You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/update-manager/cross-subscription-patching.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,15 +25,15 @@ However, its capabilities go well beyond this. With proper configuration, you ca
25
25
26
26
# [Supported resource type](#tab/sup-resource)
27
27
28
-
-**Azure Resource Manager (Arc)-connected hosts**: Non-Azure hosts connected to Azure through Arc, subject to [Arc prerequisites](/azure/azure-arc/servers/prerequisites) and Azure Update Manager [supported regions](support-matrix.md#azure-arc-enabled-servers)
28
+
-**Azure Resource Manager (Arc)-connected hosts**: Non-Azure hosts connected to Azure through Arc, subject to [Arc prerequisites](/azure/azure-arc/servers/prerequisites) and Azure Update Manager [supported regions](supported-regions.md#azure-public-cloud)
29
29
30
30
-**Azure VM** - Native virtual machines created in Azure.
31
31
32
32
# [Supported OS type](#tab/sup-os)
33
33
34
-
-**Windows**: Cross-subscription patching supports various versions of Windows Server and Windows operating systems. Ensure that your Windows devices are up-to-date and compatible with the patching process. For more information, see [support matrix for Arc-connected hosts](support-matrix-updates.md#azure-arc-enabled-servers)and [Azure VM for supported images](support-matrix-updates.md#supported-windows-os-images).
34
+
-**Windows**: Cross-subscription patching supports various versions of Windows Server and Windows operating systems. Ensure that your Windows devices are up-to-date and compatible with the patching process. For more information, see [support matrix for Arc-connected hosts](support-matrix-updates.md#azure-arc-enabled-servers)and [Azure VM for supported images](support-matrix-updates.md#azure-marketplacepir-images)
35
35
36
-
-**Linux**: Cross-subscription patching also supports multiple Linux distributions, including most mainstream distributions like Ubuntu, CentOS, and Red Hat Enterprise Linux (RHEL) etc. Ensure that your Linux devices meet the necessary requirements for patching. For more information, see[support matrix for Arc-connected hosts](support-matrix-updates.md#azure-arc-enabled-servers) and [Azure VM for supported images](support-matrix-updates.md#supported-linux-os-images).
36
+
-**Linux**: Cross-subscription patching also supports multiple Linux distributions, including most mainstream distributions like Ubuntu, CentOS, and Red Hat Enterprise Linux (RHEL) etc. Ensure that your Linux devices meet the necessary requirements for patching. For more information, see[support matrix for Arc-connected hosts](support-matrix-updates.md#azure-arc-enabled-servers) and [Azure VM for supported images](support-matrix-updates.md#azure-marketplacepir-images).
Copy file name to clipboardExpand all lines: articles/update-manager/deploy-updates.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Deploy updates and track results in Azure Update Manager
3
3
description: This article details how to use Azure Update Manager in the Azure portal to deploy updates and view results for supported machines.
4
4
ms.service: azure-update-manager
5
-
ms.date: 02/26/2024
5
+
ms.date: 03/07/2025
6
6
ms.topic: how-to
7
7
author: SnehaSudhirG
8
8
ms.author: sudhirsneha
@@ -22,7 +22,7 @@ See the following sections for more information:
22
22
23
23
## Supported regions
24
24
25
-
Update Manager is available in all [Azure public regions](support-matrix.md#supported-regions).
25
+
Update Manager is available in all [Azure public regions](supported-regions.md#azure-public-cloud).
