{"id":79331,"date":"2026-04-01T11:17:35","date_gmt":"2026-04-01T05:47:35","guid":{"rendered":"https:\/\/www.tothenew.com\/blog\/?p=79331"},"modified":"2026-04-06T10:55:46","modified_gmt":"2026-04-06T05:25:46","slug":"patching-azure-virtual-machines-from-aws-systems-manager-using-hybrid-activation","status":"publish","type":"post","link":"https:\/\/www.tothenew.com\/blog\/patching-azure-virtual-machines-from-aws-systems-manager-using-hybrid-activation\/","title":{"rendered":"Patching Azure Virtual Machines from AWS Systems Manager using Hybrid Activation"},"content":{"rendered":"<h1><span style=\"color: #000000;\">Patching Azure VMs from AWS Systems Manager using Hybrid Activation<\/span><\/h1>\n<p><span style=\"color: #000000;\">Each cloud platform provides its own native tools, which can lead to fragmented processes and increased administrative overhead. To address this challenge, AWS Systems Manager (SSM) offers a powerful solution through its Hybrid Activation feature. This capability allows non-AWS machines, such as Azure Virtual Machines (VMs), to be registered as managed instances within AWS.<br \/>\n<\/span><span style=\"color: #000000;\">Once registered, these Azure VMs can be managed centrally using AWS Systems Manager\u2014just like Amazon EC2 instances\u2014enabling streamlined patching, monitoring, and automation from a single interface.<\/span><\/p>\n<p><span style=\"color: #000000;\">This blog provides a step-by-step guide to patch Azure Virtual Machines using AWS Systems Manager through Hybrid Activation.<\/span><\/p>\n<h1><span style=\"color: #000000;\"><strong>Pre-requisites<br \/>\n<\/strong><span style=\"font-size: 16px;\">Before beginning the setup, ensure the following requirements are met:<\/span><\/span><\/h1>\n<ul>\n<li><span style=\"color: #000000;\"><strong>AWS Account Access<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">An active AWS account with sufficient permissions for:<\/span><br \/>\n<span style=\"color: #000000;\">AWS Systems Manager<\/span><br \/>\n<span style=\"color: #000000;\">IAM (Identity and Access Management)<\/span><br \/>\n<span style=\"color: #000000;\">Hybrid Activation<\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>SSM Agent Installation Permissions<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">An IAM role with the policy:<\/span><br \/>\n<span style=\"color: #000000;\">AmazonSSMManagedInstanceCore attached<\/span><\/li>\n<li><strong><span style=\"color: #000000;\">Server Access<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">SSH access for Linux VMs<\/span><br \/>\n<span style=\"color: #000000;\">RDP access for Windows VMs<\/span><\/li>\n<\/ul>\n<h1><span style=\"color: #000000;\"><strong>Solution Architecture Diagram:<br \/>\n<\/strong><\/span><\/h1>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79297\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-17-00-22-1024x623.png\" alt=\"im1\" width=\"679\" height=\"413\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-17-00-22-1024x623.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-17-00-22-300x183.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-17-00-22-768x468.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-17-00-22-624x380.png 624w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-17-00-22.png 1038w\" sizes=\"(max-width: 679px) 100vw, 679px\" \/><\/p>\n<h1><strong><span style=\"color: #000000;\"><br \/>\nStep-by-Step Procedure:<\/span><\/strong><\/h1>\n<p><strong><span style=\"color: #000000;\">Step 1: Create Hybrid Activation in AWS<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">To begin, we need to generate an Activation Code and Activation ID.<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Go to the <strong>AWS Console<\/strong> (https:\/\/ap-south-1.console.aws.amazon.com\/systems-manager\/home)<\/span><\/li>\n<li><span style=\"color: #000000;\">Open <strong>AWS Systems Manager<\/strong>.<\/span><\/li>\n<li><span style=\"color: #000000;\">In the left panel click:<\/span><br \/>\n<span style=\"color: #000000;\">Click <strong>Create activation<\/strong>.<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79321\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-00-02.png\" alt=\"img3\" width=\"1477\" height=\"346\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-00-02.png 1789w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-00-02-300x70.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-00-02-1024x240.