Skip to content

Commit f776552

Browse files
authored
Merge pull request #181105 from SGSneha/26Nov-UpdateMgmt-UpdateClassifications
Edited Note in Update Classifications section
2 parents 8b774d2 + e1c4059 commit f776552

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/automation/update-management/overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Automation Update Management overview
33
description: This article provides an overview of the Update Management feature that implements updates for your Windows and Linux machines.
44
services: automation
55
ms.subservice: update-management
6-
ms.date: 09/27/2021
6+
ms.date: 11/26/2021
77
ms.topic: conceptual
88
---
99

@@ -156,9 +156,9 @@ When you schedule an update to run on a Linux machine, that for example is confi
156156
Categorization is done for Linux updates as **Security** or **Others** based on the OVAL files, which includes updates addressing security issues or vulnerabilities. But when the update schedule is run, it executes on the Linux machine using the appropriate package manager like YUM, APT, or ZYPPER to install them. The package manager for the Linux distro may have a different mechanism to classify updates, where the results may differ from the ones obtained from OVAL files by Update Management. To manually check the machine and understand which updates are security relevant by your package manager, see [Troubleshoot Linux update deployment](../troubleshoot/update-management.md#updates-linux-installed-different).
157157

158158
>[!NOTE]
159-
> Deploying updates by update classification may not work correctly for Linux distros supported by Update Management. This is a result of an issue identified with the naming schema of the OVAL file and this prevents Update Management from properly matching classifications based on filtering rules. Because of the different logic used in security update assessments, results may differ from the security updates applied during deployment. If you have classification set as **Critical** and **Security**, the update deployment will work as expected. Only the *classification of updates* during an assessment is affected.
160-
>
161-
> Update Management for Windows Server machines is unaffected; update classification and deployments are unchanged.
159+
> During update assessment, the classification of missing updates as Security and Critical may not work correctly for Linux distros supported by Update Management. This is a result of an issue identified with the naming schema of the OVAL files, which the Update Management uses to classify updates during the assessment. This prevents Update Management from properly matching classifications based on filtering rules during the assessment of missing updates. </br>
160+
> **This doesn't affect the deployment of updates**. As a different logic is used in security update assessments, results might differ from the security updates applied during deployment. If you have classification set as **Critical** and **Security**, the update deployment will function as expected. Only the *classification of updates* during an assessment is affected.</br>
161+
> **Update Management for Windows Server machines is unaffected; update classification and deployments are unchanged**.
162162
163163
## Integrate Update Management with Configuration Manager
164164

0 commit comments

Comments
 (0)