Skip to content

Commit 15d39b9

Browse files
authored
Merge pull request #8425 from MicrosoftDocs/main
Auto push to live 2025-03-11 02:00:02
2 parents ab26f78 + 2894c64 commit 15d39b9

10 files changed

Lines changed: 323 additions & 23 deletions

File tree

support/azure/virtual-machines/linux/serial-console-linux.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection: linux
1212
ms.topic: article
1313
ms.tgt_pltfrm: vm-linux
1414
ms.workload: infrastructure-services
15-
ms.date: 02/10/2025
15+
ms.date: 03/11/2025
1616
ms.author: mbifeld
1717
---
1818

@@ -131,7 +131,7 @@ Serial Console uses the storage account configured for boot diagnostics in its c
131131
| UAE | UAE Central, UAE North | 20.38.141.5, 20.45.95.64, 20.45.95.65, 20.45.95.66, 20.203.93.198, 20.233.132.205, 40.120.87.50, 40.120.87.51 |
132132
| United Kingdom | UK South, UK West | 20.58.68.62, 20.58.68.63, 20.90.32.180, 20.90.132.144, 20.90.132.145, 51.104.30.169, 172.187.0.26, 172.187.65.53 |
133133
| United States | US Central, US East, US East 2, US East 2 EUAP, US North, US South, US West, US West 2, US West 3 | 4.149.249.197, 4.150.239.210, 20.14.127.175, 20.40.200.175, 20.45.242.18, 20.45.242.19, 20.45.242.20, 20.47.232.186, 20.51.21.252, 20.69.5.160, 20.69.5.161, 20.69.5.162, 20.83.222.100, 20.83.222.101, 20.83.222.102, 20.98.146.84, 20.98.146.85, 20.98.194.64, 20.98.194.65, 20.98.194.66, 20.168.188.34, 20.241.116.153, 52.159.214.194, 57.152.124.244, 68.220.123.194, 74.249.127.175, 74.249.142.218, 157.55.93.0, 168.61.232.59, 172.183.234.204, 172.191.219.35 |
134-
| USGov | All US Government Cloud regions | 20.140.104.48, 20.140.105.3, 20.140.144.58, 20.140.144.59, 20.140.147.168, 20.140.53.121, 20.141.10.130, 20.141.10.131, 20.141.13.121, 20.141.15.104, 52.127.55.131, 52.235.252.252, 52.235.252.253, 52.243.247.124, 52.245.155.139, 52.245.156.185, 62.10.196.24, 62.10.196.25, 62.10.84.240, 62.11.6.64, 62.11.6.65 |
134+
| USGov | All US Government Cloud regions | 20.140.104.48, 20.140.105.3, 20.140.144.58, 20.140.144.59, 20.140.147.168, 20.140.53.121, 20.141.10.130, 20.141.10.131, 20.141.13.121, 20.141.15.104, 52.127.55.131, 52.235.252.252, 52.235.252.253, 52.243.247.124, 52.245.155.139, 52.245.156.185, 62.10.84.240 |
135135

136136
> [!IMPORTANT]
137137
> - The IPs that need to be permitted are specific to the region where the VM is located. For example, a virtual machine deployed in the North Europe region needs to add the following IP exclusions to the storage account firewall for the Europe geography: 52.146.139.220 and 20.105.209.72. View the table above to find the correct IPs for your region and geography.

