Skip to main content

System Updates

System update policies control how Windows and Linux patches are deployed to your endpoints. Each policy defines which updates to install, which agents to target, and when installations should occur. You can run multiple policies in parallel to handle different groups of endpoints with different patching strategies.

How TridentStack Control manages Windows Update

When the TridentStack Control agent is installed on an endpoint, it automatically suppresses native Windows Update. This ensures that the platform is the sole provider for system updates, preventing conflicts between Windows Update and your managed patching policies.

  • On modern systems (Windows 10 2004+, Windows 11, Server 2022+), the agent blocks quality, feature, and other updates while allowing driver updates through Windows Update.
  • On older systems (Server 2019, Server 2016), all update categories are blocked and managed exclusively through TridentStack Control.

The agent verifies this configuration on every startup and reapplies it if it has been changed. No manual configuration is required. For full technical details, see the Agent Reference.

Creating a policy

Navigate to Update Management > System Updates in the left sidebar and click Create Policy. The policy creation form walks you through these sections:

Name and description

Give the policy a descriptive name that reflects its purpose and audience. For example, "Production Servers - Monthly Security Patches" or "Dev Workstations - Weekly All Updates". The description field is optional but recommended for documentation.

Target agents

Choose which endpoints receive this policy. You can target agents in two ways:

  • By tag - Select one or more tags. Any agent with a matching tag receives the policy. This is the recommended approach because new agents automatically pick up the policy when tagged.
  • By individual assignment - Select specific agents from the list. Useful for one-off policies or testing on a specific machine.

Schedule

Define a maintenance window that controls when updates are installed:

  • Day of week - Select one or more days (e.g., Tuesday and Thursday)
  • Time window - Set a start time and duration (e.g., 2:00 AM for 4 hours)
  • Recurrence - Weekly, biweekly, or monthly

Agents only install updates during their assigned maintenance window. Outside the window, agents download and stage updates but do not install them.

Pre-staging

When enabled, agents download approved updates ahead of the maintenance window. This means the actual installation phase is shorter because the files are already on disk. Pre-staging is especially useful for large cumulative updates that take significant time to download.

Restart behavior

After updates are installed, some patches require a restart to complete. Configure how restarts are handled:

OptionBehavior
Restart immediatelyAgent restarts as soon as installation completes, within the maintenance window
Schedule restartAgent waits until a configured time to restart (e.g., next morning at 6:00 AM)
User decidesA notification is shown to the logged-in user, who can restart now or defer
No restartNo automatic restart. The update remains in a pending-restart state until the machine is manually restarted
tip

Use pre-staging to download updates ahead of the maintenance window. This reduces the time agents spend in the installation phase and keeps maintenance windows short.

Update approval workflow

By default, updates are not approved for installation. You control exactly which patches reach your endpoints through the approval workflow.

Browse available updates

Open the policy detail page and use the update browser to see all patches that are available for the targeted endpoints. The browser shows update title, KB number, classification, severity, release date, and whether the update supersedes older patches.

Approve updates

Select individual KBs or approve in bulk by classification. Approved updates are eligible for installation during the next maintenance window. You can approve updates at any time, and they will be picked up by agents on their next check-in.

Deny updates

Explicitly deny updates you do not want installed. Denied updates are hidden from the available list and are never offered to agents. This is useful for known-problematic patches or updates that conflict with specific software in your environment.

Auto-approve rules

Set rules to automatically approve updates by classification after a configurable delay. For example:

RuleEffect
Auto-approve Critical Updates after 3 daysCritical patches are approved 3 days after release
Auto-approve Security Updates after 7 daysSecurity patches are approved after a 1-week observation period
Auto-approve Definition Updates immediatelyAntivirus definitions are approved with no delay

Auto-approve rules are evaluated when an update policy is modified and when new updates are synced into the catalog. When an update matches a rule and the delay period has elapsed, it is approved automatically. You can combine auto-approve rules with manual review: auto-approve routine classifications and manually review higher-risk categories like Feature Packs or Service Packs.

Update classifications

Updates are organized by classification. Each classification represents a different type of patch:

ClassificationDescription
Critical UpdatesNon-security fixes for critical bugs
Security UpdatesPatches that address security vulnerabilities
Definition UpdatesAntivirus and anti-malware signature updates
Feature PacksNew product functionality distributed outside a full release
Service PacksCumulative collections of hotfixes, security updates, and critical updates
Update RollupsCumulative sets of hotfixes packaged together for easier deployment
Driver UpdatesUpdated device drivers published through the update catalog

Install time estimates

TridentStack Control displays estimated installation times next to each update in the catalog browser and on each agent's pending updates list. Estimates appear as approximate durations (for example, "~15 min" or "~1h 30m").

Estimates are calculated from historical installation durations recorded across your fleet. New tenants see catalog-based estimates initially. As more updates are installed in your environment, the estimates become more accurate and are tailored to endpoints with similar hardware profiles when enough data is available.

Click the info icon next to any estimate to see the confidence level (High, Moderate, or Low), the number of recorded installs, and a statistical breakdown including median, average, and 95th percentile durations. High confidence means the estimate comes from 5 or more installs on similar hardware. Moderate means 3 or more installs are recorded. Low means fewer than 3 data points are available.

When selecting multiple updates to install, the confirmation dialog shows an aggregated estimated total install time.

tip

Estimates use the median duration to avoid skew from occasional slow installs. For conservative maintenance window planning, check the 95th percentile in the estimate detail popover.

Install Stats

The Install Stats column appears in the update catalog browser and on each agent's pending system updates list. It shows fleet-wide installation success metrics for each update, helping you identify problematic patches before approving them.

What Install Stats show

Hover over or click the Install Stats badge on any update to see:

FieldDescription
Total deploymentsNumber of times this update has been installed across all endpoints in your fleet
Success ratePercentage of installations that completed successfully, color-coded: green (95%+), amber (80-94%), red (below 80%)
ConfidenceData quality indicator based on deployment count: High (50+), Moderate (10-49), or Limited (fewer than 10)
Common errorsTop 3 most frequent error codes from failed installations, with occurrence counts

How Install Stats are populated

Install Stats are computed from actual installation outcomes recorded by the TridentStack Control agent on your endpoints. Every time an update is installed (whether it succeeds or fails), the agent reports the result back to the platform. These results are aggregated periodically (approximately every 15 minutes) into the stats you see in the UI.

New tenants and newly synced updates will show empty Install Stats ("--") initially. Stats appear only after updates have been installed on at least one endpoint in your environment. The more updates your fleet installs, the more data points are available, and the more useful the stats become.

Install Stats in the catalog expanded row

When you click on a system update in the catalog browser to expand its detail row, an Install Intelligence section appears showing the same deployment count, success rate, and common errors in a larger format. This complements the existing install time estimates and known issues sections to give you a complete picture of each update's installation track record.

Policy lifecycle

A typical policy follows this progression from creation to reporting:

Each stage builds on the previous one. You can return to any stage at any time to adjust the policy. Changes take effect on the next agent check-in.

Monitoring deployment

After a maintenance window runs, check the policy detail page for deployment results. The results view shows each targeted agent with the following information:

ColumnDescription
AgentEndpoint hostname
Updates installedCount of successfully installed patches
Updates failedCount of patches that failed to install, with error details
Restart statusWhether a restart was performed, is pending, or was not required
DurationTotal time the agent spent in the installation phase

Click any agent row to expand it and see per-update details, including individual KB results, error codes, and timing.

warning

Always test update policies on a small group of endpoints before deploying fleet-wide. Use deployment rings to implement phased rollouts and catch issues before they affect production systems.