Docs
List Computers Not Patched: How MSPs Audit the Devices That Really Need Review
Learn how to list computers not patched in a way that separates true failed devices, reboot-blocked devices, stuck updates, and harmless compliance noise.
Troubleshooting for MSPs auditing which computers truly need patch follow-up instead of score review
Free Audit
Run The Free Audit
If you need to separate stale scans, reboot debt, failure signals, and real patch risk across endpoints, run the free RMM Patch Health Audit.
Short Answer
Direct answer: a useful list of computers not patched separates true failed devices from reboot blockers, stale-reporting cases, and harmless timing noise.
If you export every non-compliant device into one flat list, the audit becomes noisy and the technician queue becomes less accurate.
If you need to list computers not patched, do not dump every non-compliant endpoint into one spreadsheet and call it done. That creates a noisy audit list that mixes real failures, pending reboot devices, missed maintenance windows, stale scan results, and harmless compliance movement.
A useful audit list separates the machines that truly need action from the ones that only need context. That is how small MSPs avoid wasting half a day chasing the wrong computers.
This page links back to patch report not accurate because audit lists are where the reporting-vs-reality problem usually gets exposed most painfully.
Caution: do not hand a raw not-patched export to clients or technicians as if it were already validated. The value comes from classification, not from the raw count.
Use this guide when you need an audit-ready list of not-patched computers that separates true failures from reboot blockers and reporting noise.
Use Microsoft's troubleshooting guidance when you need to separate truly broken endpoints from devices that are only delayed or mismatched in reporting. Microsoft Learn: Windows Update issues troubleshooting
What You'll Get
- Turn a raw not-patched list into an action-ready audit queue
- Separate failed devices, reboot-blocked devices, delayed devices, and noise candidates
- Give clients and technicians a clearer picture of what actually needs follow-up
What Actually Counts as a Failed Patch
An audit list should classify devices by operational state, not just by score:
- Failed install: the device attempted patching and logged failure.
- Stuck update: the device never reaches a stable installed state.
- Repeated retry: the same device keeps failing the same kind of update.
- Blocked by reboot: patching started, but the device still needs restart to complete cleanly.
That classification turns an audit list into something actionable. Otherwise, the list is just a rough snapshot of disagreement between the RMM and the endpoint.
Why Your RMM Does Not Show This Clearly
RMM tools are good at showing that a device might need attention. They are often much worse at explaining exactly why. Their abstraction layers compress Windows Update into one set of labels, and those labels blur the line between missing updates, real failures, reboot blockers, and timing-related score noise.
That is why an RMM export of not-patched devices is rarely ready for client review or technician triage without additional filtering.
If you have already seen device shows missing updates but installed or patch compliance low but updates installed, you have already seen how raw lists become misleading.
How to Actually Find the Right Computers
When building the list, sort devices into four queues:
- True failed patch devices: install failures, repeated failures, or service-path failures.
- Reboot-blocked devices: patching ran, but pending reboot prevents clean completion.
- Delayed or missed devices: offline during patch window or patch schedule mismatch.
- Noise candidates: devices that look unpatched in the dashboard but lack strong failure evidence.
That is the audit mindset MSPs actually need. A raw not-patched list is just the starting material.
How to Detect Failures With Real Signals
Event logs: use install-failure evidence like Event ID 20 to flag high-priority devices.
Pending reboot checks: identify machines that are not finished, even if install activity happened.
Windows Update service health: find devices with broken scan/download paths.
Repeated failure history: identify machines that consume time every cycle.
Update history versus reported status: use it to separate actual broken patching from stale or misleading reporting.
What to Check Instead of Compliance Score
- Which devices have direct install-failure evidence?
- Which devices are only pending reboot?
- Which devices missed the maintenance window?
- Which devices have unhealthy Windows Update services?
- Which devices keep failing the same update across cycles?
This is how an audit list becomes an action list.
When Patching Is Actually Broken
Patching is actually broken when the same computer repeatedly fails installs, cannot complete scans or downloads, or never exits reboot-required state. It is not automatically broken just because a report says a device is missing updates.
That distinction protects both technician time and client trust. The audit list should identify truly broken devices, not just every device whose status looks imperfect.
Why This Page Matters
Lots of MSPs can export a list of not-patched computers. Far fewer can turn that export into a trustworthy audit of what is truly wrong. That is the difference between a dashboard artifact and an operations-ready report.
PatchReporter fits here by giving teams a clearer reporting layer for failed patch visibility, reboot blockers, and device-level patch evidence outside the RMM's simplest compliance views.