You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/update-manager/updates-maintenance-schedules.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Updates and maintenance in Azure Update Manager
3
3
description: This article describes the updates and maintenance options available in Azure Update Manager.
4
4
ms.service: azure-update-manager
5
-
ms.date: 10/28/2024
5
+
ms.date: 06/11/2025
6
6
ms.topic: overview
7
7
author: habibaum
8
8
ms.author: v-uhabiba
@@ -12,6 +12,10 @@ ms.author: v-uhabiba
12
12
13
13
**Applies to:**:heavy_check_mark: Windows VMs :heavy_check_mark: Linux VMs :heavy_check_mark: On-premises environment :heavy_check_mark: Azure Arc-enabled servers.
14
14
15
+
>[!IMPORTANT]
16
+
> - For a seamless scheduled patching experience, we recommend that for all Azure virtual machines (VMs), you update the patch orchestration to **Customer Managed Schedules**.
17
+
> - For Arc-enabled servers, the updates and maintenance options such as Automatic VM Guest patching in Azure, Windows automatic updates and Hotpatching aren't supported.
18
+
15
19
This article provides an overview of the various update options and orchestration in Azure Update Manager.
16
20
17
21
## Update Options
@@ -39,12 +43,12 @@ Automatic OS upgrade has the following characteristics:
39
43
40
44
### Automatic VM guest patching
41
45
42
-
When you enable [automatic VM guest patching](/azure/virtual-machines/automatic-vm-guest-patching) on your Azure VMs, it helps ease Azure Update Manager to safely and automatically patch virtual machines to maintain security compliance.
46
+
When you enable [automatic VM guest patching](/azure/virtual-machines/automatic-vm-guest-patching) on your Azure VMs, patching of Security and Critical updates to your VMs will be handled by Azure, and you will not control the timing nor choose which classifications or updates to install.
43
47
44
48
Automatic VM guest patching has the following characteristics:
45
49
- Patches classified as *Critical* or *Security* are automatically downloaded and applied on the VM.
46
-
- Patches are applied during off-peak hours for IaaS VMs in the time zone of the datacenter hosting the VM.
47
-
- Patches are applied during all hours for Azure Virtual Machine Scale Sets [VMSS Flexible orchestration](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-orchestration-modes#scale-sets-with-flexible-orchestration).
50
+
- Patches are applied during off-peak hours for IaaS VMs in the VM's time zone of the datacenter where they are hosted.
51
+
- Patches are applied during all hours for Azure Virtual Machine Scale Sets [Virtual Machine Scale Sets Flexible orchestration](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-orchestration-modes#scale-sets-with-flexible-orchestration).
48
52
- Patch orchestration is managed by Azure and patches are applied following [availability-first principles](/azure/virtual-machines/automatic-vm-guest-patching#availability-first-updates).
49
53
- Virtual machine health, as determined through platform health signals, is monitored to detect patching failures.
50
54
- You can monitor application health through the [Application Health Extension](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-health-extension).
@@ -67,7 +71,7 @@ To enable the VM property, follow these steps:
67
71
68
72
## Hotpatching
69
73
70
-
[Hotpatching](/windows-server/get-started/hotpatch?context=%2Fazure%2Fvirtual-machines%2Fcontext%2Fcontext) allows you to install OS security updates on supported *Windows Server Datacenter: Azure Edition* virtual machines that don't require a reboot after installation. It works by patching the in-memory code of running processes without the need to restart the process. With Hotpatching, reboots will be typically be required for the installation of patches on every third month rather than every month.
74
+
[Hotpatching](/windows-server/get-started/hotpatch?context=%2Fazure%2Fvirtual-machines%2Fcontext%2Fcontext) allows you to install OS security updates on supported *Windows Server Datacenter: Azure Edition* virtual machines that don't require a reboot after installation. It works by patching the in-memory code of running processes without the need to restart the process. With Hotpatching, reboots will typically be required for the installation of patches on every third month rather than every month.
71
75
72
76
Following are the features of Hotpatching:
73
77
@@ -98,8 +102,7 @@ Automatic Extension Upgrade has the following features:
98
102
This mode of patching allows operating system to automatically install updates on Windows VMs as soon as they're available. It uses the VM property that is enabled by setting the patch orchestration to OS orchestrated/Automatic by OS.
99
103
100
104
> [!NOTE]
101
-
> - Windows automatic updates is not an Azure Update Manager setting but a Windows level setting.
102
-
> - Azure Update Manager doesn't support [In-place upgrade for VMs running Windows Server in Azure](/azure/virtual-machines/windows-in-place-upgrade).
105
+
> - Windows automatic updates are not an Azure Update Manager setting, but a Windows-level setting.
103
106
104
107
## Update or Patch orchestration
105
108
@@ -122,7 +125,7 @@ Use [scheduled patching](scheduled-patching.md) to create and save recurring dep
122
125
> Patch orchestration property for Azure machines should be set to **Customer Managed Schedules** as it is a prerequisite for scheduled patching. For more information, see the [list of prerequisites](scheduled-patching.md#prerequisites-for-scheduled-patching).
123
126
124
127
> [!IMPORTANT]
125
-
> -It is not possible to configure Patch Settings for Arc-enabled servers.
128
+
> -For a seamless scheduled patching experience, we recommend that for all Azure VMs, you must update the patch orchestration to **Customer Managed Schedules**. If you fail to update the patch orchestration, you can experience a disruption in business continuity because the schedules will fail to patch the VMs. [Learn more](prerequsite-for-schedule-patching.md).
0 commit comments