You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/update-manager/guidance-migration-azure.md
+21-9Lines changed: 21 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.date: 09/06/2024
12
12
13
13
**Applies to:**:heavy_check_mark: Windows VMs :heavy_check_mark: Linux VMs :heavy_check_mark: On-premises environment :heavy_check_mark: Azure Arc-enabled servers.
14
14
15
-
This article provides a guide to modernize management of servers for which you are currently using Microsoft Configuration Manager (MCM). We shall focus on Azure Update Manager that provides Azure based experiences for patch management, the major capability of MCM.
15
+
This article provides a guide to modernize management of servers for which you are currently using Microsoft Configuration Manager (MCM).
16
16
17
-
To start with, let us list the Azure Services that provide equivalent capabilities for the different System Center components.
17
+
If you use MCM as part of the System Center suite, the table below lists Azure services that match the capabilities of different System Center components.
18
18
19
19
|**System Center Component**|**Azure equivalent service**|
20
20
| --- | --- |
@@ -28,11 +28,13 @@ To start with, let us list the Azure Services that provide equivalent capabiliti
28
28
> As part of your migration journey, we recommend the following options:
29
29
> 1. Fully migrate your virtual machines to Azure and replace System Center with Azure native services.
30
30
> 1. Take a hybrid approach and replace System Center with Azure native services. Where both Azure and on-premises virtual machines are managed using Azure native services. For on-premises virtual machines, the capabilities of the Azure platform are extended to on-premises via Azure Arc.
31
+
> 1. Software updates management is a key capability of MCM, and this article focuses on Azure Update Manager, which provides Azure based experience for software updates and patch management.
31
32
32
33
## Migrate to Azure Update Manager
33
-
MCM helps you to manage PCs and servers, keep software up to date, set configuration and security policies, and monitor system status. MCM offers [multiple features and capabilities](/mem/configmgr/core/plan-design/changes/features-and-capabilities) and software [update management](/mem/configmgr/sum/understand/software-updates-introduction) is one of these.
34
34
35
-
Specifically for update management or patching, as per your requirements, you can use the native [Azure Update Manager](overview.md) to manage and govern update compliance for Windows and Linux machines across your deployments in a consistent manner. Unlike MCM which needs maintaining Azure virtual machines for hosting the different Configuration Manager roles, Azure Update Manager is designed as a standalone Azure service to provide SaaS experience on Azure to manage hybrid environments. You don't need a license to use Azure Update Manager.
35
+
MCM helps you manage PCs and servers, keep software up to date, set configuration and security policies, and monitor system status. MCM offers [multiple features and capabilities](/mem/configmgr/core/plan-design/changes/features-and-capabilities) and software [update management](/mem/configmgr/sum/understand/software-updates-introduction) is one of these.
36
+
37
+
Specifically for update management or patching, as per your requirements, you can use the native [Azure Update Manager](overview.md) to manage and govern update compliance for Windows and Linux machines across your deployments in a consistent manner. Unlike MCM, which requires maintaining Azure virtual machines for hosting the different Configuration Manager roles, Azure Update Manager is designed as a standalone Azure service to provide SaaS experience on Azure to manage hybrid environments. You don't need a license to use Azure Update Manager.
36
38
37
39
> [!NOTE]
38
40
> - To manage clients/devices, Intune is the recommended Microsoft solution.
@@ -54,23 +56,33 @@ Deploy software updates (install patches) | Provides three modes of deploying up
54
56
55
57
As a first step in MCM user's journey towards Azure Update Manager, you need to enable Azure Update Manager on your existing MCM managed servers (i.e. ensure that Azure Update Manager and MCM co-existence is achieved). The following section address few challenges that you might encounter in this first step.
56
58
59
+
> [!NOTE]
60
+
> - Azure Update Manager doesn't support client ordevices.
61
+
> - This article helps you start using Azure Update Manager to manage software updates or patches to servers currently managed by MCM.
62
+
> - Azure Update Manager and MCM co-existence means that once Azure Update Manager is enabled, MCM should only be used for capabilities other than software updates management.
63
+
> - Azure Update Manager and MCM should not be used simultaneously to manage software updates or patches to same set of servers.
64
+
57
65
### Prerequisites for Azure Update Manager and MCM co-existence
58
66
59
67
- Ensure that the Auto updates are disabled on the machine. For more information, see [Manage additional Windows Update settings - Configuring Automatic Updates by editing the registry](/windows/deployment/update/waas-wu-settings#configuring-automatic-updates-by-editing-the-registry).
60
68
61
69
Ensure that the **NoAutoUpdate** registry key is set to 1 in the following registry path: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU`
62
70
63
-
- Azure Update Manager can get updates from WSUS server and for this, ensure to configure WSUS server as part of SCCM.
71
+
- Azure Update Manager can get updates from WSUS server and for this, ensure to configure WSUS server.
64
72
65
73
- Ensure that the WSUS server has enough space.
66
74
- Ensure to update language option to download the packages in WSUS config. We recommend that you select the languages that are required. For more information, see [Step 2 - Configure WSUS](/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus#to-configure-wsus).
67
75
- Ensure to create a rule for auto approving updates in WSUS to download the applicable packages on the WSUS server so that Azure Update Manager can get the updates from this WSUS server.
68
-
- Select classifications you want as per your requirements or keep them same as selected in SCCM.
69
-
- Select products as per requirements or keep them same as selected in SCCM.
76
+
- Select classifications you want as per your requirements or keep them the same as were selected in MCM.
77
+
- Select products as per requirements or keep them the same as were selected in MCM.
70
78
- To start, create a test computer group and apply this rule to it, to test these changes.
71
79
- After testing the test group, you can expand it to all computer groups.
72
80
- Create an exclusion computer group in WSUS if needed.
73
81
82
+
>[!Note]
83
+
> - If you reconfigure a WSUS server to enable Azure Update Manager, ensure it doesn't manage software updates or patches for clients or devices.
84
+
> - We recommend to create a new standalone WSUS server with its own SUSDB that is not associated to MCM.
85
+
74
86
### Overview of current MCM setup
75
87
76
88
MCM client uses WSUS server to scan for first-party updates, therefore you have WSUS server configured as part of the initial setup.
@@ -79,7 +91,7 @@ Third-party updates content is published to this WSUS server as well. Azure Upda
79
91
80
92
### First party updates
81
93
82
-
For Azure Update Manager to scan and install first party updates (Windows and Microsoft updates), you should start approving the required updates in the configured WSUS server. This is done by [configuring an auto approval rule in WSUS](/windows-server/administration/windows-server-update-services/deploy/3-approve-and-deploy-updates-in-wsus#32-configure-auto-approval-rules) like what users have configured on MCM server.
94
+
For Azure Update Manager to scan and install first party updates (Windows and Microsoft updates), you should start approving the required updates in the configured WSUS server. This is done by [configuring an auto approval rule in WSUS](/windows-server/administration/windows-server-update-services/deploy/3-approve-and-deploy-updates-in-wsus#32-configure-auto-approval-rules).
83
95
84
96
### Third party updates
85
97
@@ -110,7 +122,7 @@ The following are the current limitations:
110
122
111
123
## Frequently asked questions
112
124
113
-
### Where does Azure Update Manager get its updates from?
125
+
### Where does Azure Update Manager get updates from?
114
126
115
127
Azure Update Manager refers to the repository that the machines point to. Most Windows machines by default point to the Windows Update catalog and Linux machines are configured to get updates from the `apt` or `yum` repositories. If the machines point to another repository such as [WSUS](/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus) or a local repository then Azure Update Manager gets the updates from that repository.
0 commit comments