Advanced Patching
Sections
If you have a Puppet Enterprise Advanced license you can enable Advanced Patching with vulnerability remediation capabilities from the PE console. From the PE console navigation bar, select Overview and click Get started with Advanced Patching now.
- The service requires an extra 1GB of RAM, to operate by default. CPU usage varies based on how many systems are being patched and how often, but is an incremental amount of usage. The service also requires incremental additional disk storage for the vulnerabilities database, with usage varying based on the number of nodes being managed.
- To enable Advanced Patching, you must acquire a Puppet Enterprise Advanced license. Contact your Puppet Enterprise administrator or Contact our sales team to acquire a license and enable this feature.
- Ensure there are no classification issues on the primary server and that a Puppet run can complete successfully before you enable Advanced Patching.
- The Advanced Patching feature is not enabled by default, and requires a user with permissions to run all plans in order to enable the feature. Once enabled, the feature cannot currently be disabled.
- The Advanced Patching feature assumes ownership of the PE Patch
Management node group tree. Any patch groups declared under that
group are modified or deleted by the Advanced Patching service. It is important
that no additional classification is applied beyond use of the
pe_patch
class to the PE Patch Management group, or any groups underneath it otherwise Advanced Patching will not enable successfully. - Once enabled, the PE Advanced Patching feature enforces the state of the PE Patch Management node group tree, so any manual changes made to it are replaced.
- RBAC: A default role is available for patching in PE. That role can be assigned to a user to do patching. The Administrator by default has all permissions. The permission needed for onboarding customers must have permissions to run a plan on the primary server. For more information about Advanced Patching user permissions and roles see User permissions and user roles.
Create a blackout window
To add a blackout window:
- In the PE console navigation bar, select Blackout Windows.
- Click Add blackout window.
- In the Information section, add a name for your blackout window.
- From the drop-down menu in the Availability section, select how often you would like the blackout window to run.
- In the Schedule section, designate a valid period of time for your blackout window.
- Click Add blackout window.
Create a maintenance window
To add a maintenance window:
Create a patch group
To create a patch group:
Vulnerability remediation
Advanced Patching service includes vulnerability remediation capabilities, enabling you to identify vulnerabilities in your infrastructure and apply required updates to affected nodes.
- To use Advanced Patching, you must acquire a Puppet Enterprise Advanced License and enable the Advanced Patching service.
- To use vulnerability remediation capabilities, vulnerability data from your security scanner must be integrated into PE using a transformer to parse the scan data.
- Nodes you want to patch must be added to patch groups.
Get an overview of detected vulnerabilities
You can filter and sort the list to assess and prioritize the vulnerabilities for remediation. You can use a full or partial text search to locate specific vulnerabilities. To begin the remediation process for a vulnerability, locate and click the vulnerability in the list.
View vulnerabilities on an individual node
In the PE console navigation bar, navigate to the Node details page for a specific node, and click the Vulnerabilities tab to show a list of the vulnerabilities on the node.
Remediate a vulnerability
- In the PE console navigation bar, select Vulnerabilities.
- In the list of vulnerabilities, locate and click the vulnerability you want to remediate, to display details and access remediation capabilities.
View details and required remediation
- See the Key details for an overview of the vulnerability. To view the full description imported from your scanner via the transformer, see the Analysis.
- View the required Remediation, including the packages
that must be updated. This information comes from your scanner via the
transformer. Remediation is available when the relevant packages are present on
the host. Note: Where a package recommended for update has a dependency on other packages, those packages are also updated in the remediation process.
- Assess the impact on your infrastructure. Under Nodes with the vulnerability, use the Patch Group affected tab to see how many nodes are affected, check patch availability, and determine whether a patch job is scheduled. Use the Nodes Affected tab to identify the vulnerable nodes.
Next steps: Remediate the vulnerability.
Remediation
If a patch with the required package updates is available, you can create a patch job to remediate a vulnerability on affected nodes within a patch group.
- Select the nodes for remediation.
- Under Nodes with the vulnerability, go to the Nodes Affected tab and choose a patch group to list the nodes in that group. For the listed nodes, you can view whether a patch is available and whether a patch job has already been scheduled.