support/azure/virtual-machines/windows/serial-console-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.collection: windows
1111
ms.topic: article
1212
ms.tgt_pltfrm: vm-windows
1313
ms.workload: infrastructure-services
14-
ms.date: 01/10/2025
14+
ms.date: 03/11/2025
1515
ms.author: mbifeld
1616
ms.custom: sap:VM Admin - Windows (Guest OS)
1717
---
@@ -185,7 +185,7 @@ Serial Console uses the storage account configured for boot diagnostics in its c
185185
| UAE | UAE Central, UAE North | 20.38.141.5, 20.45.95.64, 20.45.95.65, 20.45.95.66, 20.203.93.198, 20.233.132.205, 40.120.87.50, 40.120.87.51 |
186186
| United Kingdom | UK South, UK West | 20.58.68.62, 20.58.68.63, 20.90.32.180, 20.90.132.144, 20.90.132.145, 51.104.30.169, 172.187.0.26, 172.187.65.53 |
187187
| United States | US Central, US East, US East 2, US East 2 EUAP, US North, US South, US West, US West 2, US West 3 | 4.149.249.197, 4.150.239.210, 20.14.127.175, 20.40.200.175, 20.45.242.18, 20.45.242.19, 20.45.242.20, 20.47.232.186, 20.51.21.252, 20.69.5.160, 20.69.5.161, 20.69.5.162, 20.83.222.100, 20.83.222.101, 20.83.222.102, 20.98.146.84, 20.98.146.85, 20.98.194.64, 20.98.194.65, 20.98.194.66, 20.168.188.34, 20.241.116.153, 52.159.214.194, 57.152.124.244, 68.220.123.194, 74.249.127.175, 74.249.142.218, 157.55.93.0, 168.61.232.59, 172.183.234.204, 172.191.219.35 |
188-
| USGov | All US Government Cloud regions | 20.140.104.48, 20.140.105.3, 20.140.144.58, 20.140.144.59, 20.140.147.168, 20.140.53.121, 20.141.10.130, 20.141.10.131, 20.141.13.121, 20.141.15.104, 52.127.55.131, 52.235.252.252, 52.235.252.253, 52.243.247.124, 52.245.155.139, 52.245.156.185, 62.10.196.24, 62.10.196.25, 62.10.84.240, 62.11.6.64, 62.11.6.65 |
188+
| USGov | All US Government Cloud regions | 20.140.104.48, 20.140.105.3, 20.140.144.58, 20.140.144.59, 20.140.147.168, 20.140.53.121, 20.141.10.130, 20.141.10.131, 20.141.13.121, 20.141.15.104, 52.127.55.131, 52.235.252.252, 52.235.252.253, 52.243.247.124, 52.245.155.139, 52.245.156.185, 62.10.84.240 |
189189

190190
> [!IMPORTANT]
191191
> - The IPs that need to be permitted are specific to the region where the VM is located. For example, a virtual machine deployed in the North Europe region needs to add the following IP exclusions to the storage account firewall for the Europe geography: 52.146.139.220 and 20.105.209.72. View the table above to find the correct IPs for your region and geography.

support/entra/entra-id/app-integration/error-code-aadsts50173-grant-expired-revoked.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,10 @@ On the application that experiences the issues, try to locate an option to reaut
4545

4646
If the application is using [Microsoft Authentication Library (MSAL)](/entra/identity-platform/msal-overview), follow [this guidance to handle errors and exceptions in MSAL](/entra/msal/dotnet/advanced/exceptions/msal-error-handling).
4747

48-
If the application isn't using [Microsoft Authentication Library (MSAL)](/entra/identity-platform/msal-overview), follow this guidance to [handle errors and exceptions in MSAL](/entra/msal/dotnet/advanced/exceptions/msal-error-handling), and try to implement a similar approach on the application. The goal is to request that the user reauthenticate and obtain a fresh token.
48+
If the application isn't using MSAL, follow this guidance to [handle errors and exceptions in MSAL](/entra/msal/dotnet/advanced/exceptions/msal-error-handling), and try to implement a similar approach on the application. The goal is to request that the user reauthenticate and obtain a fresh token.
4949

5050
## More information
5151

5252
For a full list of authentication and authorization error codes, see [Microsoft Entra authentication and authorization error codes](/entra/identity-platform/reference-error-codes).
5353

54-
To investigate individual errors, go to [https://login.microsoftonline.com/error](https://login.microsoftonline.com/error).
54+
To investigate individual errors, go to [https://login.microsoftonline.com/error](https://login.microsoftonline.com/error).

support/sql/database-engine/availability-groups/troubleshooting-recovery-queuing-in-alwayson-availability-group.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Troubleshooting recovery queueing in an Always On availability group
2+
title: Troubleshooting recovery (redo) queueing in an Always On availability group
33
description: This article helps you to troubleshoot problems that are related to recovery queueing in an Always On availability group.
4-
ms.date: 02/10/2023
4+
ms.date: 03/11/2025
55
ms.custom: sap:Always On Availability Groups (AG)
6-
ms.reviewer: ramakoni, v-jayaramanp
6+
ms.reviewer: ramakoni, v-jayaramanp, jopilov
77
---
88

