You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/update-manager/periodic-assessment-at-scale.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,10 +16,11 @@ This article describes how to enable Periodic Assessment for your machines at sc
16
16
## Enable Periodic Assessment for your Azure machines by using Azure Policy
17
17
18
18
1. Go to **Policy** in the Azure portal and select **Authoring** > **Definitions**.
19
-
1. From the **Category** dropdown, select **Update Manager**. Select **Configure periodic checking for missing system updates on Azure virtual machines** for Azure machines.
19
+
1. From the **Category** dropdown, select **Azure Update Manager**. Select **Configure periodic checking for missing system updates on Azure virtual machines** for Azure machines.
20
20
1. When **Policy definition** opens, select **Assign**.
21
21
1. On the **Basics** tab, select your subscription as your scope. You can also specify a resource group within your subscription as the scope. Select **Next**.
22
-
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. In **Assessment** mode, select **AutomaticByPlatform** > **Operating system** > **Next**. You need to create separate policies for Windows and Linux.
22
+
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. Note that **Assessment** mode = **AutomaticByPlatform** by default.
23
+
2. Set the **OS Type** parameter to be either **Windows** or **Linux**. You need to create separate policies for Windows and Linux. Select **Next**.
23
24
1. On the **Remediation** tab, select **Create a remediation task** so that periodic assessment is enabled on your machines. Select **Next**.
24
25
1. On the **Non-compliance message** tab, provide the message that you want to see if there was noncompliance. For example, use **Your machine doesn't have periodic assessment enabled.** Select **Review + Create.**
25
26
1. On the **Review + Create** tab, select **Create** to trigger **Assignment and Remediation Task** creation, which can take a minute or so.
@@ -33,10 +34,11 @@ You can monitor the compliance of resources under **Compliance** and remediation
33
34
## Enable Periodic Assessment for your Azure Arc-enabled machines by using Azure Policy
34
35
35
36
1. Go to **Policy** in the Azure portal and select **Authoring** > **Definitions**.
36
-
1. From the **Category** dropdown, select **Update Manager**. Select **Configure periodic checking for missing system updates on Azure Arc-enabled servers** for Azure Arc-enabled machines.
37
+
1. From the **Category** dropdown, select **Azure Update Manager**. Select **Configure periodic checking for missing system updates on Azure Arc-enabled servers** for Azure Arc-enabled machines.
37
38
1. When **Policy definition** opens, select **Assign**.
38
39
1. On the **Basics** tab, select your subscription as your scope. You can also specify a resource group within your subscription as the scope. Select **Next**.
39
-
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. In **Assessment** mode, select **AutomaticByPlatform** > **Operating system** > **Next**. You need to create separate policies for Windows and Linux.
40
+
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. Note that **Assessment** mode = **AutomaticByPlatform** by default.
41
+
2. Set the **OS Type** parameter to be either **Windows** or **Linux**. You need to create separate policies for Windows and Linux. Select **Next**.
40
42
1. On the **Remediation** tab, select **Create a remediation task** so that periodic assessment is enabled on your machines. Select **Next**.
41
43
1. On the **Non-compliance message** tab, provide the message that you want to see if there was noncompliance. For example, use **Your machine doesn't have periodic assessment enabled.** Select **Review + Create.**
42
44
1. On the **Review + Create** tab, select **Create** to trigger **Assignment and Remediation Task** creation, which can take a minute or so.
@@ -48,12 +50,12 @@ You can monitor compliance of resources under **Compliance** and remediation sta
48
50
This procedure applies to both Azure and Azure Arc-enabled machines.
49
51
50
52
1. Go to **Policy** in the Azure portal and select **Authoring** > **Definitions**.
51
-
1. From the **Category** dropdown, select **Update Manager**. Select **Machines should be configured to periodically check for missing system updates**.
53
+
1. From the **Category** dropdown, select **Azure Update Manager**. Select **Machines should be configured to periodically check for missing system updates**.
52
54
1. When **Policy definition** opens, select **Assign**.
53
55
1. On the **Basics** tab, select your subscription as your scope. You can also specify a resource group within your subscription as the scope. Select **Next**.
54
56
1. On the **Parameters** and **Remediation** tabs, select **Next**.
55
57
1. On the **Non-compliance message** tab, provide the message that you want to see if there was noncompliance. For example, use **Your machine doesn't have periodic assessment enabled.** Select **Review + Create.**
56
-
1. On the **Review + Create** tab, select **Create** to trigger **Assignment and Remediation Task** creation, which can take a minute or so.
58
+
1. On the **Review + Create** tab, select **Create** to trigger the **Assignment** creation, which can take a minute or so.
57
59
58
60
You can monitor compliance of resources under **Compliance** and remediation status under **Remediation** on the Azure Policy home page.
0 commit comments