View update assessments in Update Management
In Update Management, you can view information about your machines, missing updates, update deployments, and scheduled update deployments. You can view the assessment information scoped to the selected Azure virtual machine, from the selected Arc enabled server, or from the Automation account across all configured machines and servers.
Sign in to the Azure portal
Sign in to the Azure portal
View update assessment
To view update assessment from an Azure VM, navigate to Virtual Machines and select your virtual machine from the list. From the left menu, select Guest + host updates, and then select Go to Update Management on the Guest + host updates page.
In Update Management, you can view information about your machine, missing updates, update deployments, and scheduled update deployments.
To view update assessment from an Arc enabled server, navigate to Servers - Azure Arc and select your server from the list. From the left menu, select Guest and host updates. On the Guest + host updates page, select Go to Update Management.
In Update Management, you can view information about your Arc enabled machine, missing updates, update deployments, and scheduled update deployments.
To view update assessment across all machines, including Arc enabled servers from your Automation account, navigate to Automation accounts and select your Automation account with Update Management enabled from the list. In your Automation account, select Update management from the left menu.
The updates for your environment are listed on the Update management page. If any updates are identified as missing, a list of them is shown on the Missing updates tab.
Under the COMPLIANCE column, you can see the last time the machine was assessed. Under the UPDATE AGENT READINESS column, you can see the health of the update agent. If there's an issue, select the link to go to troubleshooting documentation that can help you correct the problem.
Under Information link, select the link for an update to open the support article that gives you important information about the update.
Click anywhere else on the update to open the Log Search pane. The query for the log search is predefined for that specific update. You can modify this query or create your own query to view detailed information.
View missing updates
Select Missing updates to view the list of updates that are missing from your machines. Each update is listed and can be selected. Information about the number of machines that require the update, operating system details, and a link for more information are all shown. The Log Search pane also shows more details about the updates.
Work with update classifications
The following tables list the supported update classifications in Update Management, with a definition for each classification.
|Critical updates||Updates for specific problems that address critical, non-security-related bugs.|
|Security updates||Updates for product-specific, security-related issues.|
|Update rollups||Sets of hotfixes that are packaged together for easy deployment.|
|Feature packs||New product features that are distributed outside a product release.|
|Service packs||Sets of hotfixes that are applied to an application.|
|Definition updates||Updates to virus or other definition files.|
|Tools||Utilities or features that help complete one or more tasks.|
|Updates||Updates to applications or files that are installed currently.|
|Critical and security updates||Updates for a specific problem or a product-specific, security-related issue.|
|Other updates||All other updates that aren't critical in nature or that aren't security updates.|
For Linux, Update Management can distinguish between critical updates and security updates in the cloud while displaying assessment data. (This granularity is possible because of data enrichment in the cloud.) For patching, Update Management relies on classification data available on the machine. Unlike other distributions, CentOS doesn't have this information available in the RTM versions of the product. If you have CentOS machines configured to return security data for the following command, Update Management can patch based on classifications:
sudo yum -q --security check-update
There's currently no supported method to enable native classification-data availability on CentOS. At this time, only best-effort support is provided to customers who have enabled this functionality on their own.
To classify updates on Red Hat Enterprise version 6, you need to install the yum-security plugin. On Red Hat Enterprise Linux 7, the plugin is already a part of yum itself, there is no need to install anything. For further information, see the following Red Hat knowledge article.
The next phase in the process is to deploy updates to non-compliant machines and review deployment results.