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-00-02-768x180.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-00-02-1536x360.png 1536w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-00-02-624x146.png 624w\" sizes=\"(max-width: 1477px) 100vw, 1477px\" \/><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-79322\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-05-07.png\" alt=\"\" width=\"921\" height=\"487\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-05-07.png 1237w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-05-07-300x159.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-05-07-1024x541.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-05-07-768x406.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-05-07-624x330.png 624w\" sizes=\"(max-width: 921px) 100vw, 921px\" \/><\/p>\n<p><span style=\"color: #000000;\"><strong>Note(Activation Expiry date):<\/strong> This date specifies when the activation expires. If you want to register additional managed instances after the expiry date, you must create a new activation. This expiry date has no impact on already registered and running instances.<br \/>\n<\/span><span style=\"color: #000000;\">After you have entered the details, click Create Activation, Activation-Code and Activation-ID will be created.<br \/>\n<\/span><span style=\"color: #000000;\">Save this info, as it will be not generated again:<br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79323\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-07-56.png\" alt=\"img3\" width=\"990\" height=\"120\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-07-56.png 850w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-07-56-300x37.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-07-56-768x94.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-07-56-624x76.png 624w\" sizes=\"(max-width: 990px) 100vw, 990px\" \/><\/p>\n<p><span style=\"color: #000000;\"><strong>Step 2: Script to Install SSM Agent on Azure Virtual Machines<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">To enable AWS Systems Manager integration, install and register the SSM Agent on each Azure VM.<\/span><br \/>\n<span style=\"color: #000000;\">Below is a <strong>script (bulk_ssm_install.sh)<\/strong> that:<\/span><br \/>\n<span style=\"color: #000000;\">Downloads the <strong>SSM Agent<\/strong><\/span><br \/>\n<strong><span style=\"color: #000000;\">Installs it<\/span><\/strong><br \/>\n<span style=\"color: #000000;\"><strong>Registers<\/strong> the VM with <strong>AWS Systems Manager<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">After running this script, the machine (for example an Azure VM) will appear in AWS Systems Manager as a Managed Instance.<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><span style=\"color: #000000;\">#!\/bin\/bash<\/span><\/p>\n<p><span style=\"color: #000000;\">set -e<\/span><\/p>\n<p><span style=\"color: #000000;\">echo &#8220;\u27a1 Downloading Amazon SSM Agent package&#8230;&#8221;<\/span><br \/>\n<span style=\"color: #000000;\">wget -q https:\/\/amazon-ssm-ap-south-1.s3.ap-south-1.amazonaws.com\/latest\/debian_amd64\/amazon-ssm-agent.deb -O \/tmp\/amazon-ssm-agent.deb<\/span><\/p>\n<p><span style=\"color: #000000;\">echo &#8220;\u27a1 Installing Amazon SSM Agent&#8230;&#8221;<\/span><br \/>\n<span style=\"color: #000000;\">sudo dpkg -i \/tmp\/amazon-ssm-agent.deb<\/span><\/p>\n<p><span style=\"color: #000000;\">echo &#8220;\u27a1 Enabling amazon-ssm-agent service&#8230;&#8221;<\/span><br \/>\n<span style=\"color: #000000;\">sudo systemctl enable amazon-ssm-agent<\/span><\/p>\n<p><span style=\"color: #000000;\">echo &#8220;\u27a1 Registering SSM Agent&#8230;&#8221;<\/span><br \/>\n<span style=\"color: #000000;\">sudo amazon-ssm-agent -register \\<\/span><br \/>\n<span style=\"color: #000000;\">-code &#8220;ACTIVATION_CODE&#8221; \\<\/span><br \/>\n<span style=\"color: #000000;\">-id &#8220;ACTIVATION_ID&#8221; \\<\/span><br \/>\n<span style=\"color: #000000;\">-region &#8220;ap-south-1&#8221;<\/span><\/p>\n<p><span style=\"color: #000000;\">echo &#8220;\u27a1 Restarting SSM Agent&#8230;&#8221;<\/span><br \/>\n<span style=\"color: #000000;\">sudo systemctl restart amazon-ssm-agent<\/span><\/p>\n<p><span style=\"color: #000000;\">echo &#8220;\u2714 SSM Agent installation &amp; registration completed successfully&#8221;<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"color: #000000;\"><strong>Step 3: Automating Installation Across Multiple VMs<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">To install the <strong>SSM Agent<\/strong> on multiple Azure VMs, follow these steps:<\/span><\/p>\n<p><strong><span style=\"color: #000000;\">1. Create a CSV File<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">Prepare a <strong>file (vm_list_cpt_dev.csv)<\/strong> with VM details.