26
26
27
27
## Configure reboot settings
28
28
@@ -59,7 +59,7 @@ To install one-time updates on a single VM:
59
59
60
60
:::image type="content" source="./media/deploy-updates/include-update-classification-inline.png" alt-text="Screenshot that shows update classification." lightbox="./media/deploy-updates/include-update-classification-expanded.png":::
61
61
62
-
- Select **Include KB ID/package** to include in the updates. You can add multiple KB IDs and package names. When you add KB ID/package name, the next row appears. The package can have both name and version. . For example, use `3103696` or `3134815`. For Windows, you can refer to the [MSRC webpage](https://msrc.microsoft.com/update-guide/deployments) to get the details of the latest Knowledge Base release. For supported Linux distros, you specify a comma separated list of packages by the package name, and you can include wildcards. For example, use `kernel*`, `glibc`, or `libc=1.0.1`. Based on the options specified, Update Manager shows a preview of OS updates under the **Selected Updates** section.
62
+
- Select **Include KB ID/package** to include in the updates. You can add multiple KB IDs and package names. When you add KB ID/package name, the next row appears. The package can have both name and version. For example, use `3103696` or `3134815`. For Windows, you can refer to the [MSRC webpage](https://msrc.microsoft.com/update-guide/deployments) to get the details of the latest Knowledge Base release. For supported Linux distros, you specify a comma separated list of packages by the package name, and you can include wildcards. For example, use `kernel*`, `glibc`, or `libc=1.0.1`. Based on the options specified, Update Manager shows a preview of OS updates under the **Selected Updates** section.
63
63
- To exclude updates that you don't want to install, select **Exclude KB ID/package**. We recommend selecting this option because updates that aren't displayed here might be installed, as newer updates might be available. You can exclude multiple KB IDs and package names.
64
64
- To ensure that the updates published are on or before a specific date, select **Include by maximum patch publish date**. Select the date and select **Add** > **Next**.
title: Extended Security Updates (ESU) for Windows Server with Azure Update Manager
3
+
description: Information on enrolling and managing Extended Security Updates (ESU) for Windows Server 2012 and 2012 R2 using Azure Update Manager.
4
+
ms.service: azure-update-manager
5
+
author: SnehaSudhirG
6
+
ms.author: sudhirsneha
7
+
ms.date: 02/26/2025
8
+
ms.topic: overview
9
+
---
10
+
11
+
# Extended Security Updates (ESU) for Windows Server
12
+
13
+
This article provides information on ESU on Azure VMs and Azure Arc machines.
14
+
15
+
ESUs are available by default to Azure Virtual machines Azure ESU. Using Azure Update Manager, you can deploy Extended Security Updates for your Azure Arc-enabled Windows Server 2012 / R2 machines.
16
+
17
+
## Enroll Windows Server 2012 ESU on Arc machines
18
+
19
+
To enroll in Windows Server 2012 Extended Security Updates on Arc connected machines, follow the guidance on [How to get Extended Security Updates (ESU) for Windows Server 2012 and 2012 R2 via Azure Arc](/windows-server/get-started/extended-security-updates-deploy#extended-security-updates-enabled-by-azure-arc).
20
+
21
+
22
+
## Next steps
23
+
24
+
- Learn about the [supported regions for Azure VMs and Arc-enabled servers](supported-regions.md).
25
+
- Learn on the [Update sources, types](support-matrix.md) managed by Azure Update Manger.
26
+
- Know more on [supported OS and system requirements for machines managed by Azure Update Manager](support-matrix-updates.md).
27
+
- Learn on [Automatic VM guest patching](support-matrix-automatic-guest-patching.md).
28
+
- Learn more on [unsupported OS and Custom VM images](unsupported-workloads.md).
29
+
- Learn more on how to [configure Windows Update settings](configure-wu-agent.md) to work with Azure Update Manager.
30
+
- Learn about [security vulnerabilities and Ubuntu Pro support](security-awareness-ubuntu-support.md).