- Select the nodes to remediate.
- Click Remediate Vulnerability to open the Create patch job wizard.
- If required, configure the patch job to reboot the nodes after patching, and set any advanced parameters required by the package manager.
- Choose when the patch job runs. You can run it immediately, or schedule for a later time. You can opt to override blackout and maintenance policies: for example, to apply critical patches outside of defined windows.
- Review the patch job settings.
- Run the patch job or activate the schedule.Note: Some Windows vulnerabilities may require registry updates after patching to fully remediate. These updates can be configured manually or by using Puppet tasks.Note: If remediation for a vulnerability involves a package managed by Puppet Enterprise, PE may revert updates made by the vulnerability remediation tool. This can result in a loop situation if PE then reapplies its desired state to the package.
Verification
View vulnerabilities in a patch group
In the console, navigate to the Patch Groups page to see the total number of security updates that are available for each patch group.
Integrate vulnerability data from a security scanner
To integrate information about vulnerabilities detected by your third-party scanning software, a vulnerability data transformer must be installed, configured and registered on a designated transformer node.

A reference vulnerability data transformer is available for download from the Puppet Forge. This implementation is designed to integrate vulnerability data generated by the Tenable Nessus™ security scanner. To connect to other types of scanning tools, you can design your own transformer scripts to attach to the transformer node.
Install the transformer
Configure the transformer
The transformer must be configured with the services that allow it to contact your security scanner, ingest scan data, and transform that data into a format that PE can read and display. Configuration is specific to the transformer you are using, and may relate to functions such as the reading and processing of scan data, API querying, etc, For an example of transformer configuration, see the Parameters information in the Example implementation: Nessus transformer section.
Run the transformer task
run_<scannername>_transformer
.- In the PE console navigation bar, select Tasks and choose Run a task.
- In the Task section, enter the name of the transformer task.
- Select the transformer node and run the task.
Register and connect the transformer
When the transformer runs for the first time, it creates a registration request with PE. A registration request is also sent to reconnect a transformer that has been disconnected.
- Run the transformer task on the designated transformer node.
- The transformer sends a connection request.
- In the console, navigate to Vulnerabilities and click Accept for the registration request.
After the registration request has been accepted, data is ingested on the next transformer run.
Ingest vulnerability data
Update the vulnerability data
Disconnecting and reconnecting a transformer
To re-enable data imports, run the transformer task and accept the connection request in the Vulnerabilities screen. See Register and connect the transformer for more information.
Developing a custom transformer
This section provides reference information that is useful for developers who want to create and deploy a custom vulnerability data transformer to integrate data from a third-party scanning tool. Once the custom transformer is deployed, PE reports vulnerabilities detected on Puppet-managed nodes, allowing you to apply relevant patches for vulnerability remediation.
See below for an overview of the functions of a transformer, and information about the Puppet module that provides a reference implementation of the integration.
For an overview of vulnerability remediation capabilities in PE, see Vulnerability remediation.
For an overview of data integration requirements, see Integrate vulnerability data from a security scanner.
Essential functions of a transformer
- A trusted interface between the transformer and the third-party scanner, allowing the transformer to ingest data from the scanner. Possible implementations include passing scan report export files to the transformer or querying the scanner via an API endpoint.
- A system for mapping specific elements of the scanner data to their corresponding elements within PE.
- Accurate integration with the PE environment: for example, so that PE managed nodes identified by the scanner are correctly identified in PE.
- A trusted interface between the transformer and PE, enabling the transformer to parse scanner data, transform it into a standard format that the PE vulnerability remediation service can read, and push the data into PE.
Permissions
You require Create and Edit permissions for vulnerabilities, and Create permission for the transformer. See Advanced Patching: Permissions for default roles.
Example implementation: Nessus transformer
The nessus_transformer
is a Puppet Enterprise module
that can be installed and configured to integrate vulnerability data from Tenable Nessus™
scan reports. Alternatively, it can serve as a reference for PE customers who want to create
custom vulnerability data transformers to integrate data from other security scanners. The
module is available for download from the Puppet Forge and can be deployed in PE by
customers who have enabled the Advanced Patching feature. Information about the Nessus
security scanner is provided by Tenable at Tenable Nessus Documentation |
Tenable™ .
