General
- Which Windows products has 0patch "security-adopted"?
- Why use 0patch?
- How many 0patch micropatches are relevant to my computers?
- Can I try 0patch before buying it?
- Which operating systems are currently supported by 0patch?
- Are you planning on supporting Linux / MacOS / mobile platforms / IoT?
- Can you micropatch all types of vulnerabilities?
- Does 0patch modify executable files?
- What are "Patchable modules" that I see listed in 0patch Console?
- How do I install (apply) micropatches when they're downloaded?
- What happens to the system after a micropatch is installed?
- Do I have to restart my computer or applications after I receive a new micropatch?
- Do I have to restart my computer after I install or uninstall 0patch Agent?
- Does 0patch Console have to be running in order for patching to work?
- Can we use 0patch instead of our current patch management system?
- Can 0patch be used as a substitute for Windows Updates?
- What happens when Windows Updates are applied, or when a micropatched application is updated?
- What if the vendor implements their fix in some other binary than 0patch? Won't your micropatch keep getting applied in this case?
- Are vulnerability scanners aware of 0patch, or do they keep reporting vulnerabilities that are micropatched?
- Why is the same patch being repeatedly applied to the same application? I thought a vulnerable module would only be patched once.
- Can't attackers create malicious micropatches and deploy them to my computers?
- Are there different installers for 0patch FREE and 0patch PRO/Enterprise, or for different Windows versions?
- Does 0patch add value on still-supported Windows versions such as Windows 10 v22H2, Windows 11 or Server 2022?
- Does 0patch add value on older Windows versions such as Windows XP or Server 2003?