Predefined and custom patch baselines
Patch Manager, a capability of AWS Systems Manager, provides predefined patch baselines for each
of the operating systems supported by Patch Manager. You can use these baselines as they
are currently configured (you can't customize them) or you can create your own
custom patch baselines. Custom patch baselines allows you greater control over which
patches are approved or rejected for your environment. Also, the predefined
baselines assign a compliance level of Unspecified
to all patches
installed using those baselines. For compliance values to be assigned, you can
create a copy of a predefined baseline and specify the compliance values you want to
assign to patches. For more information, see Custom baselines and Working with custom patch
baselines.
Note
The information in this topic applies no matter which method or type of configuration you are using for your patching operations:
-
A patch policy configured in Quick Setup
-
A Host Management option configured in Quick Setup
-
A maintenance window to run a patch
Scan
orInstall
task -
An on-demand Patch now operation
Predefined baselines
The following table describes the predefined patch baselines provided with Patch Manager.
For information about which versions of each operating system Patch Manager supports, see Patch Manager prerequisites.
Name | Supported operating system | Details |
---|---|---|
|
AlmaLinux |
Approves all operating system patches that are classified as "Security" and that have a severity level of "Critical" or "Important". Also approves all patches that are classified as "Bugfix". Patches are auto-approved 7 days after they are released or updated.¹ |
|
Amazon Linux 1 |
Approves all operating system patches that are classified as "Security" and that have a severity level of "Critical" or "Important". Also auto-approves all patches with a classification of "Bugfix". Patches are auto-approved 7 days after they are released or updated.¹ |
AWS-AmazonLinux2DefaultPatchBaseline |
Amazon Linux 2 | Approves all operating system patches that are classified as "Security" and that have a severity level of "Critical" or "Important". Also approves all patches with a classification of "Bugfix". Patches are auto-approved 7 days after release.¹ |
AWS-AmazonLinux2022DefaultPatchBaseline |
Amazon Linux 2022 |
Approves all operating system patches that are classified as "Security" and that have a severity level of "Critical" or "Important". Patches are auto-approved seven days after release. Also approves all patches with a classification of "Bugfix" seven days after release. |
AWS-AmazonLinux2023DefaultPatchBaseline |
Amazon Linux 2023 |
Approves all operating system patches that are classified as "Security" and that have a severity level of "Critical" or "Important". Patches are auto-approved seven days after release. Also approves all patches with a classification of "Bugfix" seven days after release. |
AWS-CentOSDefaultPatchBaseline |
CentOS and CentOS Stream | Approves all updates 7 days after they become available, including nonsecurity updates. |
AWS-DebianDefaultPatchBaseline |
Debian Server | Immediately approves all operating system security-related patches that have a priority of "Required", "Important", "Standard," "Optional," or "Extra." There is no wait before approval because reliable release dates aren't available in the repositories. |
AWS-MacOSDefaultPatchBaseline |
macOS | Approves all operating system patches that are classified as "Security". Also approves all packages with a current update. |
AWS-OracleLinuxDefaultPatchBaseline |
Oracle Linux | Approves all operating system patches that are classified as "Security" and that have a severity level of "Important" or "Moderate". Also approves all patches that are classified as "Bugfix" 7 days after release. Patches are auto-approved 7 days after they are released or updated.¹ |
AWS-DefaultRaspbianPatchBaseline |
Raspberry Pi OS | Immediately approves all operating system security-related patches that have a priority of "Required", "Important", "Standard," "Optional," or "Extra." There is no wait before approval because reliable release dates aren't available in the repositories. |
|
Red Hat Enterprise Linux (RHEL) |
Approves all operating system patches that are classified as "Security" and that have a severity level of "Critical" or "Important". Also approves all patches that are classified as "Bugfix". Patches are auto-approved 7 days after they are released or updated.¹ |
|
Rocky Linux |
Approves all operating system patches that are classified as "Security" and that have a severity level of "Critical" or "Important". Also approves all patches that are classified as "Bugfix". Patches are auto-approved 7 days after they are released or updated.¹ |
AWS-SuseDefaultPatchBaseline |
SUSE Linux Enterprise Server (SLES) | Approves all operating system patches that are classified as "Security" and with a severity of "Critical" or "Important". Patches are auto-approved 7 days after they are released or updated.¹ |
|
Ubuntu Server |
Immediately approves all operating system security-related patches that have a priority of "Required", "Important", "Standard," "Optional," or "Extra." There is no wait before approval because reliable release dates aren't available in the repositories. |
AWS-DefaultPatchBaseline |
Windows Server |
Approves all Windows Server operating system patches that are classified as "CriticalUpdates" or "SecurityUpdates" and that have an MSRC severity of "Critical" or "Important". Patches are auto-approved 7 days after they are released or updated.² |
AWS-WindowsPredefinedPatchBaseline-OS |
Windows Server |
Approves all Windows Server operating system patches that are classified as "CriticalUpdates" or "SecurityUpdates" and that have an MSRC severity of "Critical" or "Important". Patches are auto-approved 7 days after they are released or updated.² |
AWS-WindowsPredefinedPatchBaseline-OS-Applications |
Windows Server | For the Windows Server operating system, approves all patches that are classified as "CriticalUpdates" or "SecurityUpdates" and that have an MSRC severity of "Critical" or "Important". For applications released by Microsoft, approves all patches. Patches for both OS and applications are auto-approved 7 days after they are released or updated.² |
¹ For Amazon Linux 1 and Amazon Linux 2, the 7-day wait before patches are auto-approved
is calculated from an Updated Date
value in
updateinfo.xml
, not a Release Date
value.