Copy file name to clipboardExpand all lines: articles/update-manager/manage-arc-enabled-servers-programmatically.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ The following table describes the elements of the request body:
74
74
|`windowsParameters - kbNumbersToExclude`| List of Windows Update KB Ids that are available to the machine and that should **not** be installed. If you've included any 'classificationsToInclude', the KBs available in the category will be installed. 'kbNumbersToExclude' is an option to provide list of specific KB IDs that you want to ensure don't get installed. For example: `5678`|
75
75
|`maxPatchPublishDate`| This is used to install patches that were published on or before this given max published date.|
76
76
|`linuxParameters`| Parameter options for Guest OS update when machine is running supported Linux distribution |
77
-
|`linuxParameters - classificationsToInclude`| List of categories or classifications of OS updates to apply, as supported & provided by Linux OS's package manager used. Acceptable values are: `Critical, Security, Others`. For more information, see [Linux package manager and OS support](./support-matrix.md#supported-operating-systems). |
77
+
|`linuxParameters - classificationsToInclude`| List of categories or classifications of OS updates to apply, as supported & provided by Linux OS's package manager used. Acceptable values are: `Critical, Security, Others`. For more information, see [Linux package manager and OS support](support-matrix-updates.md#azure-marketplacepir-images). |
78
78
|`linuxParameters - packageNameMasksToInclude`| List of Linux packages that are available to the machine and need to be installed. If you've included any 'classificationsToInclude', the packages available in the category will be installed. 'packageNameMasksToInclude' is an option to provide list of packages over and above that you want to get installed. For example: `mysql, libc=1.0.1.1, kernel*`|
79
79
|`linuxParameters - packageNameMasksToExclude`| List of Linux packages that are available to the machine and should **not** be installed. If you've included any 'classificationsToInclude', the packages available in the category will be installed. 'packageNameMasksToExclude' is an option to provide list of specific packages that you want to ensure don't get installed. For example: `mysql, libc=1.0.1.1, kernel*`|
80
80
@@ -193,7 +193,7 @@ The following table describes the elements of the request body:
193
193
|`properties.maintenanceScope`| Gets or sets maintenanceScope of the configuration |
194
194
|`properties.maintenanceWindow.duration`| Duration of the maintenance window in HH:mm format. If not provided, default value will be used based on maintenance scope provided. Example: 05:00. |
195
195
|`properties.maintenanceWindow.expirationDateTime`| Effective expiration date of the maintenance window in YYYY-MM-DD hh:MM format. The window is created in the time zone provided to daylight savings according to that time zone. You must set the expiration date to a future date. If not provided, it will be set to the maximum datetime 9999-12-31 23:59:59. |
196
-
|`properties.maintenanceWindow.recurEvery`| Rate at which a Maintenance window is expected to recur. The rate can be expressed as daily, weekly, or monthly schedules. You can format daily schedules as recurEvery: [Frequency as integer]['Day(s)']. If no frequency is provided, the default frequency is 1. Daily schedule examples are recurEvery: Day, recurEvery: 3Days. Weekly schedule are formatted as recurEvery: [Frequency as integer]['Week(s)'][Optional comma separated list of weekdays Monday-Sunday]. Weekly schedule examples are recurEvery: 3Weeks, recurEvery: Week Saturday, Sunday. You can format monthly schedules as [Frequency as integer]['Month(s)'][Comma separated list of month days] or [Frequency as integer]['Month(s)'][Week of Month (First, Second, Third, Fourth, Last)][Weekday Monday-Sunday]. Monthly schedule examples are recurEvery: Month, recurEvery: 2Months, recurEvery: Month day23, day24, recurEvery: Month Last Sunday, recurEvery: Month Fourth Monday. |
196
+
