Submit a ticketCall us

whitepaperYour VM Perplexities Called, and They Need You to Read This.

Virtualization can give you enormous flexibility with future workloads and can be a key enabler for other areas, like cloud computing and disaster recovery. So, how can you get a handle on the performance challenges in your virtual environment and manage deployments without erasing the potential upside? Learn the four key areas you need to be focusing on to help deliver a healthy and well-performing data center.

Get your free white paper.

Home > Success Center > Patch Manager > Patch Manager - Knowledgebase Articles > Create a WannaCrypt report in Patch Manager

Create a WannaCrypt report in Patch Manager

Table of contents

Updated September 6, 2018


This article describes how to create a filtered Patch Manager report that checks Microsoft patches regarding the WannaCrypt ransomware.


All Patch Manager versions


Perform a WSUS inventory on a regular basis to ensue that the report is accurate. Also, check your Task History in the Patch Manager Administrator Console for the most recent inventory task. If the inventory task ran last week, run a new inventory task now. 

See Generate a WSUS Inventory report for instructions on how to create, schedule, and run a WSUS inventory report.

After you run a a new inventory task, crate the report in the Patch Manager Administrator Console.

  1. Open the Patch Manager Administrator Console.
  2. Go to Administration and Reporting > Reporting > WSUS Reports > Windows Server Update Services Analytics.
  3. Right-click on Computer Update Status, and then click Edit Report.
  4. On the bottom half of the Report, select the following filters:
    • Computer Update Status
    • Update Title
  1. Select Operators, and then enter the KB number in the Contains field.
  2. Save the report using the KB number as the filename.
  3. Repeat the steps for all applicable KB numbers.

See Microsoft Security Bulletin MS17-010 - Critical to obtain the KB numbers.

(© 2017 Microsoft, available at, obtained on May 29, 2017.)


Disclaimer: Please note, any content posted herein is provided as a suggestion or recommendation to you for your internal use. This is not part of the SolarWinds software or documentation that you purchased from SolarWinds, and the information set forth herein may come from third parties. Your organization should internally review and assess to what extent, if any, such custom scripts or recommendations will be incorporated into your environment.  You elect to use third party content at your own risk, and you will be solely responsible for the incorporation of the same, if any.


Last modified