Unattended upgrades ------------------- This script can install security upgrades automatically and unattended. It will not install packages that require dependencies that can't be fetched from security and it will check for conffile prompts before the install and holds back the package that creates them. To activate this script you need a current apt and then setup /etc/apt/apt.conf to include: APT::Periodic::Update-Package-Lists "1"; APT::Periodic::Unattended-Upgrade "1"; This means that it will check for upates every day and install them (if that is possible). If you have update-notifier installed, it will setup /etc/apt/apt.conf.d/10periodic. Just edit this file then to fit your needs. By default it will only install only from the the (Debian, stable) repository. This can be changed with the "Unattended-Upgrade::Allowed-Origins" apt configuration list. It can be configured to allow any (origin, archive) combination. Those values are taken from the "Release" file on the archive server. It is recommended to use the default (only stable updates from Debian). All operations will be logged in /var/log/unattended-upgrades/. This includes the dpkg output as well. See https://wiki.ubuntu.com/AutomaticUpdates for more details about this feature. The following configuration options are supported via the standard apt configuration: "APT::UnattendedUpgrades::LogDir" "APT::UnattendedUpgrades::LogFile" "Unattended-Upgrade::Allowed-Origins" "Unattended-Upgrade::Package-Blacklist" "Unattended-Upgrade::Mail" See https://wiki.ubuntu.com/AutomaticUpdates for more details about this feature.