Adjusting Systems Manager settings - AWS Systems Manager

Adjusting Systems Manager settings

The options on the Settings pages enable and configure features in the Systems Manager unified console. The options displayed depend on the account you are logged into and whether or not you have already set up Systems Manager.

Note

The options on the Settings page don't affect Systems Manager tools (formerly called capabilities).

Account setup settings

If Systems Manager is enabled, and if you are logged into an account that is not a member of Organizations or if the delegated administrator has not added your Organizations account to Systems Manager, the Account setup page shows the option to Disable Systems Manager. Disabling Systems Manager means Systems Manager doesn't display the unified console. All Systems Manager tools still function.

Organizational setup settings

On the Organizational setup tab, the Home Region section displays the AWS Region chosen as the home Region during setup. In multi-account and multi-Region environments that use AWS Organizations, Systems Manager automatically aggregates node data from all accounts and Regions to the home Region. Aggregating data in this way enables you to view node data across accounts and Regions in a single location.

Note

If you want to change the home Region, you must disable Systems Manager and enable it again. To disable Systems Manager, choose Disable.

The Organizational setup section displays the AWS organizational units and AWS Regions chosen during setup. To change which organizational units and Regions display node data in Systems Manager, choose Edit. For more information about setting up Systems Manager for Organizations, see Setting up AWS Systems Manager.

Feature configurations

The Feature configurations section allows you to enable and configure key Systems Manager capabilities that enhance node management across your organization. These features work together to provide automated management, compliance monitoring, and maintenance of your managed nodes.

You can configure these features during initial Systems Manager setup or modify them later through the Settings page. Each feature can be enabled or disabled independently based on your organization's requirements.

Default Host Management Configuration

Default Host Management Configuration (DHMC) automatically configures Amazon Elastic Compute Cloud (Amazon EC2) instances in your organization to be managed by Systems Manager. When enabled, DHMC ensures that new and existing EC2 instances have the necessary AWS Identity and Access Management (IAM) permissions and configurations to communicate with Systems Manager services.

DHMC provides the following benefits:

  • Automatic IAM role assignment - Ensures EC2 instances have the required IAM roles and policies to function as managed nodes

  • Drift remediation - Automatically corrects configuration drift when instances lose their managed node status

  • Simplified onboarding - Reduces manual configuration steps for new instances

  • Consistent configuration - Maintains uniform settings across your EC2 fleet

Configuring drift remediation frequency

Drift remediation automatically detects and corrects when EC2 instances lose their managed node configuration. You can configure how frequently Systems Manager checks for and remediates configuration drift.

To configure Default Host Management Configuration
  1. Open the AWS Systems Manager console at https://console.aws.amazon.com/systems-manager/.

  2. In the navigation pane, choose Settings.

  3. In the Feature configurations section, locate Default Host Management Configuration.

  4. To enable DHMC, turn on the toggle switch.

  5. For Drift remediation frequency, choose how often you want Systems Manager to check for and remediate configuration drift:

    • Daily - Checks and remediates drift once per day

    • Weekly - Checks and remediates drift once per week

    • Monthly - Checks and remediates drift once per month

  6. Choose Save.

Note

When you enable DHMC, Systems Manager creates the necessary IAM roles and policies in your account. These roles allow EC2 instances to communicate with Systems Manager services. For more information about the IAM roles created by DHMC, see Managing EC2 instances with Systems Manager.

Inventory metadata collection

Inventory metadata collection automatically gathers detailed information about your managed nodes, including installed applications, network configurations, system updates, and other system metadata. This information helps you maintain compliance, perform security analysis, and understand your infrastructure composition.

Inventory collection provides the following benefits:

  • Compliance monitoring - Track installed software and configurations for compliance reporting

  • Security analysis - Identify outdated software and potential security vulnerabilities

  • Asset management - Maintain an up-to-date inventory of your infrastructure

  • Query capabilities - Use collected data with Amazon Q Developer for natural language queries

Types of inventory data collected

When inventory metadata collection is enabled, Systems Manager collects the following types of information from your managed nodes:

  • Applications - Installed software packages and applications

  • Network configurations - Network interfaces, IP addresses, and network settings

  • System updates - Installed patches and available updates

  • System properties - Hardware specifications, operating system details, and system configurations

  • Services - Running services and their configurations

Configuring inventory collection frequency

You can configure how frequently Systems Manager collects inventory metadata from your managed nodes. More frequent collection provides more up-to-date information but may increase AWS service usage.

To configure inventory metadata collection
  1. Open the AWS Systems Manager console at https://console.aws.amazon.com/systems-manager/.

