Using My OPSWAT Central Management On-Premises for Air-Gapped Patching

AI Tools

Setting up My OPSWAT Central Management On-Premises

My OPSWAT Central Management version 10.3.2512.2391 (and above) offers the latest air-gapped patch management support.

To begin setting up air-gapped patch management, two things need to be done first:

  1. My OPSWAT Central Management on-premises is installed and licensed
  2. Endpoint devices are enrolled

When endpoints are enrolled and communicating with My OPSWAT Central Management, they will begin to report their missing patches.

There are 2 places where missing patches can be viewed:

  • For a singular device
    • Inventory > Devices > selected device > OS Patches
Device OS Patches

Device OS Patches

  • All missing patches aggregated among all devices
    • Inventory > Patches > Operating System / Third Party Application tabs
OS Patches

OS Patches

Third Party Application Patches

Third Party Application Patches

Enable air-gapped patching

To enable Endpoints to retrieve patches from My OPSWAT Central Management:

  1. Log in to My OPSWAT Central Management
  2. Navigate to Settings > Update Package > Patches > Operating System / Third Party Application
  3. Check "Enable Local Patch Repository"
  4. Click the Save button to apply
Enable local patch repository

Enable local patch repository

Your vendor, in partnership with OPSWAT, will provide the capability to download patch packages to upload & distribute via My OPSWAT Central Management to MD Endpoints.

Contact your vendor for further information on how to obtain patch packages.

If you are an ICS vendor looking to provide patch packages for your customers, please contact OPSWAT directly to enable the operation.

Upload patches to distribute

Patch packages are delivered in two pieces:

  • .zip package containing the patch content
  • .yml descriptor file for validating the .zip package

There are 2 modes for providing patches:

  1. Manual
  2. Folder

Manual

When selected, additional boxes are displayed for the upload:

  • Select yml and zip files to update

    • click the upload icon to browse for the yml (descriptor) and zip (package) file to upload
  • Applicable Groups

    • set the specific groups the patches being uploaded will be applicable for
    • this setting informs if a patch setting configuration is valid, if the deployment includes a disallowed group or devices that are within a disallowed group
    • default setting: All groups

As patch packages are uploaded, My OPSWAT Central Management will validate the package with the descriptor file.

All uploaded patches will be listed out after upload:

All patches will remain and must be manually cleaned up if the patch is no longer needed.

Simply click the trash icon next to a patch to delete it and reclaim the disk space back.

Folder

Patch Repository Location

Patch Repository Location

When selected, a Patch Repository Location is displayed. The path is local to the system My OPSWAT Central Management is installed on.

All patches are expected to be stored in this directory, under a distinct structure outlined below.

Simply copy and paste the patches to the location configured.

The following directory structure must be maintained in the specified format for My OPSWAT Central Management to correctly identify patches:

Configure Patch Settings

Once patches are uploaded, they must be configured to be deployed to endpoints.

This is done by configuring patch settings.

Operating System Patches

From the Patches inventory, available patches can be selected and configured:

Select the KB patches to configure.

From the Actions dropdown menu, select Configure Patch Settings.

A Patch Settings dialog will then open to configure the patch deployment:

Patch Settings items:

  • Apply update to

    • All Applicable Groups - auto apply patch to the applicable groups
    • Custom - enable selection to specify which groups / devices to apply the patch
  • Force devices to reboot

    • After the patch is applied, immediately auto reboot the device
    • If disabled and a reboot is required, the status of the patch will be marked as pending reboot
  • Schedule update

    • Set the date, time, and time zone to apply the patch deployment on the endpoint
    • If not set, endpoints will immediately attempt to download and apply the patch the next time it syncs and sees the patch setting
  • Apply to specific groups

    • Select from the list of Endpoint groups to apply the patch to
  • Apply to specific devices

    • Search for devices to select to apply the patch to

When the Patch Setting is saved, Endpoints will see the scheduled deployment the next time they sync with My OPSWAT Central Management.

Third Party Application Patches

From the Patches inventory, available patches can be selected and configured:

Select the applications to configure.

