Update: Microsoft will be moving away from UserVoice sites on a product-by-product basis throughout the 2021 calendar year. We will leverage 1st party solutions for customer feedback. Learn more here.

Update Management

Please take a few minutes to submit your idea or vote up an existing idea. All of the feedback you share in these forums will be monitored and reviewed by the Update Management engineering team.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Updates older than 30 days Tile - We need that back

    Updates older than 30 days Tile - We need that back for Windows and Linux. This helps operations knock out the low hanging trouble-makers

    16 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  General  ·  Flag idea as inappropriate…  ·  Admin →
  2. Azure Update Management - Critical and Security Patching on CentOS

    If Azure Update Management is able to identify Critical and Security Patching on CentOS, why it relies on "yum -q --security check-update" to install them? I would like to suggest to instead of using that command, the automation can just get all the packages and the version it needs to update and do it by yum install package-version package2-version

    12 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Deployments  ·  Flag idea as inappropriate…  ·  Admin →

    Update Management solution on Automation is a wrapper around your machine’s OS package manager – like YUM on CentOS. The solution doesn’t reinvent the wheel and instead utilizes the underpinnings of the OS.

    The CentOS yum repositories do not contain the necessary metadata to indicate if they are security updates or not. This is by design and not within Microsoft control. So running “sudo yum -q —security check-update” on a CentOS client will not install the patches, and as that is what we do in our solution selecting only Security and Critical patches will not work.

    The reason we can display the classifications of the missing patches in our Solution is due to “data enrichment in the cloud”. As CentOS is essentially a free version of RedHat, what our solution does is to “enrich” the information we hold in cloud using the RedHat classification information. That means we can show…

  • Don't see your idea?

Update Management

Categories

Feedback and Knowledge Base