9-
# Troubleshooting recovery queueing in an Always On availability group
9+
# Troubleshooting recovery (redo) queueing in an Always On availability group
1010

1111
This article provides resolutions to problems related to recovery queueing.
1212

@@ -28,7 +28,7 @@ For more information, see the [Data latency on secondary replica](/sql/database-
2828

2929
### Failover time is longer or RTO is exceeded
3030

31-
Recovery Time Objective (RTO) is the maximum database downtime that an organization can handle. RTO also describes how quickly the organization can regain access to the database after an outage. If substantial recovery queueing is present on a secondary replica when a failover occurs, recovery may take longer. After recovery, the database will transition to the primary role and represent the state of the database that existed before the failover. A longer recovery time can delay how quickly production resumes after a failover.
31+
Recovery Time Objective (RTO) is the maximum database downtime that an organization can handle. RTO also describes how quickly the organization can regain access to the database after an outage. If substantial recovery queueing is present on a secondary replica when a failover occurs, recovery might take longer than the RTO. After recovery, the database will transition to the primary role and represent the state of the database that existed before the failover. A longer recovery time can delay how quickly production resumes after a failover.
3232

3333
### Various diagnostic features report availability group recovery queueing
3434

support/sql/database-engine/connect/sql-server-faces-connectivity-issue-ssispack-fail.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
2-
title: Error 0x80004005 occurs when SSIS packages fail to run
2+
title: Error 0x80004005 When an SSIS Package Fails to Run as a SQL Agent Job
33
description: This article helps you resolve the 0x80004005 error that might arise when you try to run SSIS packages by using the SQL Server Agent.
4-
ms.date: 04/18/2024
4+
ms.date: 03/11/2025
55
author: prmadhes-msft
66
ms.author: prmadhes
77
ms.reviewer: jopilov, haiyingyu, v-jayaramanp
88
ms.custom: sap:Database Connectivity and Authentication
99
---
1010

11-
# Connectivity error 0x80004005 occurs from SQL Sever Agent SSIS failures
11+
# Connectivity error 0x80004005 occurs when you run an SSIS package as a SQL Agent job
1212

13-
This article provides a resolution to a connectivity issue in which SQL Server Integration Services (SSIS) packages that use an SQL Agent fail to run.
13+
This article provides a solution to a connectivity issue in which SQL Server Integration Services (SSIS) packages that use SQL Server Agent fail to run.
1414

1515
## Symptoms
1616

17-
When you try to run SSIS packages that use an SQL agent, the packages don't run, and you receive the following error messages:
17+
When you try to run an SSIS package as a SQL Server Agent job, the package doesn't run, and you receive the following error messages:
1818

1919
> An OLE DB record is available. Source "Microsoft OLE DB Driver for SQL Server" Hresult. 0x80004005 Description "Protocol error in TDS stream".
2020

support/sql/database-engine/development/iterate-through-result-set.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
11
---
2-
title: Iterate through a result set by using Transact-SQL
3-
description: This article describes various methods that you can use to iterate through a result set by using Transact-SQL in SQL Server.
4-
ms.date: 07/26/2024
2+
title: Iterate through a SQL Server result set in T-SQL without a cursor
3+
description: This article describes methods to iterate through a SQL Server result set in Transact-SQL without a cursor.
4+
ms.date: 03/11/2025
55
ms.custom: sap:Database or Client application Development
66
ms.reviewer: jopilov
77
ms.topic: how-to
88
---
99

10-
# Iterate through a result set by using Transact-SQL in SQL Server
10+
# Iterate through a SQL Server result set in T-SQL without using a cursor
1111

12-
This article describes various methods that you can use to iterate through a result set by using Transact-SQL in SQL Server.
12+
This article describes methods that you can use to iterate through a result set by using Transact-SQL in SQL Server.
1313

1414
_Original product version:_   SQL Server
1515
_Original KB number:_   111401
1616

1717
## Summary
1818

19-
This article describes various methods that you can use to simulate a cursor-like `FETCH`-`NEXT` logic in a stored procedure, trigger, or Transact-SQL batch.
19+
This article describes methods that you can use to simulate a cursor-like `FETCH`-`NEXT` logic in a stored procedure, trigger, or Transact-SQL batch.
2020

