the Windows Update page in the Settings app at the machine level.
Install Windows 11
This document outlines the steps to create a policy that enables the installation of Windows 11 on Windows 10 machines, including navigation through the endpoints and configuring necessary settings.
Install Windows Upgrade
This document provides a comprehensive overview of the script that installs the latest feature update on Windows 10 and 11 machines. It includes options for upgrading from Windows 10 to Windows 11, execution methods, user parameters, output logs, and ticketing details for handling failures.
Install-WindowsUpdates
This script automates the discovery and installation of Windows Updates on the local computer using the PSWindowsUpdate module.
Install-WindowsUpdates
This script automates the discovery and installation of Windows Updates on the local computer using the PSWindowsUpdate module. It provides advanced filtering options, logging, and supports automatic or manual reboot handling. The script is designed to simplify patch management by allowing administrators to select updates by category, severity, KB article ID, or title, and to exclude specific drivers or KB articles as needed. By default, preview patches are excluded unless the KBArticleID parameter is used.
Last Scanned Patch Date 7 days
This document outlines a monitor set that identifies machines with patch inventory older than 7 days and executes an autofix script to address the issue. It includes dependencies and target information for implementation.
LSUClient - Install Lenovo Update
This document provides a detailed guide on utilizing the LSU Client PowerShell module to install applicable and silently installable updates on Lenovo machines with non-discharging batteries. It outlines the steps for task creation, script implementation, and verification of execution logs.
Machines Without Patching Configuration Location Counts
This document provides a detailed overview of the count of machines per location where the Microsoft update policy is not set, including various metrics related to patching and onboarding status.
MySQL - View - Create (plugin_proval_auto_approval_status)
This document outlines the process for creating the plugin_proval_auto_approval_status view, including steps for dropping and creating the view, and updating user permissions for ProVal custom tables.
New SQL Updates
This solution automates the detection of new SQL-related Windows Updates on SQL servers and generates tickets in CW RMM for the updates found since the last script execution.
Out of Date Cumulative Update (Autofix)
This document provides a detailed guide on installing the latest available Cumulative Update on machines where a CU has not been installed in the last 75 days. It includes sample runs, dependencies, variable setup, task creation, and deployment instructions.
Patch Approval Categories
This document provides detailed information regarding the auto-approval, denial, or ignoring of patches based on their category for each approval policy. It includes a summary of the relevant columns and dependencies for understanding the approval process.
Patch Approval Count
This dataview looks at all patches and their approval/denial settings and providers a basic metrics view of the patches that are in each approval category.
Patch Complete Solution
This solution is targeted to compute all the patch management automation together for better understanding.
Patch Installed Complete Detail
This document provides a comprehensive overview of the patching process on agents, including details such as the installation date, source of the patch, and the current status of the patching operation. It outlines the key columns that represent various aspects of the patching information, making it a valuable resource for monitoring and managing agent updates.
Patching - Audit
This document provides a detailed overview of a comprehensive patching report dataview, including essential columns such as patching configuration, patch status, and compliance metrics for effective machine management.
Patching - Machines Missing 5+ Patches
This document outlines a monitor designed to identify Windows machines managed by ConnectWise Automate that are missing five or more patches which are at least 21 days old. It includes details on dependencies, configuration, and scheduling to minimize noise during patch approval processes.
Patching - No Patch Jobs Run
This document outlines a monitor designed to identify machines that are patching via ConnectWise Automate but lack patch job information in the system. It emphasizes the importance of reviewing these devices to ensure proper patching and maintenance.
Patching Hours Per Client
This document provides a detailed overview of patching jobs and the total patching hours for each client over the last 30 days. It includes key metrics such as the number of devices in patch managed mode and the total patch duration.
Patching Hours Per Machine
This document provides a detailed summary of patching jobs and total patching hours for each machine over the last 30 days, including important metrics such as the number of patch jobs and total patch duration.
Patching Metrics Overview - Client Filter
This document provides an overview of patching-related statistics for patch-managed Windows computers across various clients, categorized by the approval age of patches. It includes detailed metrics such as total approved and missing patches for both servers and workstations, helping to assess the patching status and compliance within the environment.
Patching Metrics Overview - Computer Filter
This document provides an overview of patching-related statistics for Windows computers in the environment, categorized by the approval age of patches. It details the number of approved and missing patches for each approval age category, along with relevant computer and client information.
pvl_patch_cu_compliance
This document outlines the SQL query used for the Patching and CU Compliance Metrics dataview, focusing on supported Windows computers with managed patch policies. It details dependencies, tables, and various metrics related to patch compliance and cumulative updates.
Remove WannaCry Vulnerability Solution
This document details a script designed to remove the WannaCry solution from the ConnectWise Automate environment, including the steps involved and the expected output. The automation process is expected to save approximately 20 minutes of manual effort.
Repair Windows Update
This document provides a comprehensive guide on using a script to reset Windows update settings. It outlines the steps necessary to implement the script within the ConnectWise RMM platform, including user parameters, task creation, and execution details. The script aims to reset Windows update settings, though it may not resolve all update-related issues.
Run Script on Next Patching Schedule
This document outlines the monitor set configuration used to identify Windows computers whose patching schedule has ended within the last hour. It details the dependency on the script "Run Script On Next Patching Schedule [Autofix]" and targets machines with active Automate Patching policies.
SEC - Windows Patching - MySQL View - pvl_v_windows_version_metrics
This document provides an overview of the Windows Patching Dataview Metrics for Windows 10 and 11, detailing the various metrics, dependencies, and explanations for understanding the data presented within the dataviews. It focuses on the support status, online machines, and patch policies associated with different Windows versions.
Set Windows Update Registry Values
This document provides a detailed guide on setting registry values for Windows Update to ensure proper patching and rebooting functionality through ConnectWise RMM. It includes steps for removing unnecessary registry entries and ensuring required values are set correctly.
SQL Servers
Group of SQL Servers.
Unapproved Patches Count Audit
Update Orchestrator Bouncer
This document provides instructions on how to implement the Update Orchestrator Bouncer script, which attempts to disable the update orchestrator solution on Windows endpoints by renaming or removing specific directories. It includes details on manual execution, dependencies, and deployment methods.
Update-VsaPatchingSchedule
This document outlines the process for updating machine custom fields with the organization custom field patching schedule, including requirements, process steps, and parameters for the API call.
Windows - Windows 10 Versions With Patching Details
This document provides a comprehensive dataview of all Windows 10 machines, detailing their versions, patching information, and setup. It includes various columns that represent critical data points such as OS version, client ID, and reboot policies.
Windows 10 + 11 Version Metrics
This document outlines a solution for displaying well-calculated Windows version metrics with multiple filters. It includes implementation steps, associated content, and troubleshooting FAQs to ensure successful deployment and usage of the metrics solution.
Windows 10 Feature Upgrade
This document outlines the process of initiating a Windows 10 feature upgrade that requires a mandatory reboot. It includes a summary of the procedure, sample run logs, and detailed steps of the process involved in executing the upgrade and scheduling necessary tasks.
Windows Patching - Quick Audit (Reference Table)
This document provides a detailed overview of a dataview that displays essential patching-related information for all Windows machines in the environment, aiding in troubleshooting patching issues. It includes dependencies, column descriptions, and FAQs for better understanding and usage.