When reviewing some of our Windows servers, it can be extremely tedious to tell whether a security update is relevant to our system. A patch to IIS is irrelevant if we use Apache; an exploit affecting HTTP connections is not relevant if all our sites require HTTPS.
Identifying patches that are relevant or not to avoid unnecessary change to the system is very tedious. You need to click a link in every single update for More Info (which is even more fun when the server browser disallows all scripting on the destination page and Microsoft's own site breaks) because the patch summary is useless.
Is there a way to summarize the recommended update lists for a server (or client) that improves upon the poor summary Microsoft provides, so that a loading a separate browser page for every update is not necessary just to see what the update is for?
The use-case for this is quick, ad-hoc updates on individual servers, rather than organizational patch management.
I agree with the comments so far. It is challenging to get the right info. The monthly "executive" summary is actually okay. It gives you a product name (.NET, Office, IE, SQL) and a exploit classification type - usually Remote Code, Elevation of Privilege, Security Bypass. https://technet.microsoft.com/en-us/library/security/ms14-aug.aspx
You may also want to look at MBSA (microsoft security baseline analyzer at download.microsoft.com). It can scan an individual or range of machines, what is missing/installed, produces a report with links to hotfixes that are already installed, but does not have links for hotfixes that are missing. Go figure.