III — How-To Guides
Set up patch management for a group
Approve patches globally, then configure per-policy rollout rules for a Windows group.
Set up patch management for a group
Patch management in NetLock RMM is split across two places that do different jobs, and getting both configured is what makes patching work. The /patch-management page is the global approval queue — "which patches are allowed on any device at all?" The Policy Settings editor's Patch Management tab is the per-policy rollout — "when and how do these particular devices install the approved patches?" This guide covers both, using a Windows group as the worked example.

Before you start
- A policy already exists and is routed to the target Windows group via an automation (see Guide H.4).
- At least one Windows device is online in that group.
- Patches have been detected and sit in the Pending state on the Patch Management page. If the list is empty, agents have not yet reported their update inventory — wait a sync cycle.
- Required permissions:
patch_management_enabledfor the approval page, pluspolicies_enabledand the policy edit flag for the rollout configuration.
Steps
Stage 1 — Approve patches globally
- Open
Patch Managementfrom the navigation. TheUpdate Approvaltab is the default. - Filter by
Windowsand browse the Pending patches. - Select a manageable first set — critical security updates from the previous month are a safe start. Avoid bulk-approving every pending patch on day one.
- Click
Approve. The selected patches move into the Approved state. The server flags every device for a resync so agents pick up the updated approval list on their next poll.
Use the other actions as needed:
Reject— explicitly block a patch; devices never install it.Defer— postpone a patch for a number of days (default 7).Reset to Pending— revert any state decision back to pending for later review.
Approvals are global. There is no per-device or per-group target selector on this page — scoping happens in stage 2.
Stage 2 — Configure the per-policy rollout
- Open
Policiesfrom the navigation and clickManageon the policy that routes to your Windows group. - Open the
Patch Managementtab in the Policy Settings editor. The tab is split intoGlobaland per-platform sub-tabs; pickWindows. - Under the Windows sub-tab, fill in at least these three sub-tabs for a minimal rollout:
General— enable patching for Windows and select which sources participate (at minimumOS-Mandatory, optionallyWingetandChocolatey).Schedule— pick a maintenance window. Outside the window the agent will not start an install.Reboot— decide whether the agent may reboot, whether it prompts the user, and how long the prompt is visible. This is the only place in the product where reboot behaviour is configured.
- Optionally fill in
Approval & Filtering(narrow approved patches by severity or source),Deployment Rings(stage the rollout acrossPilot → Early → Broad),Notifications, andRetry. - Save the policy.
Verify it worked
- On the Patch Management page's
Update Approvaltab, the patches you approved show theApprovedstate and theInstalledandPendingcolumns begin moving as devices pick up the change. - On a target device's detail view in
Devices, theEventsentries reflect patch install activity within the configured maintenance window. - The
Update Historytab on the Patch Management page shows the install outcomes per patch per device.
Troubleshooting
- Patches stay at 0 installed. Check that a policy with
Patch Management → Windows → Generalenabled is actually assigned to the device. If the device's detail view showsno_assigned_policy_found, the automation is missing. - Patches approved but devices ignore them. Check the policy's
Approval & Filteringsub-tab — a filter there can veto a globally approved patch. - Reboots happen at unexpected times. Review
Patch Management → Windows → RebootandSchedulein the policy. Reboot prompts follow the schedule's maintenance window. - SLA chips show
Overdue. Adjust the SLA thresholds on the Patch ManagementSettingstab if the defaults (7 / 15 / 30 / 60 days by severity) do not fit your environment.
Related
- Chapter 7 — Patch Management — the global approval queue, vulnerabilities tab, update history, and SLA settings.
- Chapter 6.12 — Patch Management tab — the complete per-policy rollout reference.
- Guide H.4 — Build and apply a policy — the prerequisite routing setup.