• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

UnixArena

  • Home
  • kubernetes
  • DevOps
    • Terraform
    • Jenkins
    • Docker
    • Openshift
      • OKD
    • Ansible engine
    • Ansible Tower
      • AWX
    • Puppet
  • Cloud
    • Azure
    • AWS
    • Openstack
    • Docker
  • VMware
    • vCloud Director
    • VMware-Guests
    • Vcenter Appliance 5.5
    • vC OPS
    • VMware SDDC
    • VMware vSphere 5.x
      • vSphere Network
      • vSphere DS
      • vShield Suite
    • VMware vSphere 6.0
    • VSAN
    • VMware Free Tools
  • Backup
    • Vembu BDR
    • Veeam
    • Nakivo
    • Azure Backup
    • Altaro VMBackup
    • Spinbackup
  • Tutorials
    • Openstack Tutorial
    • Openstack Beginner’s Guide
    • VXVM-Training
    • ZFS-Tutorials
    • NetApp cDot
    • LVM
    • Cisco UCS
    • LDOM
    • Oracle VM for x86
  • Linux
    • How to Articles
    • Q&A
    • Networking
    • RHEL7
  • DevOps Instructor-led Training
  • Contact

Patch Windows & Linux using AWS SSM Patch Manager

December 9, 2021 By Cloud_Devops Leave a Comment

How to use AWS SSM Patch Manager? AWS SSM Patch Manager provides a secure patching experience for both Windows and Linux operating systems. Like other AWS services, AWS SSM can be easily integrated with other services like AWS Identity and Access Management (IAM), AWS CloudTrail, and Amazon EventBridge for notification and the ability to audit usage. Overall, this AWS native solution brings centralized management for patching your fleet of Amazon EC2 Windows and Linux instances or your on-premises servers and virtual machines (VMs). To schedule the reoccurring patching using SSM, check out this article.

Note: AWS does not test patches for Windows Server or Linux before making them available in Patch Manager. Also, Patch Manager doesn’t support upgrading major versions of operating systems, such as Windows Server 2016 to Windows Server 2019, or RHEL 7 to RHEL 8.

How Patch Manager works ?

  1. Use pre-defined patch baseline, or create your own baseline based on your complaince requirement.
  2. Organize instances into patch groups using tags (Optional)
  3. Automate the patching schedule for each environment by using Maintenance Windows
  4. Monitor patch status to ensure compliance. This can be tracked in complaince tab for overall environment.

Predefined Patch Baseline:

1. Login to AWS console with required SSM privileges.

2. Navigate to Systems Manager.

3. In Systems Manager – > Under Node Management, Click Patch Manager.

AWS System Manager - Patch Manager
AWS System Manager – Patch Manager

4. Click on “view predefined patch baselines“.

AWS SSM - Patch Manager - View Pre-defined Baselines
AWS SSM – Patch Manager – View Pre-defined Baselines

5. Here you can see the pre-defined default patch baselines for windows and Linux operating systems including Redhat.

Pre-defined Patch Baselines - AWS SSM
Pre-defined Patch Baselines – AWS SSM

These patch baselines can be directly used to patch the EC2 instances and ONPREM instances.

Default Patch baselines

Operating SystemsPatch Baselines
Microsoft Windows ServersAWS-DefaultPatchBaseline
SUSE LinuxAWS-SuseDefaultPatchBaseline
Redhat Enterprise LinuxAWS-RedHatDefaultPatchBaseline
Mac OSAWS-MacOSDefaultPatchBaseline
Amazon LinuxAWS-AmazonLinuxDefaultPatchBaseline
Amazon Linux 2AWS-AmazonLinux2DefaultPatchBaseline
Ubuntu AWS-UbuntuDefaultPatchBaseline
Oracle LinuxAWS-OracleLinuxDefaultPatchBaseline
DebianAWS-DebianDefaultPatchBaseline
CentOSAWS-CentOSDefaultPatchBaseline
Raspberry Pi OSAWS-RaspbianDefaultPatchBaseline
AWS Provided default Patch Baseline for EC2 & ON_PREM instances

How to Patch Windows/Linux instances using the default patch baseline ? (AD-HOC)

1. From the pre-defined patch baseline, Click on “AWS-DefaultPatchBaseline” which is used to patch the windows instances. Similarly, you can check for the respective Linux flavors to know what patches will be installed as part of the default patch baseline.

2. Here you can see the type of patches which will be updated when you use the default baseline. Default baseline installs critical updates and security updates only. If you would like to customize this, you need to create your own patch baseline. The same applies to Linux patch baselines as well.

Windows Default Patch Baseline
Windows Default Patch Baseline

3. Go back to patch manager using breadcrumb navigation. Click on “Patch now“.

Pre-defined Patch Baselines - AWS SSM
Pre-defined Patch Baselines – AWS SSM

4. Here is the ad-hoc method to install the patches on the instances. AWS automatically selects the default baseline document for the respective instance’s OS type.

  • Select patching operation as “Scan and Install“
  • Schedule a reboot time.
ADHOC OS Patching in SSM
ADHOC OS Patching in SSM

5. Specify the target environment using tags or resource groups. Here I have used the tag “Environment: DEV”. Once you have submitted the job, it will create a job id.

Instances to Patch - Target Environment
Instances to Patch – Target Environment

6. Here is the association id for the patching task. You can click the “association ID” link to check the target servers.

Association execution Patching Summary
Association execution Patching Summary

The SSM state manager invokes the run command to install the patches.

Run Command status
Run Command status

7. Once the job is completed, you can view the job output.

Run Command status
Run Command status
Installed Patches List - windows
Installed Patches List – windows

We have successfully installed the patches on the OS instances using the “Patch now” ad-hoc method. In the upcoming article, will see how to group the instances using patch group, how to set the predefined maintenance window, and how to get the consolidated compliance view in the SSM dashboard.

Filed Under: AWS, Cloud, SSM Tagged With: Automation, Cloud, DevOps, Windows

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Follow UnixArena

  • Facebook
  • LinkedIn
  • Twitter

Copyright © 2025 · UnixArena ·

Go to mobile version