|`properties.maintenanceWindow.recurEvery`| Rate at which a Maintenance window is expected to recur. The rate can be expressed as daily, weekly, or monthly schedules. You can format daily schedules as recurEvery: [Frequency as integer]['Day(s)']. If no frequency is provided, the default frequency is 1. Daily schedule examples are recurEvery: Day, recurEvery: 3Days. Weekly schedules are formatted as recurEvery: [Frequency as integer]['Week(s)'][Optional comma separated list of weekdays Monday-Sunday]. Weekly schedule examples are recurEvery: 3Weeks, recurEvery: Week Saturday, Sunday. You can format monthly schedules as [Frequency as integer]['Month(s)'][Comma separated list of month days] or [Frequency as integer]['Month(s)'][Week of Month (First, Second, Third, Fourth, Last)][Weekday Monday-Sunday]. Monthly schedule examples are recurEvery: Month, recurEvery: 2Months, recurEvery: Month day23, day24, recurEvery: Month Last Sunday, recurEvery: Month Fourth Monday. |
197
197
|`properties.maintenanceWindow.startDateTime`| Effective start date of the maintenance window in YYYY-MM-DD hh:mm format. You can set the start date to either the current date or future date. The window will be created in the time zone provided and adjusted to daylight savings according to that time zone. |
198
198
|`properties.maintenanceWindow.timeZone`| Name of the timezone. You can obtain the list of timezones by executing [System.TimeZoneInfo]:GetSystemTimeZones() in PowerShell. Example: Pacific Standard Time, UTC, W. Europe Standard Time, Korea Standard Time, Cen. Australia Standard Time. |
199
199
|`properties.namespace`| Gets or sets namespace of the resource |
title: Automatic Guest Patching for Azure Virtual Machines
3
+
description: Learn how to automatically patch your Azure Virtual Machines and Scale Sets using Azure Update Manager. This article provides an overview of supported OS images, configuration steps, and best practices for maintaining security compliance through automatic guest patching.
4
+
ms.service: azure-update-manager
5
+
author: SnehaSudhirG
6
+
ms.author: sudhirsneha
7
+
ms.date: 03/07/2025
8
+
ms.topic: overview
9
+
---
10
+
# Automatic guest patching for Azure virtual machines
11
+
12
+
**Applies to:**:heavy_check_mark: Linux VMs :heavy_check_mark: Windows VMs
13
+
14
+
By enabling automatic guest patching for your Azure Virtual Machines (VMs), you can automatically and securely patch your VMs to ensure they remain compliant with security standards."
15
+
16
+
## Supported OS images
17
+
18
+
Automatic VM guest patching, on-demand patch assessment and on-demand patch installation are supported only on VMs created from images with the exact combination of publisher, offer and sku from the below supported OS images list. Custom images or any other publisher, offer, sku combinations aren't supported. More images are added periodically. Don't see your SKU in the list? Request support by filing out [Image Support Request](https://forms.microsoft.com/r/6vfSgT0mFx).
19
+
20
+
If [automatic VM guest patching](/azure/virtual-machines/automatic-vm-guest-patching) is enabled on a VM, then the available Critical and Security patches are downloaded and applied automatically on the VM.
21
+
22
+
>[!NOTE]
23
+
> Only x64 operating systems are currently supported. Neither ARM64 nor x86 are supported for any operating system.
24
+
25
+
## Customized images
26
+
27
+
For VMs created from customized images even if the Patch orchestration mode is set to `Azure Orchestrated/AutomaticByPlatform`, automatic VM guest patching doesn't work. We recommend that you use scheduled patching to patch the machines by defining your own schedules or install updates on-demand.
28
+
29
+
## Next steps
30
+
31
+
- Learn about the [supported regions for Azure VMs and Arc-enabled servers](supported-regions.md).
32
+
- Learn on the [Update sources, types](support-matrix.md) managed by Azure Update Manger.
33
+
- Know more on [supported OS and system requirements for machines managed by Azure Update Manager](support-matrix-updates.md).
34
+
- Learn more on [unsupported OS and Custom VM images](unsupported-workloads.md).
35
+
- Learn more on how to [configure Windows Update settings](configure-wu-agent.md) to work with Azure Update Manager.
36
+
- Learn about [Extended Security Updates (ESU) using Azure Update Manager](extended-security-updates.md).
37
+
- Learn about [security vulnerabilities and Ubuntu Pro support](security-awareness-ubuntu-support.md).
0 commit comments