Show Table of Contents Hide Table of Contents English English Multi-page HTML Single-page HTML PDF ePub Managing and monitoring security updatesProviding feedback on Red Hat documentation1. Overview of security topics1.1. What are security advisories?2. Identifying security updates2.1. Displaying available security updates2.2. Displaying security updates that are installed on a host3. Viewing security advisories3.1. Displaying advisories on the Customer Portal3.2. Displaying a specific advisory using yum4. Installing security updates4.1. Installing all available security updates4.2. Installing a security update provided by a specific advisory5. Additional tasks after applying security updates5.1. Displaying which services require a restart after applying security updatesLegal Notice Managing and monitoring security updates Red Hat Enterprise Linux 8A guide to managing and monitoring security updates in Red Hat Enterprise Linux 8Red Hat Customer Content ServicesLegal NoticeAbstract This document describes how to learn about and install security updates, as well as displaying additional details about the updates. Providing feedback on Red Hat documentation Where did the comment section go?Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.