Skip to content

Commit 1c07c67

Browse files
committed
removed duplicate section from um-mgmt article
1 parent ee1411d commit 1c07c67

File tree

2 files changed

+4
-52
lines changed

2 files changed

+4
-52
lines changed

articles/automation/automation-update-management.md

Lines changed: 0 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -186,56 +186,6 @@ We recommend that you use the addresses listed when defining exceptions. For IP
186186

187187
Follow the instructions in [Connect computers without internet access](../azure-monitor/platform/gateway.md) to configure machines that don't have internet access.
188188

189-
## View update assessments
190-
191-
In your Automation account, select **Update Management** to view the status of your machines.
192-
193-
This view provides information about your machines, missing updates, update deployments, and scheduled update deployments. In the **COMPLIANCE** column, you can see the last time the machine was assessed. In the **UPDATE AGENT READINESS** column, you can check the health of the update agent. If there's an issue, select the link to go to troubleshooting documentation that can help you correct the problem.
194-
195-
To run a log search that returns information about the machine, update, or deployment, select the corresponding item in the list. The **Log Search** pane opens with a query for the item selected:
196-
197-
![Update Management default view](media/automation-update-management/update-management-view.png)
198-
199-
## View missing updates
200-
201-
Select **Missing updates** to view the list of updates that are missing from your machines. Each update is listed and can be selected. Information about the number of machines that require the update, the operating system, and a link for more information is shown. The **Log search** pane shows more details about the updates.
202-
203-
![Missing Updates](./media/automation-view-update-assessments/automation-view-update-assessments-missing-updates.png)
204-
205-
## Update classifications
206-
207-
The following tables list the supported update classifications in Update Management, with a definition for each classification.
208-
209-
### Windows
210-
211-
|Classification |Description |
212-
|---------|---------|
213-
|Critical updates | An update for a specific problem that addresses a critical, non-security-related bug. |
214-
|Security updates | An update for a product-specific, security-related issue. |
215-
|Update rollups | A cumulative set of hotfixes that are packaged together for easy deployment. |
216-
|Feature packs | New product features that are distributed outside a product release. |
217-
|Service packs | A cumulative set of hotfixes that are applied to an application. |
218-
|Definition updates | An update to virus or other definition files. |
219-
|Tools | A utility or feature that helps complete one or more tasks. |
220-
|Updates | An update to an application or file that currently is installed. |
221-
222-
### <a name="linux-2"></a>Linux
223-
224-
|Classification |Description |
225-
|---------|---------|
226-
|Critical and security updates | Updates for a specific problem or a product-specific, security-related issue. |
227-
|Other updates | All other updates that aren't critical in nature or that aren't security updates. |
228-
229-
For Linux, Update Management can distinguish between critical updates and security updates in the cloud while displaying assessment data due to data enrichment in the cloud. For patching, Update Management relies on classification data available on the machine. Unlike other distributions, CentOS does not have this information available in the RTM version. If you have CentOS machines configured to return security data for the following command, Update Management can patch based on classifications.
230-
231-
```bash
232-
sudo yum -q --security check-update
233-
```
234-
235-
There's currently no supported method to enable native classification-data availability on CentOS. At this time, only best-effort support is provided to customers who might have enabled this on their own.
236-
237-
To classify updates on Red Hat Enterprise version 6, you need to install the yum-security plugin. On Red Hat Enterprise Linux 7, the plugin is already a part of yum itself, there is no need to install anything. For further information, see the following Red Hat [knowledge article](https://access.redhat.com/solutions/10021).
238-
239189
## Integrate with System Center Configuration Manager
240190

241191
Customers who have invested in System Center Configuration Manager for managing PCs, servers, and mobile devices also rely on the strength and maturity of Configuration Manager to help them manage software updates. Configuration Manager is part of their software update management (SUM) cycle.

articles/automation/automation-view-update-assessments.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: View Azure Update Management update assessments
33
description: This article describes how to view update assessments for update deployments.
44
services: automation
55
ms.subservice: update-management
6-
ms.date: 05/17/2019
6+
ms.date: 01/21/2020
77
ms.topic: conceptual
88
---
99
# View Azure Update Management update assessments
@@ -24,7 +24,7 @@ Select **Missing updates** to view the list of updates that are missing from you
2424

2525
## Update classifications
2626

27-
The following tables list the update classifications in Update Management, with a definition for each classification.
27+
The following tables list the supported update classifications in Update Management, with a definition for each classification.
2828

2929
### Windows
3030

@@ -54,6 +54,8 @@ sudo yum -q --security check-update
5454

5555
There's currently no supported method to enable native classification-data availability on CentOS. At this time, only best-effort support is provided to customers who have enabled this functionality on their own.
5656

57+
To classify updates on Red Hat Enterprise version 6, you need to install the yum-security plugin. On Red Hat Enterprise Linux 7, the plugin is already a part of yum itself, there is no need to install anything. For further information, see the following Red Hat [knowledge article](https://access.redhat.com/solutions/10021).
58+
5759
## Next steps
5860

5961
After you view any update assessments, you can schedule an update deployment by following the steps at [Manage updates and patches for your Azure VMs](automation-tutorial-update-management.md).

0 commit comments

Comments
 (0)