<\/span><br \/>\n<span style=\"color: #000000;\">Note: The <strong>vm_list_cpt_dev.csv file<\/strong> will be like below format:<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><span style=\"color: #000000;\">vm_name,resource_group<\/span><br \/>\n<span style=\"color: #000000;\">vm1,rg1<\/span><br \/>\n<span style=\"color: #000000;\">vm2,rg2<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79324\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-12-08.png\" alt=\"img5\" width=\"541\" height=\"251\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-12-08.png 666w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-12-08-300x139.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-12-08-624x290.png 624w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><\/p>\n<p><strong><span style=\"color: #000000;\">2. Bulk installation using below Automation Script<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">Below automation <strong>script (run_updates.sh)<\/strong> reads the <strong>CSV<\/strong> file and executes the installation script on each VM using Azure CLI.<\/span><br \/>\n<span style=\"color: #000000;\">This script reads VM list csv file and executes (bulk_ssm_install.sh) on each VM. This enables bulk deployment of the SSM Agent across multiple Azure VMs efficiently.<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><span style=\"color: #000000;\">#!\/bin\/bash<\/span><\/p>\n<p><span style=\"color: #000000;\">SCRIPT_FILE=&#8221;bulk_ssmvm_install.sh&#8221;<\/span><\/p>\n<p><span style=\"color: #000000;\">if [ ! -f &#8220;$SCRIPT_FILE&#8221; ]; then<\/span><br \/>\n<span style=\"color: #000000;\">echo &#8220;Script $SCRIPT_FILE not found!&#8221;<\/span><br \/>\n<span style=\"color: #000000;\">exit 1<\/span><br \/>\n<span style=\"color: #000000;\">fi<\/span><\/p>\n<p><span style=\"color: #000000;\">while IFS=, read -r vm rg<\/span><br \/>\n<span style=\"color: #000000;\">do<\/span><br \/>\n<span style=\"color: #000000;\">if [ &#8220;$vm&#8221; != &#8220;vm_name&#8221; ]; then<\/span><br \/>\n<span style=\"color: #000000;\">echo &#8220;Running script on VM: $vm in Resource Group: $rg&#8221;<\/span><br \/>\n<span style=\"color: #000000;\">az vm run-command invoke \\<\/span><br \/>\n<span style=\"color: #000000;\">&#8211;command-id RunShellScript \\<\/span><br \/>\n<span style=\"color: #000000;\">&#8211;name &#8220;$vm&#8221; \\<\/span><br \/>\n<span style=\"color: #000000;\">&#8211;resource-group &#8220;$rg&#8221; \\<\/span><br \/>\n<span style=\"color: #000000;\">&#8211;scripts @&#8221;$SCRIPT_FILE&#8221; \\<\/span><br \/>\n<span style=\"color: #000000;\">&#8211;output table<\/span><br \/>\n<span style=\"color: #000000;\">fi<\/span><br \/>\n<span style=\"color: #000000;\">done &lt; vm_list_cpt_dev.csv<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><span style=\"color: #000000;\"><br \/>\nStep 4: Resolve Common Patching Errors<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">During patching, issues such as <strong>dpkg<\/strong> errors or <strong>sudoers<\/strong> <strong>misconfiguration<\/strong> may occur on some VMs.<\/span><br \/>\n<span style=\"color: #000000;\">To address these, use the following script (patching_error.sh):<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><span style=\"color: #000000;\">#!\/bin\/bash<\/span><\/p>\n<p><span style=\"color: #000000;\">set -e<\/span><\/p>\n<p><span style=\"color: #000000;\">dpkg &#8211;configure -a<\/span><br \/>\n<span style=\"color: #000000;\">chattr -i \/etc\/sudoers<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"color: #000000;\"><strong>Step 5: Set Azure Subscription Context<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">If your Azure account contains multiple subscriptions (e.g., Dev, Test, Production), set the correct subscription before executing scripts:<\/span><br \/>\n<span style=\"color: #000000;\">Azure accounts can have multiple subscriptions. This command tells Azure CLI which subscription you want to patch with before running other defined scripts.