Various factors can affect the Updated Date
value. Other operating
systems handle release and update dates differently. For information to help you
avoid unexpected results with auto-approval delays, see How package release dates and update
dates are calculated.
² For Windows Server, default baselines include a 7-day auto-approval delay. To install a patch within 7 days after release, you must create a custom baseline.
Custom baselines
Use the following information to help you create custom patch baselines to meet your patching goals.
Using auto-approvals in custom baselines
If you create your own patch baseline, you can choose which patches to auto-approve by using the following categories.
-
Operating system: Windows Server, Amazon Linux, Ubuntu Server, and so on.
-
Product name (for operating systems): For example, RHEL 6.5, Amazon Linux 2014.09, Windows Server 2012, Windows Server 2012 R2, and so on.
-
Product name (for applications released by Microsoft on Windows Server only): For example, Word 2016, BizTalk Server, and so on.
-
Classification: For example, Critical updates, Security updates, and so on.
-
Severity: For example, Critical, Important, and so on.
For each approval rule that you create, you can choose to specify an auto-approval delay or specify a patch approval cutoff date.
Note
Because it's not possible to reliably determine the release dates of update packages for Ubuntu Server, the auto-approval options aren't supported for this operating system.
An auto-approval delay is the number of days to wait after the patch was
released or last updated, before the patch is automatically approved for
patching. For example, if you create a rule using the
CriticalUpdates
classification and configure it for 7 days
auto-approval delay, then a new critical patch released on July 7 is
automatically approved on July 14.
If a Linux repository doesn’t provide release date information for packages, Systems Manager uses the build time of the package as the auto-approval delay for Amazon Linux 1, Amazon Linux 2, RHEL, and CentOS. If the system isn't able to find the build time of the package, Systems Manager treats the auto-approval delay as having a value of zero.
When you specify an auto-approval cutoff date, Patch Manager automatically applies all patches released or last updated on or before that date. For example, if you specify July 7, 2023 as the cutoff date, no patches released or last updated on or after July 8, 2023 are installed automatically.
When you create a custom patch baseline, you can specify a compliance
severity level for patches approved by that patch baseline, such as
Critical
or High
. If the patch state of any
approved patch is reported as Missing
, then the patch
baseline's overall reported compliance severity is the severity level you
specified.
Additional information for creating patch baselines
Keep the following in mind when you create a patch baseline:
-
Patch Manager provides one predefined patch baseline for each supported operating system. These predefined patch baselines are used as the default patch baselines for each operating system type unless you create your own patch baseline and designate it as the default for the corresponding operating system type.
Note
For Windows Server, three predefined patch baselines are provided. The patch baselines
AWS-DefaultPatchBaseline
andAWS-WindowsPredefinedPatchBaseline-OS
support only operating system updates on the Windows operating system itself.AWS-DefaultPatchBaseline
is used as the default patch baseline for Windows Server managed nodes unless you specify a different patch baseline. The configuration settings in these two patch baselines are the same. The newer of the two,AWS-WindowsPredefinedPatchBaseline-OS
, was created to distinguish it from the third predefined patch baseline for Windows Server. That patch baseline,AWS-WindowsPredefinedPatchBaseline-OS-Applications
, can be used to apply patches to both the Windows Server operating system and supported applications released by Microsoft. -
By default, Windows Server 2019 and Windows Server 2022 remove updates that are replaced by later updates. As a result, if you use the
ApproveUntilDate
parameter in a Windows Server patch baseline, but the date selected in theApproveUntilDate
parameter is before the date of the latest patch, then the new patch isn't installed when the patching operation runs. For more information about Windows Server patching rules, see the Windows Server tab in How security patches are selected.This means that the managed node is compliant in terms of Systems Manager operations, even though a critical patch from the previous month might not be installed. This same scenario can occur when using the
ApproveAfterDays
parameter. Because of the Microsoft superseded patch behavior, it is possible to set a number (generally greater than 30 days) so that patches for Windows Server are never installed if the latest available patch from Microsoft is released before the number of days inApproveAfterDays
has elapsed. -
For on-premises servers and virtual machines (VMs), Patch Manager attempts to use your custom default patch baseline. If no custom default patch baseline exists, the system uses the predefined patch baseline for the corresponding operating system.
-
If a patch is listed as both approved and rejected in the same patch baseline, the patch is rejected.
-
A managed node can have only one patch baseline defined for it.
-
The formats of package names you can add to lists of approved patches and rejected patches for a patch baseline depend on the type of operating system you're patching.
For information about accepted formats for lists of approved patches and rejected patches, see Package name formats for approved and rejected patch lists.
If you are using a patch policy configuration in Quick Setup, updates you make to custom patch baselines are synchronized with Quick Setup once an hour.
If a custom patch baseline that was referenced in a patch policy is deleted, a banner displays on the Quick Setup Configuration details page for your patch policy. The banner informs you that the patch policy references a patch baseline that no longer exists, and that subsequent patching operations will fail. In this case, return to the Quick Setup Configurations page, select the Patch Manager configuration , and choose Actions, Edit configuration. The deleted patch baseline name is highlighted, and you must select a new patch baseline for the affected operating system.
For information about creating a patch baseline, see Working with custom patch baselines and Tutorial: Patch a server environment using the AWS CLI.