> Patch Management > Patch caching

Patch Caching

Patch Cache is a location within a customer environment where the Probe downloads and stores Windows and third party patches for future distribution to the client devices as defined by the patch profile.

Using the patch cache, prevents heavy network and bandwidth use from many devices downloading patch files, and directs all patch downloads from a single local source.

A patch cache is typically one of the Probes or the only Probe in your customer's environment.

If you have a small group of devices you do not need a probe cache. You can set up a patch profile that instructs devices to go directly to Windows Update for their patches. For more information, see Patch management profiles.

Patch caching is enabled with a default size of 20 GB.

If you have a large environment or have a number of roaming devices, increase the cache size to 40 GB. This ensures that required patches are available for the roaming devices when they connect with the network after a few weeks.

Modify the patch caching options

  1. At the SO or Customer level, go to ConfigurationPatch Management.
  2. In the Patch Caching window, click Manage Probes.
  3. Click the Probe name and click the Caching tab.
  4. Make the modifications and click Save.

Once the probe reaches the cache size limit, it overwrites the oldest or newest data, as defined with the Probe Drop Policy.

The cache location can be any UNC path in your environment that can accommodate a large volume of data.

Google Chrome patching is not supported on Windows 2008 and Windows 2008 R2.

SolarWinds MSP recommends that you determine where you want to locate the cache and set it before patch management goes live in that environment. If you decide to change the location, MSP N-central begins moving the data to the new location immediately. Avoid changing the location multiple times in a short period of time, as it can cause patching issues.

Probes with patch caching enabled

When patch caching is enabled, the Probe needs to have access to software vendor's web sites to download the installation software that it stores in the patch cache for the patching maintenance window. Adding the web sites below to the firewall white list ensures that patching can run without interruption due to blocked downloads.

Agents only requires access to the Server In The Sky (http://sis.n-able.com).

Device Type Vendor server URL

Device with Probe

  • Server In The Sky (SIS) - http://sis.n-able.com
  • Adobe Acrobat - http://ardownload.adobe.com
  • Adobe Reader - ftp://ftp.adobe.com/
  • Adobe Air - http://airdownload.adobe.com/
  • Apple Products - https://secure-appldnld.apple.com
  • Flash - http://download.macromedia.com/
  • Foxit - http://cdn01.foxitsoftware.com/>
  • Google Products - https://dl.google.com
  • Java - http://javadl.sun.com/
  • Mozilla Products - https://download-installer.cdn.mozilla.net
  • Notepad++ - http://download.tuxfamily.org/
  • Opera - http://get.geo.opera.com/
  • Shockwave - http://www.adobe.com/>
  • Skype - http://download.skype.com/
  • WinRAR - http://www.rarlab.com/
  • WinZip - http://download.winzip.com/
  • VLC - http://download.videolan.org/

Device with Agent

  • Server In The Sky (SIS) - http://sis.n-able.com

Probes without patch caching enabled

  • Configuring a third-party patch as Approved for Removal, MSP N-central removes the entire application from the device, not just the software patch. Third-party software patches are not incremental.
  • Some patches are reported as Approved but not installed after installation because some software patches require that the target device be restarted to complete the installation.
  • To install the third party applications listed below, ensure they are disabled in Chrome, Java, Opera, Safari or Skype.
Device Type Vendor server URL

Device with Agent

  • Server In The Sky (SIS) - http://sis.n-able.com
  • Adobe Acrobat - http://ardownload.adobe.com
  • Adobe Reader - ftp://ftp.adobe.com/
  • Adobe Air - http://airdownload.adobe.com/
  • Apple Products - https://secure-appldnld.apple.com
  • Flash - http://download.macromedia.com/
  • Foxit - http://cdn01.foxitsoftware.com/
  • Google Products - https://dl.google.com
  • Java - http://javadl.sun.com/>
  • Mozilla Products - https://download-installer.cdn.mozilla.net
  • Notepad++ - http://download.tuxfamily.org/
  • Opera - http://get.geo.opera.com/
  • Shockwave - http://www.adobe.com/
  • Skype - http://download.skype.com/
  • WinRAR - http://www.rarlab.com/
  • WinZip - http://download.winzip.com/
  • VLC - http://download.videolan.org/