Methods of accessing scan export files
You can configure the transformer to access scan data using either of the following methods:
- Reading from a directory: The transformer accesses the latest scan export file downloaded to a specified directory.
- Querying the Nessus API: The transformer reads the latest scan export file provided directly by the Nessus API.
Modes of operation
The transformer can operate in two modes:
-
On-demand data ingestion: Manually initiate the transformer by running a task in PE.
-
Scheduled data ingestion: Automatically initiate data ingestion by configuring the transformer to run on a predefined schedule.
Depending on the chosen method of access, the transformer either queries the Nessus API or reads the latest export file from a directory.
Requirements
-
Python
-
SystemD Service and Timer for scheduling capabilities
Operating systems
For details of operating systems that the Nessus transformer is tested against, see the nessus_transformer module README.
Installation and registration
Refer to the module’s installation instructions on Puppet Forge for information on access and other requirements.
To use the transformer in Puppet Enterprise, classify a node in PE to act as the transformer. When the Puppet agent runs on this node, it installs the transformer.
When the transformer first runs on the node, either as a task or according to a schedule, it creates a registration request with PE. This must be accepted in the PE UI to allow data ingestion.
After the registration request has been accepted, data is ingested on the next transformer run.
Security
Endpoints are secured via RBAC and https.
The connection between the transformer node and the PE node must remain active for long enough to complete the ingestion of data. The time required depends on transformer speed and the volume of data being transferred.
To help prevent Denial of Service (DoS) attacks and similar threats, data is ingested from only one scan export file at a time, and the same scan results cannot be ingested multiple times.
Parameters
hiera-eyaml
. Create hiera-eyaml
keys if not already generated on your PE
Instance.Node encrypt may be used as an optional extra layer of security. If you want to use node
encrypt and the node_encrypt
module is not already
available, install puppetlabs-node_encrypt
to be used on
your CA or any compile server.
Parameters | Description |
---|---|
pe_token Sensitive Required |
The PE RBAC authentication token with permission to push data to the Vulnerability Remediation Service. The transformer uses the RBAC token to register itself using the registration API. A backoff mechanism is included. A PE Token can be generated via your puppet enterprise console. |
scan_reports_source_access_key Sensitive Required when configuring the transformer to query the Nessus API to download the latest scan data. |
Authentication access key for the scanner endpoint. If required, the key can be generated on your Tenable Nessus Instance. |
scan_reports_source_secret_key
Sensitive Required when configuring the transformer to query the Nessus API to download the latest scan data. |
Authentication secret key for the scanner endpoint. If required, the key can be generated on your Tenable Nessus instance. |
scan_reports_source_ca_certificate
Sensitive |
The Nessus CA certificate. May be optionally provided when configuring the transformer to query the Nessus API to download the latest scan data. |
scan_reports_source_address
|
The FQDN/IP address used by Nessus. |
scan_reports_source_filepath
Required when configuring the transformer to read scan data from a manually downloaded export file. |
The path to the scanner report export directory to which the Nessus scan data has been downloaded. |
manage_python |
Determines if the module manages the installation of Python. When set to No, the existing Python setup is used. |
run_in_venv |
Run the transformer within a Python virtual environment. |
sync_schedule
|
Schedule string in SystemD Timer format. Configures the transformer to run to a specific schedule. |
python_version |
The version of python to be installed. If not specified, the transformer uses latest version available on the machine through the default package managers. |
scan_reports_source_port |
Port Number used by Nessus. |
scan_reports_destination_endpoint
|
URL to the Vulnerability Remediation Service ingestion endpoint |
scan_name
|
The name of the specific scan for which data is to be processed by the transformer. A list of all named scans is provided in the Nessus UI. |
scan_reports_source_filepath
cannot be specified
at the same time as scan_reports_source_address
, scan_reports_source_access_key
and scan_reports_source_secret_key
, as they relate to different modes of
operation.