2121
## Use Transact-SQL Statements to Iterate Through a Result Set
2222

support/sql/releases/linux/release-history-2017.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ The following table lists the release history for [!INCLUDE [sql-server-2017](..
7171

7272
## <a id="AzureConnectFeaturePack"></a> Azure Connect Pack (March 2025)
7373

74-
This is the Azure Connect Pack for [!INCLUDE [sql-server-2017](../../includes/versions/sql-server-2017.md)]. The [!INCLUDE [sql-server-database-engine](../../includes/versions/sql-server-database-engine.md)] version for this release is 14.0.3490.10. For information about the fixes and improvements in this release, see the [Support article](https://learn.microsoft.com/troubleshoot/sql/releases/sqlserver-2017/azureconnect).
74+
This is the Azure Connect Pack for [!INCLUDE [sql-server-2017](../../includes/versions/sql-server-2017.md)]. The [!INCLUDE [sql-server-database-engine](../../includes/versions/sql-server-database-engine.md)] version for this release is 14.0.3490.10. For information about the fixes and improvements in this release, see the [Support article](../sqlserver-2017/azureconnect.md).
7575

7676
> [!IMPORTANT]
7777
> This is the Azure Connect Pack, which includes CU 31 for [!INCLUDE [sql-server-2017](../../includes/versions/sql-server-2017.md)].
Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
---
2+
title: Accounts Have the LastLogonTimestamp Value Set to Future
3+
description: Helps resolve an issue in which user or computer accounts have the lastLogonTimestamp value set to a future time.
4+
ms.date: 03/11/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.reviewer: kaushika, herbertm, v-lianna
9+
ms.custom:
10+
- sap:active directory\user,computer,group,and object management
11+
- pcy:WinComm Directory Services
12+
---
13+
# User or computer accounts have the lastLogonTimestamp value set to a future time
14+
15+
This article helps resolve an issue in which user or computer accounts have the lastLogonTimestamp value set to a future time.
16+
17+
You have an Active Directory (AD) domain and use AD queries to look for unused accounts. You query attributes like `pwdLastSet` and `lastLogonTimestamp` to determine which accounts are no longer used.
18+
19+
Although using `lastLogonTimestamp` has its limitations due to Kerberos S4U updating the attribute, you notice that some actively used accounts have the `lastLogonTimestamp` value set to a future time.
20+
21+
## Incorrect time on the local DC
22+
23+
A domain controller (DC) might run with its system time set in the future. In this situation, if a user authenticates with the DC, the DC compares its local time with the time stored in the user account. Then, the DC updates the `lastLogonTimestamp` value as its current time is much more recent.
24+
25+
The time on the DC might be incorrect due to a time synchronization issue with the virtual machine (VM) host, the Network Time Protocol (NTP) infrastructure, or [Secure Time Seeding (STS)](https://techcommunity.microsoft.com/blog/askds/secure-time-seeding-on-dcs-a-note-from-the-field/4238810). The DC might also revert to the correct time quickly, so you might not catch the problem in your reporting.
26+
27+
As NTP prevents large time offsets between DCs from being distributed across the domain, incorrect timestamps might be kept local to a single DC. However, domain members follow their local DC's time, even when the DC detects a time skew during Kerberos requests. This is why Kerberos transactions still work in this situation.
28+
29+
## Use the fixupObjectState attribute with LDIFDE to repair the object
30+
31+
For previous versions of Windows, the approaches to resolve the issue are to:
32+
33+
- Wait until the actual time surpasses the `lastLogonTimestamp` value of the user.
34+
