You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/update-manager/guidance-migration-azure.md
+24-11Lines changed: 24 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.date: 09/06/2024
12
12
13
13
**Applies to:**:heavy_check_mark: Windows VMs :heavy_check_mark: Linux VMs :heavy_check_mark: On-premises environment :heavy_check_mark: Azure Arc-enabled servers.
14
14
15
-
This article provides a guide to modernize management of servers for which you are currently using Microsoft Configuration Manager (MCM). We shall focus on Azure Update Manager that provides Azure based experiences for patch management, the major capability of MCM.
15
+
This article provides a guide to modernize management of servers for which you are currently using Microsoft Configuration Manager (MCM).
16
16
17
-
To start with, let us list the Azure Services that provide equivalent capabilities for the different System Center components.
17
+
If you use MCM as part of the System Center suite, the table below lists Azure services that match the capabilities of different System Center components.
18
18
19
19
|**System Center Component**|**Azure equivalent service**|
20
20
| --- | --- |
@@ -29,14 +29,17 @@ To start with, let us list the Azure Services that provide equivalent capabiliti
29
29
> 1. Fully migrate your virtual machines to Azure and replace System Center with Azure native services.
30
30
> 1. Take a hybrid approach and replace System Center with Azure native services. Where both Azure and on-premises virtual machines are managed using Azure native services. For on-premises virtual machines, the capabilities of the Azure platform are extended to on-premises via Azure Arc.
31
31
32
+
Software updates management is a key capability of MCM, and this article focuses on Azure Update Manager, which provides Azure based experience for software updates and patch management.
33
+
32
34
## Migrate to Azure Update Manager
33
-
MCM helps you to manage PCs and servers, keep software up to date, set configuration and security policies, and monitor system status. MCM offers [multiple features and capabilities](/mem/configmgr/core/plan-design/changes/features-and-capabilities) and software [update management](/mem/configmgr/sum/understand/software-updates-introduction) is one of these.
34
35
35
-
Specifically for update management or patching, as per your requirements, you can use the native [Azure Update Manager](overview.md) to manage and govern update compliance for Windows and Linux machines across your deployments in a consistent manner. Unlike MCM which needs maintaining Azure virtual machines for hosting the different Configuration Manager roles, Azure Update Manager is designed as a standalone Azure service to provide SaaS experience on Azure to manage hybrid environments. You don't need a license to use Azure Update Manager.
36
+
MCM helps you manage PCs and servers, keep software up to date, set configuration and security policies, and monitor system status. MCM offers [multiple features and capabilities](/mem/configmgr/core/plan-design/changes/features-and-capabilities) and software [update management](/mem/configmgr/sum/understand/software-updates-introduction) is one of these.
37
+
38
+
Specifically for update management or patching, as per your requirements, you can use the native [Azure Update Manager](overview.md) to manage and govern update compliance for Windows and Linux machines across your deployments in a consistent manner. Unlike MCM, which requires maintaining Azure virtual machines for hosting the different Configuration Manager roles, Azure Update Manager is designed as a standalone Azure service to provide SaaS experience on Azure to manage hybrid environments. You don't need a license to use Azure Update Manager.
36
39
37
40
> [!NOTE]
38
41
> - To manage clients/devices, Intune is the recommended Microsoft solution.
39
-
> - Azure Update Manager does not provide migration support for Azure VMs in MCM. For example, configurations.
42
+
> - Azure Update Manager doesn't provide migration support for Azure VMs in MCM. For example, configurations.
40
43
41
44
## Software update management capability map
42
45
@@ -48,29 +51,39 @@ Synchronize software updates between sites (Central Admin site, Primary, Seconda
48
51
Synchronize software updates/check for updates (retrieve patch metadata) | You can scan for updates periodically by setting configuration on the Software update point. [Learn more](/mem/configmgr/sum/get-started/synchronize-software-updates#to-schedule-software-updates-synchronization) | You can enable periodic assessment to enable scan of patches every 24 hours. [Learn more](assessment-options.md)|
49
52
Configuring classifications/products to synchronize/scan/assess | You can choose the update classifications (security or critical updates) to synchronize/scan/assess. [Learn more](/mem/configmgr/sum/get-started/configure-classifications-and-products) | There's no such capability here. The entire software metadata is scanned. |
50
53
Deploy software updates (install patches) | Provides three modes of deploying updates: </br> Manual deployment </br> Automatic deployment </br> Phased deployment [Learn more](/mem/configmgr/sum/deploy-use/deploy-software-updates) | - Manual deployment is mapped to deploy [one-time updates](deploy-updates.md) </br> - Automatic deployment is mapped to scheduled updates </br> - There's no phased deployment option.
