You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/automation-update-management.md
-50Lines changed: 0 additions & 50 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -186,56 +186,6 @@ We recommend that you use the addresses listed when defining exceptions. For IP
186
186
187
187
Follow the instructions in [Connect computers without internet access](../azure-monitor/platform/gateway.md) to configure machines that don't have internet access.
188
188
189
-
## View update assessments
190
-
191
-
In your Automation account, select **Update Management** to view the status of your machines.
192
-
193
-
This view provides information about your machines, missing updates, update deployments, and scheduled update deployments. In the **COMPLIANCE** column, you can see the last time the machine was assessed. In the **UPDATE AGENT READINESS** column, you can check the health of the update agent. If there's an issue, select the link to go to troubleshooting documentation that can help you correct the problem.
194
-
195
-
To run a log search that returns information about the machine, update, or deployment, select the corresponding item in the list. The **Log Search** pane opens with a query for the item selected:
Select **Missing updates** to view the list of updates that are missing from your machines. Each update is listed and can be selected. Information about the number of machines that require the update, the operating system, and a link for more information is shown. The **Log search** pane shows more details about the updates.
The following tables list the supported update classifications in Update Management, with a definition for each classification.
208
-
209
-
### Windows
210
-
211
-
|Classification |Description |
212
-
|---------|---------|
213
-
|Critical updates | An update for a specific problem that addresses a critical, non-security-related bug. |
214
-
|Security updates | An update for a product-specific, security-related issue. |
215
-
|Update rollups | A cumulative set of hotfixes that are packaged together for easy deployment. |
216
-
|Feature packs | New product features that are distributed outside a product release. |
217
-
|Service packs | A cumulative set of hotfixes that are applied to an application. |
218
-
|Definition updates | An update to virus or other definition files. |
219
-
|Tools | A utility or feature that helps complete one or more tasks. |
220
-
|Updates | An update to an application or file that currently is installed. |
221
-
222
-
### <aname="linux-2"></a>Linux
223
-
224
-
|Classification |Description |
225
-
|---------|---------|
226
-
|Critical and security updates | Updates for a specific problem or a product-specific, security-related issue. |
227
-
|Other updates | All other updates that aren't critical in nature or that aren't security updates. |
228
-
229
-
For Linux, Update Management can distinguish between critical updates and security updates in the cloud while displaying assessment data due to data enrichment in the cloud. For patching, Update Management relies on classification data available on the machine. Unlike other distributions, CentOS does not have this information available in the RTM version. If you have CentOS machines configured to return security data for the following command, Update Management can patch based on classifications.
230
-
231
-
```bash
232
-
sudo yum -q --security check-update
233
-
```
234
-
235
-
There's currently no supported method to enable native classification-data availability on CentOS. At this time, only best-effort support is provided to customers who might have enabled this on their own.
236
-
237
-
To classify updates on Red Hat Enterprise version 6, you need to install the yum-security plugin. On Red Hat Enterprise Linux 7, the plugin is already a part of yum itself, there is no need to install anything. For further information, see the following Red Hat [knowledge article](https://access.redhat.com/solutions/10021).
238
-
239
189
## Integrate with System Center Configuration Manager
240
190
241
191
Customers who have invested in System Center Configuration Manager for managing PCs, servers, and mobile devices also rely on the strength and maturity of Configuration Manager to help them manage software updates. Configuration Manager is part of their software update management (SUM) cycle.
There's currently no supported method to enable native classification-data availability on CentOS. At this time, only best-effort support is provided to customers who have enabled this functionality on their own.
56
56
57
+
To classify updates on Red Hat Enterprise version 6, you need to install the yum-security plugin. On Red Hat Enterprise Linux 7, the plugin is already a part of yum itself, there is no need to install anything. For further information, see the following Red Hat [knowledge article](https://access.redhat.com/solutions/10021).
58
+
57
59
## Next steps
58
60
59
61
After you view any update assessments, you can schedule an update deployment by following the steps at [Manage updates and patches for your Azure VMs](automation-tutorial-update-management.md).
0 commit comments