A Patch Settings dialog will then open to configure the patch deployment:

Patch Settings items:

  • Update to (dropdown to select which version to target to update to)

    • Latest Available Version - update the app to the latest version
    • <version available> - multiple available versions listed for selection if they exist
  • Apply update to

    • All Groups - auto apply patch to all endpoint groups
    • Custom - enable selection to specify which groups / devices to apply the patch
  • Force close applications for updates

    • Close the application to apply the patch
    • If disabled, user will be prompted to close the application
  • Schedule update

    • Set the date, time, and time zone to apply the patch deployment on the endpoint
    • If not set, endpoints will immediately attempt to download and apply the patch the next time it syncs and sees the patch setting
  • Apply to specific groups

    • Select from the list of Endpoint groups to apply the patch to
  • Apply to specific devices

    • Search for devices to select to apply the patch to

When the Patch Setting is saved, Endpoints will see the scheduled deployment the next time they sync with My OPSWAT Central Management.

Configured patch settings will be displayed in the inventory of patches.

Remove a patch setting

If a patch setting is no longer applicable, select a patch that already has a patch setting configured.

From the Actions dropdown menu, select Remove Patch Settings to delete the saved patch setting.

Configure a Cache Node

By default, all Endpoints will reach out to My OPSWAT Central Management to download and apply patches.

This can introduce a large bottleneck on the server if there are many Endpoints enrolled for management.

To reduce this load, Endpoints can be selected to serve as a Cache Node to help distribute patches to other Endpoints instead if solely relying on My OPSWAT Central Management.

Cache Nodes support distributing patches to configured device groups. Up to 2 devices can serve as a Cache Node for a specific group. A single Cache Node can span multiple groups.

To configure an Endpoint as a Cache Node, navigate to Inventory > Devices > select device to set.

On the device's details page, open the Actions dropdown in the top right corner and select Set as Cache Node.

A dialog menu will open describing the requirements and important information:

Set as Cache Node

Set as Cache Node

To set the device as a Cache Node, select the Groups for which the device will serve as a node. Check the acknowledgement and click Save.

View which device is a Cache Node

Verifying which device is a cache node can be seen in a device's System Information:

Or in a Device Group's Settings:

Remove a Cache Node

To remove a device as a Cache Node.

To remove an Endpoint as a Cache Node, navigate to Inventory > Devices > select device to set.

On the device's details page, open the Actions dropdown in the top right corner and select Set as Cache Node.

In the dialog menu, de-select the configured groups, check the acknowledgement, and click Save.

Update Patch database definitions

My OPSWAT Central Management comes pre-bundled with vulnerability and patch management definitions.

These databases will be downloaded by MetaDefender Endpoint when it syncs with the management server. They enable the ability for Endpoint to scan the local system and identify what patches are missing and vulnerabilities associated with versions installed on the system.

To ensure identification is up to date, new definitions can either be downloaded from your vendor or from My OPSWAT Portal.

Definitions can then be uploaded in Settings > Update Package > Agent Components > Vulnerability Definitions / Patch Management

OS Patch Compliance Report

A compliance report for OS patches can be downloaded for reviewing the status of all patches among devices.

Only patches that are uploaded will be reported on.

To retrieve the OS patch compliance report:

  • Navigate to Settings > Update Package > Patches > Operating System
  • Click the Export button to download a .csv of the compliance report
compliance report export

compliance report export

Sample compliance report:

Compliance Report

Compliance Report

Columns in report:

  • Patch - KB ID of the patch

  • Applicable devices - count of devices the patch is currently applicable to

  • Date Available - date timestamp when the patch was uploaded to the mgmt server

    • date format: YYYY-MM-DD HH:MM:SS AM/PM UTC+offset
  • Device Name - name of the applicable device for the patch

  • Applicable - Yes/No if the patch is applicable to the device

  • Date Installed - date timestamp when the patch was successfully applied

  • Status - status of patch on device

    • values: Not Installed / Pending Reboot / Installed
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard