DeepSurface: Patches
DocumentationInstallation GuideOverviewLet DeepSurface Host For YouGetting StartedSystem RequirementsSelf Hosted Quick Start - Installing to Cloud PlatformsSelf Hosted - Installation Using an OVARegistration, Package Installation, and InitializationFirst Steps After Initialization of the ConsoleDeployment OptionsMain and Subordinate ConsolesAgent-Based DeploymentUser Managed Scan DeploymentCredentialed Scanning DeploymentMixed EnvironmentDeployment ToolsActive Directory Group PolicyMicrosoft Endpoint Configuration Manager (part of InTune)Tanium DeployHCL BigFixIvantiVirtual MachinesVMWareVirtual BoxVirtualBox Guest AdditionsAWS EC2 (BYOL)AWS EC2 (Usage Based)Azure CloudGoogle CloudAdditional Items to ConsiderMain Console Server CertificatesLDAPTOFUClock SyncDeepSurface CommandsMultiple Vulnerability SourcesAPI DocumentationUser GuideReportingDashboardsExportsRisk InsightHostsPatchesVulnerabilitiesVulnerability InstancesUsersRemediation Workflow ManagerPlansSettingsIntegrationsWorkflowExportingAccepted Risk PlansAccepted Risk WorkflowExploreModelPathsActivityTasksConfiguration AlertsScan LogsNotification SettingsScanningStatusAgentsUser ManagedCredentialed Scanning SettingsCredentialsScan GroupsGeneral SettingsCloud ScanningNetwork ConnectivitySubordinatesVulnerability SourcesSetupSensitive Assets: PolicesSensitive Assets: ManualAdmin SettingsSMTP SettingsCertificatesOutbound ProxyAuthentication ProvidersUsersTagsIntegrations GuideVulnerability SourcesCrowdStrike SpotlightSentinelOneCarbon Black CloudMicrosoft Defender for EndpointWazuhLansweeper CloudNessus APITenable.io APISecurity Center/Tenable.sc APIRapid7 InsightVM APIQualys APINozomi GuardianEclypsiumAWS InspectorRemediationJira SoftwareTanium (BETA)Authentication ProvidersLDAP (Active Directory)SAML (Azure Active Directory)SAML (Google)SAML (Okta)PAMCyberArkDelinea (Thycotic)Microsoft LAPSSecurity GuideFirewall ConfigurationBase Network RequirementsAgent Network RequirementsCredentialed Scanning Network RequirementsAPI Network RequirementsHow DeepSurface Scans WorkDomain (LDAP) ScanningHost Scanning RoutineReasons for the Administrative Access RequirementEndpoint Protection ConsiderationsOther ItemsScope of Data Storage and RetentionIPS/IDS ConsiderationsLoggingResetting the DSADMIN passwordProduct InformationChangelogsOpen source LicensesEnd User License Agreement (EULA)

The patches report answers the question, If applied, applying which patches will reduce the most risk in my environment? By default, the main page of the patches report shows the top 100 patches that carry the most risk reduction potential in your environment. This can be filtered down to your liking (as described in the previous section) and clicking on any of the patch items in the report will bring you to the detail page for that patch.

Filtering
Host, patch, vulnerability, and vulnerability instance reprots all have robust filtering options. To learn more about filtering see the Filtering Section of the help documentation.
Exporting
Any report can be exported as an Excel spreadsheet or PDF. For more information on exporting, see the Exporting Section of the help documentation.
Detail View
Detail pages in general are discussed in the common elements section, but a patch detail page has some unique sections and elements that are discussed below:
1. The Summary Panel: the summary panel gives you a broad and high-level overview of what DeepSurface knows about a particular patch. Starting at the top, the summary panel tells you:
- A breakdown of all the vulnerability instances as a result of this patch not being applied everywhere it should
- A brief description of the patch from the vendor
- Any additional actions or newer patches that may be available
- High-level counts of affected hosts and addressed vulnerabilities
- A breakdown of the exploit status of all the vulnerabilities fixed by this patch
- A breakdown of the CVSS scores of all the vulnerabilities fixed by this patch

2. Hosts, vulnerabilities, and patch rollup: A list of all hosts that are missing this patch, as well as a list of all vulnerabilities that can be fixed by applying this patch can also be found on the "Risk and Remediation" tab. If there are more than 200 present of any of these categories, you can follow the link to take to the corresponding report, filtered by this patch. Often patches also supersede or "roll up" older patches. A list of all patches that a certain patch rolls up can also be found in this section.
