Skip to content

Commit 48a7096

Browse files
authored
Merge pull request #250768 from ApnaLakshay/UMC-to-Azure-Update-Manager-Name-Change
Name change in all the files done
2 parents bd0b740 + b27a078 commit 48a7096

16 files changed

+22
-22
lines changed

articles/automation/disable-local-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The following table describes the behaviors or features that are prevented from
3939
|Starting a runbook using a webhook. | Start a runbook job using Azure Resource Manager template, which uses Azure AD authentication. |
4040
|Using Automation Desired State Configuration.| Use [Azure Policy Guest configuration](../governance/machine-configuration/overview.md).  |
4141
|Using agent-based Hybrid Runbook Workers.| Use [extension-based Hybrid Runbook Workers (Preview)](./extension-based-hybrid-runbook-worker-install.md).|
42-
|Using Automation Update management |Use [Update management center (preview)](../update-center/overview.md)
42+
|Using Automation Update management |Use [Update Manager (preview)](../update-center/overview.md)
4343

4444

4545
## Next steps

articles/automation/update-management/view-update-assessments.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In Update Management, you can view information about your machine, missing updat
2525
To view update assessment from an Azure Arc-enabled server:
2626

2727
1. Sign in to the [Azure portal](https://portal.azure.com).
28-
1. Navigate to **Servers - Azure Arc** and select your server from the list. From the left menu, under **Operation**, select **Guest + host updates** and select **Go to Updates using Update management center**.
28+
1. Navigate to **Servers - Azure Arc** and select your server from the list. From the left menu, under **Operation**, select **Guest + host updates** and select **Go to Updates using Update Manager**.
2929

3030
In Update Management, you can view information about your Azure Arc-enabled machine, total updates, assess updates, scheduled update deployments, and so on.
3131

articles/azure-arc/servers/agent-release-notes-archive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Download for [Windows](https://download.microsoft.com/download/8/4/5/845d5e04-bb
5252

5353
### Fixed
5454

55-
- The extension service now correctly restarts when the Azure Connected Machine agent is upgraded by Update Management Center
55+
- The extension service now correctly restarts when the Azure Connected Machine agent is upgraded by Update Manager
5656
- Resolved issues with the hybrid connectivity component that could result in the "himds" service crashing, the server showing as "disconnected" in Azure, and connectivity issues with Windows Admin Center and SSH
5757
- Improved handling of resource move scenarios that could impact Windows Admin Center and SSH connectivity
5858
- Improved reliability when changing the [agent configuration mode](security-overview.md#local-agent-security-controls) from "monitor" mode to "full" mode.
@@ -95,7 +95,7 @@ Download for [Windows](https://download.microsoft.com/download/f/9/d/f9d60cc9-7c
9595
- Logs from extensions are now collected
9696
- Agent telemetry is no longer sent to `dc.services.visualstudio.com`. You may be able to remove this URL from any firewall or proxy server rules if no other applications in your environment require it.
9797
- Failed extension installs can now be retried without removing the old extension as long as the extension settings are different
98-
- Increased the [resource limits](agent-overview.md#agent-resource-governance) for the Azure Update Management Center extension on Linux to reduce downtime during update operations
98+
- Increased the [resource limits](agent-overview.md#agent-resource-governance) for the Azure Update Manager extension on Linux to reduce downtime during update operations
9999

100100
### Fixed
101101

articles/azure-arc/servers/agent-release-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ To check if you're running the latest version of the Azure connected machine age
7878
- The scheduled task that checks for agent updates no longer outputs a file
7979
- Improved formatting for clock skew calculations
8080
- Improved reliability when upgrading extensions by explicitly asking extensions to stop before trying to upgrade.
81-
- Increased the [resource limits](agent-overview.md#agent-resource-governance) for the Update Management Center extension for Linux, Microsoft Defender Endpoint for Linux, and Azure Security Agent for Linux to prevent timeouts during installation
81+
- Increased the [resource limits](agent-overview.md#agent-resource-governance) for the Update Manager extension for Linux, Microsoft Defender Endpoint for Linux, and Azure Security Agent for Linux to prevent timeouts during installation
8282
- [azcmagent disconnect](azcmagent-disconnect.md) now closes any active SSH or Windows Admin Center connections
8383
- Improved output of the [azcmagent check](azcmagent-check.md) command
8484
- Better handling of spaces in the `--location` parameter of [azcmagent connect](azcmagent-connect.md)

articles/azure-arc/servers/manage-automatic-vm-extension-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Automatic extension upgrade supports the following extensions:
5959
- Dependency agent – Linux and Windows
6060
- Azure Security agent - Linux and Windows
6161
- Key Vault Extension - Linux only
62-
- Azure Update Management Center - Linux and Windows
62+
- Azure Update Manager - Linux and Windows
6363
- Azure Automation Hybrid Runbook Worker - Linux and Windows
6464
- Azure Arc-enabled SQL Server agent - Linux and Windows
6565

articles/azure-arc/servers/prepare-extended-security-updates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ Delivering ESUs to your Windows Server 2012/2012 R2 machines provides the follow
2626
Other Azure services through Azure Arc-enabled servers are available, with offerings such as:
2727

