Skip to content

Commit c929d5c

Browse files
authored
Merge pull request #101758 from MGoedtel/Task1666955
updated update classification details
2 parents 1e0927e + aeef6bc commit c929d5c

File tree

3 files changed

+7
-55
lines changed

3 files changed

+7
-55
lines changed

articles/automation/automation-tutorial-update-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides an overview of how to use Azure Automation Up
44
services: automation
55
ms.subservice: update-management
66
ms.topic: tutorial
7-
ms.date: 12/03/2019
7+
ms.date: 01/21/2020
88
ms.custom: mvc
99
---
1010
# Manage updates and patches for your Azure VMs
@@ -135,7 +135,7 @@ Under **New update deployment**, specify the following information:
135135

136136
* **Machines to update**: Select a Saved search, Imported group, or pick Machine from the drop-down and select individual machines. If you choose **Machines**, the readiness of the machine is shown in the **UPDATE AGENT READINESS** column. To learn about the different methods of creating computer groups in Azure Monitor logs, see [Computer groups in Azure Monitor logs](../azure-monitor/platform/computer-groups.md)
137137

138-
* **Update classification**: Select the types of software that the update deployment included in the deployment. For this tutorial, leave all types selected.
138+
* **Update classification**: Select the supported update classifications available for each product that can be included in the update deployment. For this tutorial, leave all types selected.
139139

140140
The classification types are:
141141

articles/automation/automation-update-management.md

Lines changed: 1 addition & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ The following table lists the supported operating systems for update assessments
6767
|---------|---------|
6868
|Windows Server 2019 (Datacenter/Datacenter Core/Standard)<br><br>Windows Server 2016 (Datacenter/Datacenter Core/Standard)<br><br>Windows Server 2012 R2(Datacenter/Standard)<br><br>Windows Server 2012 ||
6969
|Windows Server 2008 R2 (RTM and SP1 Standard)| Update Management only supports performing assessments for this operating system, patching is not supported as the [Hybrid Runbook Worker](automation-windows-hrw-install.md#installing-the-windows-hybrid-runbook-worker) is not supported for Windows Server 2008 R2. |
70-
|CentOS 6 (x86/x64) and 7 (x64) | Linux agents must have access to an update repository. Classification-based patching requires `yum` to return security data that CentOS doesn't have in its RTM releases. For more information on classification-based patching on CentOS, see [Update classifications on Linux](#linux-2). |
70+
|CentOS 6 (x86/x64) and 7 (x64) | Linux agents must have access to an update repository. Classification-based patching requires `yum` to return security data that CentOS doesn't have in its RTM releases. For more information on classification-based patching on CentOS, see [Update classifications on Linux](automation-view-update-assessments.md#linux-2). |
7171
|Red Hat Enterprise 6 (x86/x64) and 7 (x64) | Linux agents must have access to an update repository. |
7272
|SUSE Linux Enterprise Server 11 (x86/x64) and 12 (x64) | Linux agents must have access to an update repository. |
7373
|Ubuntu 14.04 LTS, 16.04 LTS, and 18.04 (x86/x64) |Linux agents must have access to an update repository. |
@@ -186,56 +186,6 @@ We recommend that you use the addresses listed when defining exceptions. For IP
186186

187187
Follow the instructions in [Connect computers without internet access](../azure-monitor/platform/gateway.md) to configure machines that don't have internet access.
188188

