<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Windows servers patching with AWS EC2 Systems Manager	</title>
	<atom:link href="https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/</link>
	<description>100% Focus On AWS // 100% Customer Obsession</description>
	<lastBuildDate>Mon, 06 Apr 2020 10:36:21 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: Rutger Beyen		</title>
		<link>https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-43</link>

		<dc:creator><![CDATA[Rutger Beyen]]></dc:creator>
		<pubDate>Mon, 06 Apr 2020 10:36:21 +0000</pubDate>
		<guid isPermaLink="false">https://cloudar.be/?p=3733#comment-43</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-42&quot;&gt;pradeep&lt;/a&gt;.

Hello Pradeep.

As far as my knowledge goes, there&#039;s no such one-click solution available.
However, what we do here at Cloudar is running the SSM Maintenance Window task with the option &quot;Enable SNS notifications&quot; set to true. This will cause the results of the Maintenance Window to be delivered to an SNS topic. From this SNS topic you can either subscribe your email address, or a Lambda function which can further sanitize and cleanup the output according to your preferences, as by default you will get an ugly JSON.
Alternatively you can query your instance patch results using the CLI with &#039;aws ssm describe-instance-patches&#039; or &#039;aws ssm describe-instance-patch-states&#039;.

Regards,
Rutger]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-42">pradeep</a>.</p>
<p>Hello Pradeep.</p>
<p>As far as my knowledge goes, there&#8217;s no such one-click solution available.<br />
However, what we do here at Cloudar is running the SSM Maintenance Window task with the option &#8220;Enable SNS notifications&#8221; set to true. This will cause the results of the Maintenance Window to be delivered to an SNS topic. From this SNS topic you can either subscribe your email address, or a Lambda function which can further sanitize and cleanup the output according to your preferences, as by default you will get an ugly JSON.<br />
Alternatively you can query your instance patch results using the CLI with &#8216;aws ssm describe-instance-patches&#8217; or &#8216;aws ssm describe-instance-patch-states&#8217;.</p>
<p>Regards,<br />
Rutger</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: pradeep		</title>
		<link>https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-42</link>

		<dc:creator><![CDATA[pradeep]]></dc:creator>
		<pubDate>Mon, 06 Apr 2020 09:43:44 +0000</pubDate>
		<guid isPermaLink="false">https://cloudar.be/?p=3733#comment-42</guid>

					<description><![CDATA[Hi There,

Is there any way after scanning the instances, Could we get the result to our Inbox. 
For example like only Non-complaint issues in a particular instance.]]></description>
			<content:encoded><![CDATA[<p>Hi There,</p>
<p>Is there any way after scanning the instances, Could we get the result to our Inbox.<br />
For example like only Non-complaint issues in a particular instance.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Rutger Beyen		</title>
		<link>https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-41</link>

		<dc:creator><![CDATA[Rutger Beyen]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 12:00:16 +0000</pubDate>
		<guid isPermaLink="false">https://cloudar.be/?p=3733#comment-41</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-40&quot;&gt;Ritul&lt;/a&gt;.

Hello Ritul,
Because the Windows Update API is used to download and install patches on the instances, all Group Policy settings for Windows Update that you have in place are respected. There are no Group Policy settings required to use Patch Manager, but any settings that you have defined will be applied, such as to direct instances to a WSUS server.
Regards,
Rutger]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-40">Ritul</a>.</p>
<p>Hello Ritul,<br />
Because the Windows Update API is used to download and install patches on the instances, all Group Policy settings for Windows Update that you have in place are respected. There are no Group Policy settings required to use Patch Manager, but any settings that you have defined will be applied, such as to direct instances to a WSUS server.<br />
Regards,<br />
Rutger</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ritul		</title>
		<link>https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-40</link>

		<dc:creator><![CDATA[Ritul]]></dc:creator>
		<pubDate>Tue, 18 Sep 2018 06:53:42 +0000</pubDate>
		<guid isPermaLink="false">https://cloudar.be/?p=3733#comment-40</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-39&quot;&gt;Rutger Beyen&lt;/a&gt;.

Hey Rutger
How to configure a WSUS server to serve as a patch repository and configure instances to target that WSUS server ?
Please let me know the steps.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-39">Rutger Beyen</a>.</p>
<p>Hey Rutger<br />
How to configure a WSUS server to serve as a patch repository and configure instances to target that WSUS server ?<br />
Please let me know the steps.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Rutger Beyen		</title>
		<link>https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-39</link>

		<dc:creator><![CDATA[Rutger Beyen]]></dc:creator>
		<pubDate>Mon, 22 Jan 2018 14:54:00 +0000</pubDate>
		<guid isPermaLink="false">https://cloudar.be/?p=3733#comment-39</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-38&quot;&gt;Stuart Lupton&lt;/a&gt;.

Hello Stuart,
It depends on which &quot;Document&quot; you want the SSM Maintenance Window to execute, but it could be as simple as InstallMissingWindowsUpdates. It doesn&#039;t necessarily has to be a Run command to compare you instance against a baseline.
The Windows Update API is used to download and install patches. By default Windows downloads all patches from the Windows Update site. As a result, the instance must be able to reach the Microsoft Windows Update site or patching will fail. Alternatively, you can configure a WSUS server to serve as a patch repository and configure your instances to target that WSUS server.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-38">Stuart Lupton</a>.</p>
<p>Hello Stuart,<br />
It depends on which &#8220;Document&#8221; you want the SSM Maintenance Window to execute, but it could be as simple as InstallMissingWindowsUpdates. It doesn&#8217;t necessarily has to be a Run command to compare you instance against a baseline.<br />
The Windows Update API is used to download and install patches. By default Windows downloads all patches from the Windows Update site. As a result, the instance must be able to reach the Microsoft Windows Update site or patching will fail. Alternatively, you can configure a WSUS server to serve as a patch repository and configure your instances to target that WSUS server.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Stuart Lupton		</title>
		<link>https://cloudar.be/awsblog/windows-servers-patching-with-aws-ec2-systems-manager/#comment-38</link>

		<dc:creator><![CDATA[Stuart Lupton]]></dc:creator>
		<pubDate>Sat, 20 Jan 2018 19:17:38 +0000</pubDate>
		<guid isPermaLink="false">https://cloudar.be/?p=3733#comment-38</guid>

					<description><![CDATA[Does this simply trigger a update and install command to the windows instance?

Does the client then have to have outbound 443 to msft?

Can you integrate with existing WUS servers?]]></description>
			<content:encoded><![CDATA[<p>Does this simply trigger a update and install command to the windows instance?</p>
<p>Does the client then have to have outbound 443 to msft?</p>
<p>Can you integrate with existing WUS servers?</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
