Skip to content

Commit 2c0d2a1

Browse files
authored
Merge pull request #8011 from MicrosoftDocs/avd-migration
AB#3303: AVD migration (Reviewed)
2 parents 984d90d + 1157437 commit 2c0d2a1

45 files changed

Lines changed: 825 additions & 754 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

support/azure/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,10 +115,10 @@ productDirectory:
115115
- url: site-recovery/welcome-site-recovery.yml
116116
text: Troubleshooting articles for Site Recovery
117117
- title: Azure Virtual Desktop
118-
imageSrc: "https://learn.microsoft.com/static/ui/media/product/azure/virtual-desktop.svg"
118+
imageSrc: "https://static.docs.com/ui/media/product/azure/virtual-desktop.svg"
119119
links:
120120
- url: virtual-desktop/welcome-virtual-desktop.yml
121-
text: Troubleshoot common Azure Virtual Desktop issues
121+
text: Troubleshooting articles for Azure Virtual Desktop
122122
- title: Virtual Machines
123123
imageSrc: "https://static.docs.com/ui/media/product/azure/virtual-machine.svg"
124124
links:

support/azure/virtual-desktop/includes/include-troubleshoot-azure-ad-joined-connections-all.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,29 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### Your account is configured to prevent you from using this device
97

10-
If you come across an error saying **Your account is configured to prevent you from using this device. For more information, contact your system administrator**, ensure the user account was given the [Virtual Machine User Login role](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#azure-role-not-assigned) on the VMs.
8+
If you come across an error saying:
9+
10+
> Your account is configured to prevent you from using this device. For more information, contact your system administrator.
11+
12+
Ensure the user account was given the [Virtual Machine User Login role](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#azure-role-not-assigned) on the virtual machines (VMs).
1113

1214
### The user name or password is incorrect
1315

1416
If you can't sign in and keep receiving an error message that says your credentials are incorrect, first make sure you're using the right credentials. If you keep seeing error messages, check to make sure you've fulfilled the following requirements:
1517

16-
- Have you assigned the **Virtual Machine User Login** role-based access control (RBAC) permission to the virtual machine (VM) or resource group for each user?
17-
- Does your Conditional Access policy exclude multifactor authentication requirements for the **Azure Windows VM sign-in** cloud application?
18+
- Have you assigned the Virtual Machine User Login role-based access control (RBAC) permission to the VM or resource group for each user?
19+
- Does your Conditional Access policy exclude multifactor authentication requirements for the Azure Windows VM sign-in cloud application?
1820

19-
If you've answered no to either of those questions, you'll need to reconfigure your multifactor authentication. To reconfigure your multifactor authentication, follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms).
21+
If you've answered no to either of those questions, you'll need to reconfigure your multifactor authentication. To reconfigure your multifactor authentication, follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms).
2022

21-
> [!IMPORTANT]
23+
> [!IMPORTANT]
2224
> VM sign-ins don't support per-user enabled or enforced Microsoft Entra multifactor authentication. If you try to sign in with multifactor authentication on a VM, you won't be able to sign in and will receive an error message.
2325
24-
If you have [integrated Microsoft Entra logs with Azure Monitor logs](/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs) to access your Microsoft Entra sign-in logs through Log Analytics, you can see if you've enabled multifactor authentication and which Conditional Access policy is triggering the event. The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address from which your VM accesses Microsoft Entra ID.
26+
If you have [integrated Microsoft Entra logs with Azure Monitor logs](/entra/identity/monitoring-health/howto-integrate-activity-logs-with-azure-monitor-logs) to access your Microsoft Entra sign-in logs through Log Analytics, you can see if you've enabled multifactor authentication and which Conditional Access policy is triggering the event. The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address from which your VM accesses Microsoft Entra ID.
2527

2628
You can access your sign-in logs by running the following Kusto query:
2729

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,12 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### Error code 2607 - We couldn't connect to the remote PC because your credentials did not work
97