- Ignore the `lastLogonTimestamp` value and use other metrics to identify orphaned accounts.
35+
- Delete the affected accounts and create new ones.
36+
37+
In Windows Server 2025, there's a new facility to repair broken objects as specified in [[MS-ADTS]: fixupObjectState](/openspecs/windows_protocols/ms-adts/37294765-9e7d-41a1-aded-2d6f744eee8c).
38+
39+
> [!NOTE]
40+
> There's functionality to correct missing `sAMAccountType` and `objectCategory` attributes. For more information, see [Can't edit or delete an AD object and receive the error "attribute is owned by the Security Accounts Manager (SAM)" or "The specified account does not exist"](cannot-edit-delete-ad-object-error-sam.md).
41+
42+
### Step 1: Identify the object name and globally unique identifier (GUID)
43+
44+
For example:
45+
46+
- Distinguished name (DN): `cn=brokenuser,ou=bad-users,dc=contoso,dc=com`
47+
- GUID: `cf2b4aca-0e67-47d9-98aa-30a5fe30dc36`
48+
49+
### Step 2: Prepare an LDIFDE import file using the DN string or GUID-based syntax
50+
51+
- Use the DN string:
52+
53+
```output
54+
DN:
55+
Changetype:modify
56+
add: fixupObjectState
57+
fixupObjectState: cn=brokenuser,ou=bad-users,dc=contoso,dc=com:LastLogonTimestamp
58+
-
59+
```
60+
61+
> [!NOTE]
62+
> The line with only a hyphen (`-`) and the empty line are required for a well-formed LDIFDE import file.
63+
64+
- Use the GUID-based syntax:
65+
66+
If your object name contains special characters, use Unicode for the LDIFDE import file, or use the GUID-based syntax.
67+
68+
An object name can also be expressed as `<guid=cf2b4aca-0e67-47d9-98aa-30a5fe30dc36>` in the GUID-based syntax.
69+
70+
So, the expression of `fixupObjectState: cn=brokenuser,ou=bad-users,dc=contoso,dc=com:LastLogonTimestamp` becomes `fixupObjectState: <guid=cf2b4aca-0e67-47d9-98aa-30a5fe30dc36>:LastLogonTimestamp`.
71+
72+
To use this syntax with the LDIFDE import file, you need to encode the text after the first colon in Base64 format because of the greater-than (>) and less-than (<) signs:
73+
74+
```output
75+
fixupObjectState:: PGd1aWQ9Y2YyYjRhY2EtMGU2Ny00N2Q5LTk4YWEtMzBhNWZlMzBkYzM2PjpMYXN0TG9nb25UaW1lc3RhbXA=
76+
```
77+
78+
> [!NOTE]
79+
> The double colon shows the attribute value is in Base64 format. You can use the [Base64 encoder](https://www.bing.com/search?q=site%3Amicrosoft.com%20base64%20encoder&qs=n&form=QBRE&sp=-1&lq=0&pq=site%3Amicrosoft.com%20base64%20encoder&sc=0-33&sk=&cvid=CE994D44ADFC432CA2D3784CEBB3D934&ghsh=0&ghacc=0&ghpl=) to encode the string directly on the web.
80+
81+
After using the Base64 format, the import file becomes:
82+
83+
```output
84+
DN:
85+
Changetype:modify
86+
add: fixupObjectState
87+
fixupObjectState:: PGd1aWQ9Y2YyYjRhY2EtMGU2Ny00N2Q5LTk4YWEtMzBhNWZlMzBkYzM2PjpMYXN0TG9nb25UaW1lc3RhbXA=
88+
-
89+
```
90+
91+
### Step 3: Repair the object using LDIFDE
92+
93+
Sign in as an Enterprise Administrator, and import the LDIFDE import file (for example, **repair-user.txt**) with the following command:
94+
95+
```console
96+
ldifde /i /f repair-user.txt
97+
Connecting to "<DC name>"
98+
Logging in as current user using SSPI
99+
Importing directory from file " repair-user.txt"
100+
Loading entries...
101+
1 entry modified successfully.
102+
```
103+
104+
Then, the object has the `lastLogonTimestamp` attribute value set to the current time.
105+
106+
## References
107+
108+
For more information about the usage of the `lastLogonTimestamp` attribute, see:
109+
110+
- ["The LastLogonTimeStamp Attribute" - "What it was designed for and how it works"](/archive/blogs/askds/the-lastlogontimestamp-attribute-what-it-was-designed-for-and-how-it-works)
111+
- [How LastLogonTimeStamp is Updated with Kerberos S4u2Self](https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/how-lastlogontimestamp-is-updated-with-kerberos-s4u2self/257135)

0 commit comments

Comments
 (0)