  2. In the navigation pane, choose Settings.

  3. In the Feature configurations section, locate Inventory metadata collection.

  4. To enable inventory collection, turn on the toggle switch.

  5. For Collection frequency, choose how often you want Systems Manager to collect inventory data:

    • Daily - Collects inventory data once per day

    • Weekly - Collects inventory data once per week

    • Monthly - Collects inventory data once per month

  6. Choose Save.

Important

Inventory collection requires managed nodes to have the necessary permissions to gather system information. Ensure your managed nodes have the appropriate IAM roles and policies. For more information about required permissions, see AWS Systems Manager Inventory.

SSM Agent updates

Automatic SSM Agent updates ensure that your managed nodes are running the latest version of the SSM Agent. Keeping the agent up-to-date provides access to the latest features, security improvements, and bug fixes.

SSM Agent automatic updates provide the following benefits:

  • Latest features - Access to new Systems Manager capabilities and improvements

  • Security updates - Automatic installation of security patches and fixes

  • Improved reliability - Bug fixes and stability improvements

  • Reduced maintenance - Eliminates the need for manual agent updates

Configuring automatic agent updates

You can configure how frequently Systems Manager checks for and installs SSM Agent updates on your managed nodes. Regular updates help ensure optimal performance and security.

To configure SSM Agent updates
  1. Open the AWS Systems Manager console at https://console.aws.amazon.com/systems-manager/.

  2. In the navigation pane, choose Settings.

  3. In the Feature configurations section, locate SSM Agent updates.

  4. To enable automatic updates, turn on the toggle switch.

  5. For Update frequency, choose how often you want Systems Manager to check for and install agent updates:

    • Daily - Checks for updates once per day

    • Weekly - Checks for updates once per week

    • Monthly - Checks for updates once per month

  6. Choose Save.

Diagnose and remediate settings

The Diagnose and remediate settings determine whether or not Systems Manager automatically scans your nodes to ensure they can communicate with Systems Manager. If enabled, the feature runs automatically according to a schedule you define. The feature identifies which nodes can't connect to Systems Manager and why. This feature also provides recommended runbooks for remediating networking issues and other problems preventing nodes from being configured as managed nodes.

Scheduling a recurring diagnostic scan

Systems Manager can diagnose and help you remediate several types of deployment failures, as well as drifted configurations. Systems Manager can also identify Amazon Elastic Compute Cloud (Amazon EC2) instances in your account or organization that Systems Manager isn't able to treat as a managed node. The EC2 instance diagnosis process can identify issues related to misconfigurations for a virtual private cloud (VPC), in a Domain Name Service (DNS) setting, or in an Amazon Elastic Compute Cloud (Amazon EC2) security group.

To simply the task of identifying nodes that can't connect to Systems Manager, the Schedule recurring diagnosis feature enables you to automate a recurring diagnostic scan. The scans help identify which nodes can't connect to Systems Manager and why. Use the following procedure to enable and configure a recurring diagnostic scan of your nodes.

To schedule a recurring diagnostic scan
  1. Open the AWS Systems Manager console at https://console.aws.amazon.com/systems-manager/.

  2. In the navigation pane, choose Settings, and then choose the Diagnose and remediate tab.

  3. Turn on the Schedule recurring diagnosis option.

  4. For Scanning period, choose how often you want the scan to run.

  5. (Optional) For Start time, enter a time, in 24-hour format, for the diagnosis to begin. For example, for 8:15 PM, enter 20:15.

    The time you enter is for your current local time zone.

    If you don't specify a time, the diagnostic scan runs immediately. Systems Manager also schedules the scan to run in the future at the current time. If you specify a time, Systems Manager waits to run the diagnostic scan at the specified time.

  6. Choose Save.

  7. After the scan completes, view the details by choosing Diagnose and remediate in the left navigation.

For more information about the Diagnose and remediate feature, see Diagnosing and remediating.

Updating S3 bucket encryption

When you onboard Systems Manager, Quick Setup creates an Amazon Simple Storage Service (Amazon S3) bucket in the delegated administrator account for AWS Organizations setups. For single-account setups, the bucket is stored in the account being set up. This bucket is used to store the metadata generated during diagnostic scans.

For more information about setting up the unified Systems Manager console, see Setting up AWS Systems Manager.

By default, your data in the bucket is encrypted using a AWS Key Management Service (AWS KMS) key that AWS owns and manages for you.

You can choose to use a different AWS KMS key for your bucket encryption. As another alternative, you can use server-side encryption with AWS KMS keys (SSE-KMS) using a customer managed key (CMK). For information, see Working with Amazon S3 buckets and bucket policies for Systems Manager.

To use a different AWS KMS key for S3 bucket encryption
  1. Open the AWS Systems Manager console at https://console.aws.amazon.com/systems-manager/.

  2. In the navigation pane, choose Settings, and then choose the Diagnose and remediate tab.

  3. In the Update S3 bucket encryption area, choose Edit.

  4. Select the Customize encryption settings (advanced) check box.

  5. For Choose an AWS KMS key, choose or enter the Amazon Resource Name (ARN) of the key.

    Tip

    To create a new key, choose Create an AWS KMS key.

  6. Choose Save.