10-
If you come across an error saying **We couldn't connect to the remote PC because your credentials did not work. The remote machine is AADJ joined.** with error code 2607 when using the Android client, ensure that you [enabled connections from other clients](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#connect-using-the-other-clients).
8+
If you come across the following error with error code 2607 when using the Android client:
9+
10+
> We couldn't connect to the remote PC because your credentials did not work. The remote machine is AADJ joined.
11+
12+
Ensure that you [enabled connections from other clients](/azure/virtual-desktop/deploy-azure-ad-joined-vm#connect-using-the-other-clients).
Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,20 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### Sign in failed. Please check your username and password and try again
97

10-
If you come across an error saying **Oops, we couldn't connect to *NAME*. Sign in failed. Please check your username and password and try again.** when using the web client, ensure that you [enabled connections from other clients](/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#connect-using-the-other-clients).
8+
If you come across the following error when using the web client:
9+
10+
> Oops, we couldn't connect to *NAME*. Sign in failed. Please check your username and password and try again.
11+
12+
Ensure that you [enabled connections from other clients](/azure/virtual-desktop/deploy-azure-ad-joined-vm#connect-using-the-other-clients).
1113

1214
### We couldn't connect to the remote PC because of a security error
1315

14-
If you come across an error saying **Oops, we couldn't connect to *NAME*. We couldn't connect to the remote PC because of a security error. If this keeps happening, ask your admin or tech support for help.**, you have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
16+
If you come across an error:
17+
18+
> Oops, we couldn't connect to *NAME*. We couldn't connect to the remote PC because of a security error. If this keeps happening, ask your admin or tech support for help.
19+
20+
You have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,28 @@
11
---
2-
32
ms.reviewer: daknappe
43
ms.topic: include
5-
ms.date: 11/21/2022
4+
ms.date: 01/21/2025
65
---
7-
86
### The logon attempt failed
97

10-
If you come across an error saying **The logon attempt failed** on the Windows Security credential prompt, verify the following:
8+
If you come across an error saying "The logon attempt failed" on the Windows Security credential prompt, verify the following:
119

1210
- You're using a device that is Microsoft Entra joined or Microsoft Entra hybrid joined to the same Microsoft Entra tenant as the session host.
1311
- The [PKU2U protocol is enabled](/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities) on both the local PC and the session host.
14-
- [Per-user multifactor authentication is disabled](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) for the user account as it's not supported for Microsoft Entra joined VMs.
12+
- [Per-user multifactor authentication is disabled](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms) for the user account as it's not supported for Microsoft Entra joined VMs.
1513

1614
### The sign-in method you're trying to use isn't allowed
1715

18-
If you come across an error saying **The sign-in method you're trying to use isn't allowed. Try a different sign-in method or contact your system administrator**, you have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa?tabs=avd#azure-ad-joined-session-host-vms#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
16+
If you come across an error:
17+
18+
> The sign-in method you're trying to use isn't allowed. Try a different sign-in method or contact your system administrator.
19+
20+
You have Conditional Access policies restricting access. Follow the instructions in [Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access](/azure/virtual-desktop/set-up-mfa#azure-ad-joined-session-host-vms) to enforce Microsoft Entra multifactor authentication for your Microsoft Entra joined VMs.
21+
22+
### A specified logon session does not exist. It may already have been terminated
23+
24+
If you come across an error:
1925

20-
### A specified logon session does not exist. It may already have been terminated.
26+
> An authentication error occurred. A specified logon session does not exist. It may already have been terminated.
2127
22-
If you come across an error that says, **An authentication error occurred. A specified logon session does not exist. It may already have been terminated**, verify that you properly created and configured the Kerberos server object when [configuring single sign-on](/azure/virtual-desktop/configure-single-sign-on).
28+
Verify that you properly created and configured the Kerberos server object when [configuring single sign-on](/azure/virtual-desktop/configure-single-sign-on).
-190 KB
Loading
-187 KB
Loading
-497 KB
Loading
-56.8 KB
Loading
-9.73 KB
Loading

0 commit comments

Comments
 (0)