The results to our Windows patching survey showed that rebooting servers after updates is highly disliked, followed by lack of manpower as those in IT have other duties as well, and that testing patches against other software before deployment is another major time eater for IT. After asking, if IT departments were too slow to patch Windows, we asked our readers to participate in a survey about Windows patching and the results are in! Despite efforts to automate patches, patching Windows computers, both servers and clients, are still an incredible time sink for IT departments.There were several IT people who pointed out a major problem in patching Windows is that the server then needs rebooted and often cannot be done during the day. Of the 171 responders, more IT departments test patches before rolling Windows updates out than don’t, but the average amount of time that it takes to roll patches out after Microsoft’s Patch Tuesday seemed to vary quite a bit.Question 5 was, What are the main reasons that would cause you to delay rolling out a patch longer than 24 hours after Microsoft releases it?Custom software came in as the main reason it would take more than 24 hours to test and deploy patches. Yet not far behind was the lack of manpower to roll out critical patches; testing less-imortant patches ranked lower in priorities. And very close behind was the fact that people frequently find that Microsoft’s patches cause issues with software and resolving those issues often took more than 24 hours. “Other” ranked as the next reason, followed by IT departments which have regulatory requirements that require time-consuming tests of each patch. This is where the comments came in and an overwhelming clarity of how much patching stretches manpower. There seems to be a great unhappiness that patching requires rebooting the server which usually means it must be done after normal working hours. Here are some of my favorite comments you submitted along with this survey.*PLEEEEASE find a way to apply a patch without rebooting the whole server? C’mon, it cannot be that difficult.I find that an increasing number of patches don’t work immediately. On the other hand, MS gives support for that…, but it’s 2 hours gone in smoke.Soon after I took over we went from requiring 12 people to each spend 12- 20 hours to patch servers, we went to needing 2 people to work about 6 hours each using scripts. After I was moved to other tasks, they resumed the previous manual process. Production PC’s are patched a month after they’re released, and production servers are patched twice a year.It’s not just about Microsoft anymore. The real time wasters are the other patches (Adobe, Firefox, Quicktime etc.)Patching windows machines is more involved than simply Microsoft patches, unless you don’t run other software.Another big issue is patching critical machines after hours. Some things cannot be rebooted during the day so I am required to reboot at night.Let’s face it. Microsoft’s insecure systems cost us untold billions of dollars each year not to mention the overload that they place on the internet infrastructure of the world. Microsoft+Adobe+Java+AntiVirus+Mozilla (Firefox+Thunderbird)+OpenOffice … it just takes too damned long!Patching is hard but necessary. I wish companies like Microsoft and Apple were legally liable for buggy and insecure software.The biggest hurdle is getting an outage time from the business to reboot the servers. By the time you’ve patched the servers (500+) I find we then have a week before the next lot of patches come out!My company relies on our supplier to patch machines. The last update blocked me from TRUSTED spreadsheets on our internal network. It took our company no time to shut the real value of our workdown.Way to long [expensive] and fraught with danger of hosing a server.It is core to our operational success – but it is a major labor hit for our patch team which also is responsible for numerous other duties as well. THIS IS WHY WE ARE CONVERTING TO LINUX ACROSS ALL SERVERS AND CLIENTS THAT JUST NEED BASIC OPERATIONS.When asked if Microsoft had any future plans in which servers could be updated with patches without needing to reboot, Pete Voss, Senior Response Communications Manager, Microsoft, noted:Microsoft recognizes that restarting systems can disrupt its customers’ businesses and that uptime is critical. Based on customer feedback, we implemented the monthly update cycle and work to consolidate updates as much as possible. This provides a high level of predictability for customers to plan their deployments. To learn more about vulnerability management at Microsoft and how we work to minimize disruption for customers, we have released the Vulnerability Management at Microsoft whitepaper. We also encourage customers to download and review the Microsoft Security Update Guide second edition which was written to help IT professionals better understand and use Microsoft security update release information, processes, communications, and tools – and how to manage organizational risk and develop a repeatable, effective deployment mechanism for security updates.Thank you to Scott.Like this? Here’s more posts:State Police can suck data out of cell phones in under two minutes TSA Surveillance: Peep Show, Police State, Privacy Invasion or All Three? Michigan State Police reply to ACLU about cell phone data extraction devices Elite Navy SEALs secure motherlode of intelligence data during bash and dash Julian Assange: Facebook is a “spy machine” for US Intelligence FBI: Surveillance “going dark” or obsessed with porn and doing a poor job? Ridiculous DHS list: You might be a domestic terrorist if… Former FBI Agent Turned ACLU Attorney: Feds Routinely Spy on Citizens Microsoft Improves Exploitability Index Rating System Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe