Skip to content

Commit 0d182c7

Browse files
authored
Merge pull request #8043 from Deland-Han/migration-avd
Migration AVD articles.
2 parents 766ef56 + 5a53a9e commit 0d182c7

48 files changed

Lines changed: 2214 additions & 8 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6915,11 +6915,6 @@
69156915
"redirect_url": "/previous-versions/troubleshoot/windows-server/windows-virtual-desktop-blank-screen",
69166916
"redirect_document_id": false
69176917
},
6918-
{
6919-
"source_path": "support/azure/virtual-desktop/welcome-virtual-desktop.yml",
6920-
"redirect_url": "/azure/virtual-desktop",
6921-
"redirect_document_id": false
6922-
},
69236918
{
69246919
"source_path": "support/windows-client/windows-troubleshooters/introduction-to-troubleshootingscript-toolset-tss.md",
69256920
"redirect_url": "/troubleshoot/windows-client/windows-tss/introduction-to-troubleshootingscript-toolset-tss",

support/azure/index.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,11 @@ productDirectory:
114114
links:
115115
- url: site-recovery/welcome-site-recovery.yml
116116
text: Troubleshooting articles for Site Recovery
117+
- title: Azure Virtual Desktop
118+
imageSrc: "https://learn.microsoft.com/static/ui/media/product/azure/virtual-desktop.svg"
119+
links:
120+
- url: virtual-desktop/welcome-virtual-desktop.yml
121+
text: Troubleshoot common Azure Virtual Desktop issues
117122
- title: Virtual Machines
118123
imageSrc: "https://static.docs.com/ui/media/product/azure/virtual-machine.svg"
119124
links:
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
3+
ms.reviewer: daknappe
4+
ms.topic: include
5+
ms.date: 11/21/2022
6+
---
7+
8+
### Your account is configured to prevent you from using this device
9+
10+
If you come across an error saying **Your account is configured to prevent you from using this device. For more information, contact your system administrator**, ensure the user account was given the [Virtual Machine User Login role](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#azure-role-not-assigned) on the VMs.
11+
12+
### The user name or password is incorrect
13+
14+
If you can't sign in and keep receiving an error message that says your credentials are incorrect, first make sure you're using the right credentials. If you keep seeing error messages, check to make sure you've fulfilled the following requirements:
15+
16+
- Have you assigned the **Virtual Machine User Login** role-based access control (RBAC) permission to the virtual machine (VM) or resource group for each user?
17+
- Does your Conditional Access policy exclude multifactor authentication requirements for the **Azure Windows VM sign-in** cloud application?
18+
19+
If you've answered no to either of those questions, you'll need to reconfigure your multifactor authentication. To reconfigure your multifactor authentication, follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms).
20+
21+
> [!IMPORTANT]
22+
> VM sign-ins don't support per-user enabled or enforced Microsoft Entra multifactor authentication. If you try to sign in with multifactor authentication on a VM, you won't be able to sign in and will receive an error message.
23+
24+
If you have [integrated Microsoft Entra logs with Azure Monitor logs](/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs) to access your Microsoft Entra sign-in logs through Log Analytics, you can see if you've enabled multifactor authentication and which Conditional Access policy is triggering the event. The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address from which your VM accesses Microsoft Entra ID.
25+
26+
You can access your sign-in logs by running the following Kusto query:
27+
28+
```kusto
29+
let UPN = "userupn";
30+
AADNonInteractiveUserSignInLogs
31+
| where UserPrincipalName == UPN
32+
| where AppId == "372140e0-b3b7-4226-8ef9-d57986796201"
33+
| project ['Time']=(TimeGenerated), UserPrincipalName, AuthenticationRequirement, ['MFA Result']=ResultDescription, Status, ConditionalAccessPolicies, DeviceDetail, ['Virtual Machine IP']=IPAddress, ['Cloud App']=ResourceDisplayName
34+
| order by ['Time'] desc
35+
```
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
3+
ms.reviewer: daknappe
4+
ms.topic: include
5+
ms.date: 11/21/2022
6+
---
7+
8+
### Error code 2607 - We couldn't connect to the remote PC because your credentials did not work
9+
10+
If you come across an error saying **We couldn't connect to the remote PC because your credentials did not work. The remote machine is AADJ joined.** with error code 2607 when using the Android client, ensure that you [enabled connections from other clients](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#connect-using-the-other-clients).
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
3+
ms.reviewer: daknappe
4+
ms.topic: include
5+
ms.date: 11/21/2022
6+
---
7+
8+
### Sign in failed. Please check your username and password and try again
9+
10+
If you come across an error saying **Oops, we couldn't connect to *NAME*. Sign in failed. Please check your username and password and try again.** when using the web client, ensure that you [enabled connections from other clients](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#connect-using-the-other-clients).
11+
12+
### We couldn't connect to the remote PC because of a security error
13+
14+
If you come across an error saying **Oops, we couldn't connect to *NAME*. We couldn't connect to the remote PC because of a security error. If this keeps happening, ask your admin or tech support for help.**, you have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
3+
ms.reviewer: daknappe
4+
ms.topic: include
5+
ms.date: 11/21/2022
6+
---
7+
8+
### The logon attempt failed
9+
10+
If you come across an error saying **The logon attempt failed** on the Windows Security credential prompt, verify the following:
11+
12+
- You're using a device that is Microsoft Entra joined or Microsoft Entra hybrid joined to the same Microsoft Entra tenant as the session host.
13+
- The [PKU2U protocol is enabled](/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities) on both the local PC and the session host.
14+
- [Per-user multifactor authentication is disabled](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) for the user account as it's not supported for Microsoft Entra joined VMs.
15+
16+
### The sign-in method you're trying to use isn't allowed
17+
18+
If you come across an error saying **The sign-in method you're trying to use isn't allowed. Try a different sign-in method or contact your system administrator**, you have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
19+
20+
### A specified logon session does not exist. It may already have been terminated.
21+
22+
If you come across an error that says, **An authentication error occurred. A specified logon session does not exist. It may already have been terminated**, verify that you properly created and configured the Kerberos server object when [configuring single sign-on](/azure/virtual-desktop/configure-single-sign-on).
428 KB
Loading
427 KB
Loading
1.11 MB
Loading
87.9 KB
Loading

0 commit comments

Comments
 (0)