51
-
| Deploy software updates on Windows and Linux machines (in Azure or on-premises or other clouds) |SCCM helps manage tracking and applying software updates to Windows machines (Currently, we don't support Linux machines.) | Azure Update Manager supports software updates on both Windows and Linux machines. |
54
+
| Deploy software updates on Windows and Linux machines (in Azure or on-premises or other clouds) |MCM helps manage tracking and applying software updates to Windows machines (Currently, we don't support Linux machines.) | Azure Update Manager supports software updates on both Windows and Linux machines. |
52
55
53
56
## Guidance to use Azure Update Manager on MCM managed machines
54
57
55
58
As a first step in MCM user's journey towards Azure Update Manager, you need to enable Azure Update Manager on your existing MCM managed servers (i.e. ensure that Azure Update Manager and MCM co-existence is achieved). The following section address few challenges that you might encounter in this first step.
56
59
60
+
> [!NOTE]
61
+
> - Azure Update Manager doesn't support client or devices.
62
+
> - This article helps you start using Azure Update Manager to manage software updates or patches to servers currently managed by MCM.
63
+
> - Azure Update Manager and MCM co-existence means that once Azure Update Manager is enabled, MCM should only be used for capabilities other than software updates management.
64
+
> - Azure Update Manager and MCM shouldn't be used simultaneously to manage software updates or patches to same set of servers.
65
+
57
66
### Prerequisites for Azure Update Manager and MCM co-existence
58
67
59
68
- Ensure that the Auto updates are disabled on the machine. For more information, see [Manage additional Windows Update settings - Configuring Automatic Updates by editing the registry](/windows/deployment/update/waas-wu-settings#configuring-automatic-updates-by-editing-the-registry).
60
69
61
70
Ensure that the **NoAutoUpdate** registry key is set to 1 in the following registry path: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU`
62
71
63
-
- Azure Update Manager can get updates from WSUS server and for this, ensure to configure WSUS server as part of SCCM.
72
+
- Azure Update Manager can get updates from WSUS server and for this, ensure to configure WSUS server.
64
73
65
74
- Ensure that the WSUS server has enough space.
66
75
- Ensure to update language option to download the packages in WSUS config. We recommend that you select the languages that are required. For more information, see [Step 2 - Configure WSUS](/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus#to-configure-wsus).
67
76
- Ensure to create a rule for auto approving updates in WSUS to download the applicable packages on the WSUS server so that Azure Update Manager can get the updates from this WSUS server.
68
-
- Select classifications you want as per your requirements or keep them same as selected in SCCM.
69
-
- Select products as per requirements or keep them same as selected in SCCM.
77
+
- Select classifications you want as per your requirements or keep them the same as were selected in MCM.
78
+
- Select products as per requirements or keep them the same as were selected in MCM.
70
79
- To start, create a test computer group and apply this rule to it, to test these changes.
71
80
- After testing the test group, you can expand it to all computer groups.
72
81
- Create an exclusion computer group in WSUS if needed.
73
82
83
+
>[!Note]
84
+
> - If you reconfigure a WSUS server to enable Azure Update Manager, ensure it doesn't manage software updates or patches for clients or devices.
85
+
> - We recommend to create a new standalone WSUS server with its own SUSDB that is not associated to MCM.
86
+
74
87
### Overview of current MCM setup
75
88
76
89
MCM client uses WSUS server to scan for first-party updates, therefore you have WSUS server configured as part of the initial setup.
@@ -79,7 +92,7 @@ Third-party updates content is published to this WSUS server as well. Azure Upda
79
92
80
93
### First party updates
81
94
82
-
For Azure Update Manager to scan and install first party updates (Windows and Microsoft updates), you should start approving the required updates in the configured WSUS server. This is done by [configuring an auto approval rule in WSUS](/windows-server/administration/windows-server-update-services/deploy/3-approve-and-deploy-updates-in-wsus#32-configure-auto-approval-rules) like what users have configured on MCM server.
95
+
For Azure Update Manager to scan and install first party updates (Windows and Microsoft updates), you should start approving the required updates in the configured WSUS server. This is done by [configuring an auto approval rule in WSUS](/windows-server/administration/windows-server-update-services/deploy/3-approve-and-deploy-updates-in-wsus#32-configure-auto-approval-rules).
83
96
84
97
### Third party updates
85
98
@@ -110,7 +123,7 @@ The following are the current limitations:
110
123
111
124
## Frequently asked questions
112
125
113
-
### Where does Azure Update Manager get its updates from?
126
+
### Where does Azure Update Manager get updates from?
114
127
115
128
Azure Update Manager refers to the repository that the machines point to. Most Windows machines by default point to the Windows Update catalog and Linux machines are configured to get updates from the `apt` or `yum` repositories. If the machines point to another repository such as [WSUS](/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or a local repository then Azure Update Manager gets the updates from that repository.
0 commit comments