<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><span style=\"color: #000000;\">az account set &#8211;subscription &#8220;SUBSCRIPTION_NAME&#8221;<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"color: #000000;\">This helps stabilize the system before initiating patch operations. You will get the error on VM while doing scan only on AWS patch manager.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Step 6: Register Azure VMs in AWS Systems Manager<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Since all script setup has been done, now execute run_updates.sh to start the VM registering process:<br \/>\n.\/run_updates.sh<br \/>\n<\/span><\/p>\n<p><strong><span style=\"color: #000000;\">This will:<br \/>\n<\/span><\/strong><span style=\"color: #000000;\">Install the <strong>SSM Agent<\/strong><\/span><br \/>\n<span style=\"color: #000000;\"><strong>Register<\/strong> Azure VMs as Hybrid Managed Instances<\/span><br \/>\n<span style=\"color: #000000;\">Make them visible in <strong>AWS Systems Manager<\/strong><\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-79325\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-14-23.png\" alt=\"img6\" width=\"607\" height=\"251\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-14-23.png 607w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-14-23-300x124.png 300w\" sizes=\"(max-width: 607px) 100vw, 607px\" \/><\/p>\n<p><strong><span style=\"color: #000000;\">Perform Patch Scan or Patch Installation on Azure VMs:<br \/>\n<\/span><\/strong><span style=\"color: #000000;\">Now all the VMs are registered on AWS Systems Manager as <strong>Managed Nodes<\/strong>:<br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79326\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-19-43.png\" alt=\"img7\" width=\"1188\" height=\"414\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-19-43.png 1761w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-19-43-300x105.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-19-43-1024x357.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-19-43-768x268.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-19-43-1536x536.png 1536w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-19-43-624x218.png 624w\" sizes=\"(max-width: 1188px) 100vw, 1188px\" \/><\/p>\n<p><span style=\"color: #000000;\">Once your Azure VMs are registered in AWS Systems Manager as Hybrid Managed Instances, you can use Patch Manager to check for missing patches and apply updates. This step covers how to perform patch scanning only and after that patch\u00a0 installation.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Step 7: Perform Patch Scan<\/strong><br \/>\nHow to Run Patch Scan:<\/span><br \/>\n<span style=\"color: #000000;\">Open <strong>AWS Systems Manager Console<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Navigate to <strong>Patch Manager<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Click \u201cPatch Now\u201d<\/span><br \/>\n<span style=\"color: #000000;\">Select Operation Type: \u201c<strong>Scan<\/strong>\u201d and choose the option to Scan only. This will run a patch compliance check without applying patches.<\/span><br \/>\n<span style=\"color: #000000;\">Choose Target Instances i.e. select your registered Azure VMs by instance ID or by resource group tag (if you set one). If selecting Tag, then need to first apply tags on all VMs registered in AWS System Manager:<br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79328\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-24-57.png\" alt=\"img9\" width=\"895\" height=\"525\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-24-57.png 1228w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-24-57-300x176.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-24-57-1024x600.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-24-57-768x450.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-24-57-624x366.png 624w\" sizes=\"(max-width: 895px) 100vw, 895px\" \/><br \/>\n<span style=\"color: #000000;\"><br \/>\n<\/span><span style=\"color: #000000;\"><strong>Step 8: Start the Scan and Go to Systems Manager:<br \/>\nMonitor execution via:<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Run Command<\/span><br \/>\n<span style=\"color: #000000;\">Patch Compliance Dashboard<\/span><\/p>\n<p><span style=\"color: #000000;\">This provides visibility into patch status and compliance levels.