Article Page

Easy2Patch is a software that integrates with Microsoft Configuration Manager (aka. ConfigMgr or SCCM), WSUS and Intune. Apart from these, there is no software with which it is integrated. Easy2Patch team periodically checks more than 400 3rd party software every day with automatic and manual methods and reflects the updates in the catalog. Critical updates are published immediately, otherwise the catalog is published every Saturday. You can follow the catalog publications on blog.easy2patch.com.

Easy2Patch allows over 400 3rd party software to be updated. Its catalog expands every week and can support more 3rd party products. You can view how well the products in the Easy2Patch catalog are supported in your corporate network with the Update Statistics button. The Update Statistics button connects to the database of the SCCM server and compares it with the products in the catalogue. Next to each product, it shows how many computers are installed in the system. In order to see this information properly, it is necessary to specify the SCCM database on the settings screen.

Read More...

Easy2Patch 1.0, which started its update life on December 23, 2021, will be updated for the last time on December 31, 2023. Easy2Patch 1.x versions will be end of life as of January 1, 2024. As of January 1, 2024, 1.x products will not be able to receive the catalog included in the updates. The current catalog can be used but new products and updates will not come. Additionally, errors that may occur in Easy2Patch 1.x versions will not be corrected. No security or application updates will be released.

Read More...

When the Schema folder has been deleted from the WSUS installation directory you cannot publish updates with Easy2Patch to WSUS environment and WSUS cannot process any updates.

WSUS (Windows Server Update Services) is a Microsoft tool for managing the distribution of updates released through Microsoft Update to computers in a corporate environment. To keep the WSUS running smoothly and to optimize its performance, regular maintenance tasks must be performed. When Easy2Patch is used with WSUS and/or SCCM, these maintenance operations are also important for the health of 3rd party update processes with Easy2Patch.

In an IT environment, keeping third-party software up-to-date is critical to maintaining security and ensuring optimum performance. Here are some effective ways to stay up to date.

More

In this article, where we explain how to give the necessary permissions for the Intune Update and Application Deployment features that come with Easy2Patch 3.0 and the Critical Update Management with Defender features that come with Easy2Patch 3.1, you need to have the appropriate permissions because we will be running AppRegistrations on the Azure Portal.

More

As you know, these days, there are many cyber-attacks, especially to corporations. Though these attacks, sometimes, take advantage of some protocol vulnerabilities; in general, they take advantage of vulnerabilities in unpatched software (specifically in 3rd party software). To avoid such scenarios, ensuring using up-to-date software has a considerable importance in terms of defense strategies for a corporation. But at this point, keeping all the software inventory in an organization can be hard to maintain, especially if there are a lot of clients and/or numerous software catalogues for each group of endpoints. For this reason, there may exist some unpatched software that are vulnerable and missed by the system administrator. Here, the power of Easy2Patch becomes apparent.

More

Security has been a major concern since the dawn of the information age. Especially nowadays, there are a lot of data breaches from relatively large companies. And a significant number of breaches are caused by software vulnerabilities rather than protocol vulnerabilities. In this article, I will talk about the importance of using up-to-date software and adding special products to the catalog.

More

The rise of ransomware attacks has emerged as a major threat to cybersecurity in recent years. Ransomware is essentially a type of malware that blocks access to a computer system or individual files until a ransom is paid. Typically, the attackers demand payment in the form of cryptocurrency such as Bitcoin, which is difficult to trace. These attacks are often initiated through phishing emails or other social engineering techniques that trick users into clicking on a malicious link or downloading an infected file.

More

A new zero-day vulnerability has been discovered in Google Chrome, marking the first time this year that a security flaw of this nature has been exploited in attacks. The vulnerability, CVE-2023-2033, is a type confusion issue in the V8 JavaScript engine, and Google has already released an emergency update to protect users.

More

Last updated