Edit

Share via


Install Arc agents on SCVMM VMs

In this article, you learn how to install Azure connected machine agents for SCVMM VMs. This installation is a prerequisite for using Azure services to secure, patch, and monitor your VMs. By installing these agents, you can also leverage Azure Arc benefits such as Extended Security Updates, pay-as-you-go licensing for Windows Server and SQL servers, and Software Attestation benefits.

You can install Arc agents on SCVMM VMs through various methods. Choose the method that best fits your deployment preferences:

  • Azure portal
  • Script-based manual installation
  • Programmatic methods such as Azure CLI, Azure PowerShell, Azure REST APIs, Azure SDKs, Terraform, Bicep, and ARM templates. The reference section of this documentation repository has information on the exact syntax.
  • Out-of-band methods such as using a Service Principal, System Center Configuration Manager script, System Center Configuration Manager custom task sequence, Group policy, and Ansible playbook.

Prerequisites

Before you install Arc agents at scale for SCVMM VMs, ensure the following conditions are met:

  • The SCVMM management server and the SCVMM console are in the same Long-Term Servicing Channel (LTSC) and Update Rollup (UR) version.
  • The SCVMM management server is in a Connected state and its associated Azure Arc resource bridge is in a Running state.
  • You have the Azure Arc SCVMM VM Contributor role or a custom Azure role with permissions to install Arc agents on the target machines.
  • All the target machines are:

Install Arc agents

This method works only if you're running:

  • SCVMM 2025, 2022 UR1 or later, and 2019 UR5 or later versions of SCVMM server or console.
  • VMs running Windows Server 2012 R2, 2016, 2019, 2022, 2025, Windows 10, and Windows 11.
  • For other SCVMM versions, Linux VMs, or Windows VMs running WS 2012 or earlier versions, install Arc agents through the script or out-of-band methods.

An administrator can install agents for multiple machines from the Azure portal if the machines share the same administrator credentials.

  1. Navigate to the SCVMM management servers blade on Azure Arc Center, and select the SCVMM management server resource.

  2. Select the machines you want to onboard to Arc at-scale and choose the Enable in Azure option.

  3. Select the Enable guest management checkbox to install Arc agents on the selected machines. By enabling this option, you can use Azure services such as Azure Update Manager, Azure Monitor, Microsoft Defender for Cloud, Azure Policy, Azure Automation, Change Tracking and Inventory, and more to secure, govern, patch, and monitor your virtual machines.

    Screenshot of virtual machines screen.

  4. If you enable guest management on any of your machines, based on your organization's network policies, choose the connectivity method for the Arc agents that runs in your SCVMM VMs to connect to Azure. The available options are Public endpoint, Proxy server, and Private endpoint.

    • To connect the Arc agent through a proxy, provide the proxy server details.
    • To connect the Arc agent through a private endpoint, follow these steps to set up Azure private link and provide the same details.

    Note

    Private endpoint connectivity is only available for Arc agent to Azure communications. For Arc resource bridge to Azure connectivity, Azure Private link isn't supported.

  5. Enter the administrator username and password for the machine. For Windows VMs, the account must be part of the local administrator group. For Linux VMs, it must be a root account.

  6. Select Enable to start the installation of the Arc agent on the specified machines. When the installation finishes, the Guest management column changes to Enabled for the machines with the Arc agent running. You can start using Azure services for these machines. These credentials aren't saved in Azure. They're used to install the Azure Arc agent and then discarded.

Next steps