189-
## View update assessments
190-
191-
In your Automation account, select **Update Management** to view the status of your machines.
192-
193-
This view provides information about your machines, missing updates, update deployments, and scheduled update deployments. In the **COMPLIANCE** column, you can see the last time the machine was assessed. In the **UPDATE AGENT READINESS** column, you can check the health of the update agent. If there's an issue, select the link to go to troubleshooting documentation that can help you correct the problem.
194-
195-
To run a log search that returns information about the machine, update, or deployment, select the corresponding item in the list. The **Log Search** pane opens with a query for the item selected:
196-
197-
![Update Management default view](media/automation-update-management/update-management-view.png)
198-
199-
## View missing updates
200-
201-
Select **Missing updates** to view the list of updates that are missing from your machines. Each update is listed and can be selected. Information about the number of machines that require the update, the operating system, and a link for more information is shown. The **Log search** pane shows more details about the updates.
202-
203-
![Missing Updates](./media/automation-view-update-assessments/automation-view-update-assessments-missing-updates.png)
204-
205-
## Update classifications
206-
207-
The following tables list the update classifications in Update Management, with a definition for each classification.
208-
209-
### Windows
210-
211-
|Classification |Description |
212-
|---------|---------|
213-
|Critical updates | An update for a specific problem that addresses a critical, non-security-related bug. |
214-
|Security updates | An update for a product-specific, security-related issue. |
215-
|Update rollups | A cumulative set of hotfixes that are packaged together for easy deployment. |
216-
|Feature packs | New product features that are distributed outside a product release. |
217-
|Service packs | A cumulative set of hotfixes that are applied to an application. |
218-
|Definition updates | An update to virus or other definition files. |
219-
|Tools | A utility or feature that helps complete one or more tasks. |
220-
|Updates | An update to an application or file that currently is installed. |
221-
222-
### <a name="linux-2"></a>Linux
223-
224-
|Classification |Description |
225-
|---------|---------|
226-
|Critical and security updates | Updates for a specific problem or a product-specific, security-related issue. |
227-
|Other updates | All other updates that aren't critical in nature or that aren't security updates. |
228-
229-
For Linux, Update Management can distinguish between critical updates and security updates in the cloud while displaying assessment data due to data enrichment in the cloud. For patching, Update Management relies on classification data available on the machine. Unlike other distributions, CentOS does not have this information available in the RTM version. If you have CentOS machines configured to return security data for the following command, Update Management can patch based on classifications.
230-
231-
```bash
232-
sudo yum -q --security check-update
233-
```
234-
235-
There's currently no supported method to enable native classification-data availability on CentOS. At this time, only best-effort support is provided to customers who might have enabled this on their own.
236-
237-
To classify updates on Red Hat Enterprise version 6, you need to install the yum-security plugin. On Red Hat Enterprise Linux 7, the plugin is already a part of yum itself, there is no need to install anything. For further information, see the following Red Hat [knowledge article](https://access.redhat.com/solutions/10021).
238-
239189
## Integrate with System Center Configuration Manager
240190

241191
Customers who have invested in System Center Configuration Manager for managing PCs, servers, and mobile devices also rely on the strength and maturity of Configuration Manager to help them manage software updates. Configuration Manager is part of their software update management (SUM) cycle.

articles/automation/automation-view-update-assessments.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: View Azure Update Management update assessments
33
description: This article describes how to view update assessments for update deployments.
44
services: automation
55
ms.subservice: update-management
6-
ms.date: 05/17/2019
6+
ms.date: 01/21/2020
77
ms.topic: conceptual
88
---
99
# View Azure Update Management update assessments
@@ -24,7 +24,7 @@ Select **Missing updates** to view the list of updates that are missing from you
2424

2525
## Update classifications
2626

27-
The following tables list the update classifications in Update Management, with a definition for each classification.
27+
The following tables list the supported update classifications in Update Management, with a definition for each classification.
2828

2929
### Windows
3030

@@ -54,6 +54,8 @@ sudo yum -q --security check-update
5454

5555
There's currently no supported method to enable native classification-data availability on CentOS. At this time, only best-effort support is provided to customers who have enabled this functionality on their own.
5656

57+
To classify updates on Red Hat Enterprise version 6, you need to install the yum-security plugin. On Red Hat Enterprise Linux 7, the plugin is already a part of yum itself, there is no need to install anything. For further information, see the following Red Hat [knowledge article](https://access.redhat.com/solutions/10021).
58+
5759
## Next steps
5860

5961
After you view any update assessments, you can schedule an update deployment by following the steps at [Manage updates and patches for your Azure VMs](automation-tutorial-update-management.md).

0 commit comments

Comments
 (0)