<br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79329\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-29-24.png\" alt=\"img10\" width=\"1005\" height=\"535\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-29-24.png 1474w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-29-24-300x160.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-29-24-1024x545.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-29-24-768x409.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-29-24-624x332.png 624w\" sizes=\"(max-width: 1005px) 100vw, 1005px\" \/><\/p>\n<p><span style=\"color: #000000;\"><br \/>\n<\/span><strong><span style=\"color: #000000;\">Step 9: Patch Scan and Install (Apply Patches)<br \/>\n<\/span><\/strong><span style=\"color: #000000;\">This option scans the Azure VM for missing patches and then installs them automatically.<br \/>\nNavigate to <strong>Patch Manager<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Click <strong>Patch Now<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Select Operation Type: <strong>Scan and Install<\/strong><\/span><br \/>\n<span style=\"color: #000000;\">Choose <strong>target instances<\/strong><\/span><br \/>\n<span style=\"color: #000000;\"><strong>Execute<\/strong> the operation, once completed, it will show the status:<br \/>\n<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-79330\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-34-32.png\" alt=\"img11\" width=\"1029\" height=\"544\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-34-32.png 1472w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-34-32-300x159.png 300w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-34-32-1024x541.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-34-32-768x406.png 768w, \/blog\/wp-ttn-blog\/uploads\/2026\/03\/Screenshot-from-2026-03-30-19-34-32-624x330.png 624w\" sizes=\"(max-width: 1029px) 100vw, 1029px\" \/><\/p>\n<p><strong><span style=\"color: #000000;\">NOTE:<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">Monitor the patch job status in <strong>Systems Manager &gt; Run Command<\/strong> or <strong>Patch Compliance<\/strong>. Review detailed reports on which patches were installed successfully or if any failed.<\/span><\/p>\n<p><strong><span style=\"color: #000000;\">Step 10: Stop\/Start of VM:<\/span><\/strong><br \/>\n<span style=\"color: #000000;\">Once patching is completed, <strong>Stop\/Start the VMs<\/strong> for complete patch application, system stability.<\/span><\/p>\n<h1><strong><span style=\"color: #000000;\">Conclusion<\/span><\/strong><\/h1>\n<p><span style=\"color: #000000;\">By leveraging AWS Systems Manager Hybrid Activation, organizations can effectively manage and patch Azure Virtual Machines from a centralized platform. This approach reduces operational complexity, enhances consistency, and simplifies multi-cloud infrastructure management. <\/span><span style=\"color: #000000;\">Implementing this solution enables:<\/span><\/p>\n<p><span style=\"color: #000000;\">Unified patch management<\/span><br \/>\n<span style=\"color: #000000;\">Improved compliance visibility<\/span><br \/>\n<span style=\"color: #000000;\">Reduced manual intervention<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Patching Azure VMs from AWS Systems Manager using Hybrid Activation Each cloud platform provides its own native tools, which can lead to fragmented processes and increased administrative overhead. To address this challenge, AWS Systems Manager (SSM) offers a powerful solution through its Hybrid Activation feature. This capability allows non-AWS machines, such as Azure Virtual Machines [&hellip;]<\/p>\n","protected":false},"author":2261,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":8},"categories":[5877],"tags":[1853,248,3457,7895,474],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/79331"}],"collection":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/users\/2261"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/comments?post=79331"}],"version-history":[{"count":2,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/79331\/revisions"}],"predecessor-version":[{"id":79432,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/79331\/revisions\/79432"}],"wp:attachment":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/media?parent=79331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/categories?post=79331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/tags?post=79331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}