Skip to content

Commit f4c7476

Browse files
authored
Update periodic-assessment-at-scale.md
Updated some of the text to reflect the correct names in the UI
1 parent 2a27da6 commit f4c7476

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/update-manager/periodic-assessment-at-scale.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,11 @@ This article describes how to enable Periodic Assessment for your machines at sc
1616
## Enable Periodic Assessment for your Azure machines by using Azure Policy
1717

1818
1. Go to **Policy** in the Azure portal and select **Authoring** > **Definitions**.
19-
1. From the **Category** dropdown, select **Update Manager**. Select **Configure periodic checking for missing system updates on Azure virtual machines** for Azure machines.
19+
1. From the **Category** dropdown, select **Azure Update Manager**. Select **Configure periodic checking for missing system updates on Azure virtual machines** for Azure machines.
2020
1. When **Policy definition** opens, select **Assign**.
2121
1. On the **Basics** tab, select your subscription as your scope. You can also specify a resource group within your subscription as the scope. Select **Next**.
22-
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. In **Assessment** mode, select **AutomaticByPlatform** > **Operating system** > **Next**. You need to create separate policies for Windows and Linux.
22+
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. Note that **Assessment** mode = **AutomaticByPlatform** by default.
23+
2. Set the **OS Type** parameter to be either **Windows** or **Linux**. You need to create separate policies for Windows and Linux. Select **Next**.
2324
1. On the **Remediation** tab, select **Create a remediation task** so that periodic assessment is enabled on your machines. Select **Next**.
2425
1. On the **Non-compliance message** tab, provide the message that you want to see if there was noncompliance. For example, use **Your machine doesn't have periodic assessment enabled.** Select **Review + Create.**
2526
1. On the **Review + Create** tab, select **Create** to trigger **Assignment and Remediation Task** creation, which can take a minute or so.
@@ -33,10 +34,11 @@ You can monitor the compliance of resources under **Compliance** and remediation
3334
## Enable Periodic Assessment for your Azure Arc-enabled machines by using Azure Policy
3435

3536
1. Go to **Policy** in the Azure portal and select **Authoring** > **Definitions**.
36-
1. From the **Category** dropdown, select **Update Manager**. Select **Configure periodic checking for missing system updates on Azure Arc-enabled servers** for Azure Arc-enabled machines.
37+
1. From the **Category** dropdown, select **Azure Update Manager**. Select **Configure periodic checking for missing system updates on Azure Arc-enabled servers** for Azure Arc-enabled machines.
3738
1. When **Policy definition** opens, select **Assign**.
3839
1. On the **Basics** tab, select your subscription as your scope. You can also specify a resource group within your subscription as the scope. Select **Next**.
39-
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. In **Assessment** mode, select **AutomaticByPlatform** > **Operating system** > **Next**. You need to create separate policies for Windows and Linux.
40+
1. On the **Parameters** tab, clear **Only show parameters that need input or review** so that you can see the values of parameters. Note that **Assessment** mode = **AutomaticByPlatform** by default.
41+
2. Set the **OS Type** parameter to be either **Windows** or **Linux**. You need to create separate policies for Windows and Linux. Select **Next**.
4042
1. On the **Remediation** tab, select **Create a remediation task** so that periodic assessment is enabled on your machines. Select **Next**.
4143
1. On the **Non-compliance message** tab, provide the message that you want to see if there was noncompliance. For example, use **Your machine doesn't have periodic assessment enabled.** Select **Review + Create.**
4244
1. On the **Review + Create** tab, select **Create** to trigger **Assignment and Remediation Task** creation, which can take a minute or so.
@@ -48,12 +50,12 @@ You can monitor compliance of resources under **Compliance** and remediation sta
4850
This procedure applies to both Azure and Azure Arc-enabled machines.
4951

5052
1. Go to **Policy** in the Azure portal and select **Authoring** > **Definitions**.
51-
1. From the **Category** dropdown, select **Update Manager**. Select **Machines should be configured to periodically check for missing system updates**.
53+
1. From the **Category** dropdown, select **Azure Update Manager**. Select **Machines should be configured to periodically check for missing system updates**.
5254
1. When **Policy definition** opens, select **Assign**.
5355
1. On the **Basics** tab, select your subscription as your scope. You can also specify a resource group within your subscription as the scope. Select **Next**.
5456
1. On the **Parameters** and **Remediation** tabs, select **Next**.
5557
1. On the **Non-compliance message** tab, provide the message that you want to see if there was noncompliance. For example, use **Your machine doesn't have periodic assessment enabled.** Select **Review + Create.**
56-
1. On the **Review + Create** tab, select **Create** to trigger **Assignment and Remediation Task** creation, which can take a minute or so.
58+
1. On the **Review + Create** tab, select **Create** to trigger the **Assignment** creation, which can take a minute or so.
5759

5860
You can monitor compliance of resources under **Compliance** and remediation status under **Remediation** on the Azure Policy home page.
5961

0 commit comments

Comments
 (0)