2828
* [Microsoft Defender for Cloud](../../defender-for-cloud/defender-for-cloud-introduction.md) - As part of the cloud security posture management (CSPM) pillar, it provides server protections through [Microsoft Defender for Servers](../../defender-for-cloud/plan-defender-for-servers.md) to help protect you from various cyber threats and vulnerabilities.
29-
* [Update management center (preview)](../../update-center/overview.md) - Unified management and governance of update compliance that includes not only Azure and hybrid machines, but also ESU update compliance for all your Windows Server 2012/2012 R2 machines.
29+
* [Update Manager (preview)](../../update-center/overview.md) - Unified management and governance of update compliance that includes not only Azure and hybrid machines, but also ESU update compliance for all your Windows Server 2012/2012 R2 machines.
3030
* [Azure Policy](../../governance/policy/overview.md) helps to enforce organizational standards and to assess compliance at-scale. Beyond providing an aggregated view to evaluate the overall state of the environment, Azure Policy helps to bring your resources to compliance through bulk and automatic remediation.
3131

3232
>[!NOTE]
33-
>Activation of ESU is planned for the third quarter of 2023. Using Azure services such as Update management center (preview) and Azure Policy to support managing ESU-eligible Windows Server 2012/2012 R2 machines are also planned for the third quarter.
33+
>Activation of ESU is planned for the third quarter of 2023. Using Azure services such as Update Manager (preview) and Azure Policy to support managing ESU-eligible Windows Server 2012/2012 R2 machines are also planned for the third quarter.
3434
3535
## Prepare delivery of ESUs
3636

articles/azure-arc/vmware-vsphere/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Arc-enabled VMware vSphere (preview) allows you to:
2424

2525
## Onboard resources to Azure management at scale
2626

27-
Azure services such as Microsoft Defender for Cloud, Azure Monitor, Azure Update Management Center, and Azure Policy provide a rich set of capabilities to secure, monitor, patch, and govern off-Azure resources via Arc.
27+
Azure services such as Microsoft Defender for Cloud, Azure Monitor, Azure Update Manager, and Azure Policy provide a rich set of capabilities to secure, monitor, patch, and govern off-Azure resources via Arc.
2828

2929
By using Arc-enabled VMware vSphere's capabilities to discover your VMware estate and install the Arc agent at scale, you can simplify onboarding your entire VMware vSphere estate to these services.
3030

articles/azure-monitor/agents/agents-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ The tables below provide a comparison of Azure Monitor Agent with the legacy the
131131
| | Microsoft Defender for Cloud | X (Public preview) | X | |
132132
| | Automation Update Management | | X | |
133133
| | Azure Stack HCI | X | | |
134-
| | Update Management Center | N/A (Public preview, independent of monitoring agents) | | |
134+
| | Update Manager | N/A (Public preview, independent of monitoring agents) | | |
135135
| | Change Tracking | X (Public preview) | X | |
136136
| | SQL Best Practices Assessment | X | | |
137137

@@ -157,7 +157,7 @@ The tables below provide a comparison of Azure Monitor Agent with the legacy the
157157
| | VM Insights | X (Public preview) | X | |
158158
| | Microsoft Defender for Cloud | X (Public preview) | X | |
159159
| | Automation Update Management | | X | |
160-
| | Update Management Center | N/A (Public preview, independent of monitoring agents) | | |
160+
| | Update Manager | N/A (Public preview, independent of monitoring agents) | | |
161161
| | Change Tracking | X (Public preview) | X | |
162162

163163
<sup>1</sup> To review other limitations of using Azure Monitor Metrics, see [quotas and limits](../essentials/metrics-custom-overview.md#quotas-and-limits). On Linux, using Azure Monitor Metrics as the only destination is supported in v.1.10.9.0 or higher.

articles/azure-monitor/agents/azure-monitor-agent-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ When you migrate the following services, which currently use Log Analytics agent
112112
113113
| Service | Migration recommendation | Other extensions installed | More information |
114114
| :--- | :--- | :--- | :--- |
115-
| [Update Management](../../automation/update-management/overview.md) | Update Management Center - Public preview (no dependency on Log Analytics agents or Azure Monitor Agent) | None | [Update management center (Public preview with Azure Monitor Agent) documentation](../../update-center/index.yml) |
115+
| [Update Management](../../automation/update-management/overview.md) | Update Manager - Public preview (no dependency on Log Analytics agents or Azure Monitor Agent) | None | [Update Manager (Public preview with Azure Monitor Agent) documentation](../../update-center/index.yml) |
116116
| [Automation Hybrid Runbook Worker overview](../../automation/automation-hybrid-runbook-worker.md) | Automation Hybrid Worker Extension - Generally available (no dependency on Log Analytics agents or Azure Monitor Agent) | None | [Migrate an existing Agent based to Extension based Hybrid Workers](../../automation/extension-based-hybrid-runbook-worker-install.md#migrate-an-existing-agent-based-to-extension-based-hybrid-workers) |
117117
118118
## Next steps

articles/defender-for-cloud/release-notes-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ Learn more about [enabling Microsoft Defender for Endpoint](integration-defender
202202

203203
You no longer need an agent on your Azure VMs and Azure Arc machines to make sure the machines have all of the latest security or critical system updates.
204204

205-
The new system updates recommendation, `System updates should be installed on your machines (powered by Azure Update Manager)` in the `Apply system updates` control, is based on the [Update management center (preview)](../update-center/overview.md). The recommendation relies on a native agent embedded in every Azure VM and Azure Arc machines instead of an installed agent. The Quick Fix in the new recommendation leads you to a one-time installation of the missing updates in the Update management center portal.
205+
The new system updates recommendation, `System updates should be installed on your machines (powered by Azure Update Manager)` in the `Apply system updates` control, is based on the [Update Manager (preview)](../update-center/overview.md). The recommendation relies on a native agent embedded in every Azure VM and Azure Arc machines instead of an installed agent. The Quick Fix in the new recommendation leads you to a one-time installation of the missing updates in the Update Manager portal.
206206

207207
To use the new recommendation, you need to:
208208

0 commit comments

Comments
 (0)