Skip to content

Commit 649e9d4

Browse files
authored
Merge pull request #8191 from MicrosoftDocs/main
Auto push to live 2025-02-10 18:00:02
2 parents ffbcbe5 + 534b7ec commit 649e9d4

8 files changed

Lines changed: 182 additions & 29 deletions

support/azure/virtual-machines/linux/how-to-display-encryption-settings-with-azure-resource-explorer.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: How to display encryption settings on Azure Linux Virtual Machines
2+
title: How to Display Encryption Settings on Azure Linux Virtual Machines
33
description: Learn how to visualize encryption settings stamped on a disk or VM after Azure Disk Encryption (ADE) is deployed.
44
author: elicorme
55
ms.author: elcorral
66
ms.date: 01/20/2025
77
ms.reviewer: divargas
88
ms.service: azure-virtual-machines
99
ms.custom: linux-related-content
10-
ms.topic: troubleshooting
10+
ms.topic: how-to
1111
ms.collection: linux
1212
---
1313

@@ -24,7 +24,7 @@ When Azure Disk Encryption (ADE) is enabled on an Azure Linux Virtual Machine (V
2424

2525
## How to identify the ADE extension version
2626

27-
You can identify the ADE version in the Azure portal. To do this, open the properties of the VM, and then select `Extensions` to open the `Extensions` blade. On the `Extensions` blade, view the version number of **AzureDiskEncryptionForLinux**.
27+
You can identify the ADE version in the Azure portal. To do this, open the properties of the VM, and then select **Extensions** to open the **Extensions** blade. On the **Extensions** blade, view the version number of **AzureDiskEncryptionForLinux**.
2828

2929
- If the version number is `0.*`, the disk uses **dual-pass encryption**.
3030
- If the version number is `1.*` or a later version, the disk uses **single-pass encryption**.
@@ -37,17 +37,17 @@ If ADE single-pass is used, the extension process stamps the encryption settings
3737
## <a id="portal"> </a> Verify ADE encryption settings through Azure portal
3838

3939
1. Log in to your subscription in [the Azure portal](https://portal.azure.com)
40-
2. Search for "Resource Explorer" on the search bar.
40+
2. Search for "resource explorer" on the search bar.
4141

42-
:::image type="content" source="./media/how-to-display-encryption-settings-in-azure-vms/searchresourceexplorerportal.png" alt-text="Portal search bar":::
42+
:::image type="content" source="./media/how-to-display-encryption-settings-in-azure-vms/searchresourceexplorerportal.png" alt-text="Screenshot that shows searching for resource explorer on the Azure portal search bar.":::
4343

44-
3. Select the "Resource Explorer" icon.
44+
3. Select the **Resource Explorer** icon.
4545
4. Select the subscription that you want to review.
4646
5. Locate the disk that you want to review by using either by the resource group path or the provider path.
4747

48-
:::image type="content" source="./media/how-to-display-encryption-settings-in-azure-vms/providersrgs.png" alt-text="Provider and resource groups view":::
48+
:::image type="content" source="./media/how-to-display-encryption-settings-in-azure-vms/providersrgs.png" alt-text="Screenshot that shows the provider and resource groups view in which you can select the desired disk for review.":::
4949

50-
:::image type="content" source="./media/how-to-display-encryption-settings-in-azure-vms/compute.jpeg" alt-text="Disk selected":::
50+
:::image type="content" source="./media/how-to-display-encryption-settings-in-azure-vms/compute.jpeg" alt-text="Screenshot that shows the desired disk selected.":::
5151

5252
6. After the disk is selected, the corresponding JSON metadata is shown in the right panel. The encryption settings block is enclosed inside the `encryptionSettingsCollection` key. It resembles the following code:
5353

@@ -89,7 +89,7 @@ If you're already using the dual-pass version of ADE, the encryption settings ar
8989

9090
## Verify ADE encryption settings through Azure Web Resource Explorer
9191

92-
You can access the web version of Resource Explorer through [this link](https://resources.azure.com). Follow steps 1 through 6 in []"Verify ADE encryption settings through Azure portal"](#portal) to locate the component that ou want to analyze.
92+
Open the [web version of Resource Explorer](https://resources.azure.com), and then follow steps 1 through 6 under ["Verify ADE encryption settings through Azure portal"](#portal) to locate the component that you want to analyze.
9393

9494
## Next steps
9595

support/azure/virtual-machines/linux/toc.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@
3535
- name: VM availability might be inaccurate during restart
3636
href: ../windows/inaccurate-vm-availability-during-vm-restart.md?context=/troubleshoot/azure/virtual-machines/linux/context/context
3737

38-
- name: Increase Quota Limits
38+
- name: Increase quota limits
3939
items:
4040
- name: Increase compute vCPU limits (Quota)
4141
items:
@@ -205,7 +205,7 @@
205205
- name: Root Cause Analysis of unexpected VM reboot
206206
href: ../windows/unexpected-vm-reboot-root-cause-analysis.md?context=/troubleshoot/azure/virtual-machines/linux/context/context
207207

208-
- name: Received an Allocation Failure
208+
- name: Received an allocation failure
209209
items:
210210
- name: Allocation failures
211211
href: ../windows/allocation-failure.md?context=/troubleshoot/azure/virtual-machines/linux/context/context
@@ -240,7 +240,7 @@
240240
- name: Cloud-init-enabled VM takes a long time to start up
241241
href: cloud-init-deployment-delay.md
242242

243-
- name: Disk Management
243+
- name: Disk management
244244
items:
245245
- name: Overview
246246
href: /azure/virtual-machines/managed-disks-overview?context=/troubleshoot/azure/virtual-machines/linux/context/context
@@ -349,7 +349,7 @@
349349
href: /azure/virtual-machines/linux/disk-encryption-troubleshooting?context=/troubleshoot/azure/virtual-machines/linux/context/context
350350
- name: Unlock the encrypted disk for offline repair
351351
href: unlock-encrypted-linux-disk-offline-repair.md
352-
- name: How to display encription settings with resource explorer
352+
- name: How to display encryption settings with Resource Explorer
353353
href: /azure/virtual-machines/linux/how-to-display-encryption-settings-with-azure-resource-explorer.md
354354
- name: FAQ
355355
href: /azure/virtual-machines/linux/disk-encryption-faq?context=/troubleshoot/azure/virtual-machines/linux/context/context
@@ -402,9 +402,9 @@
402402
- name: Issues with Python 3-enabled Linux systems
403403
href: /azure/virtual-machines/extensions/issues-using-vm-extensions-python-3?context=/troubleshoot/azure/virtual-machines/linux/context/context
404404

405-
- name: Custom script extenions (CSE) for Linux
405+
- name: Custom script extensions (CSE) for Linux
406406
items:
407-
- name: Previous command is re-run
407+
- name: Previous command is rerun
408408
href: customscript-reruns-previous-command.md
409409
- name: Linux - version 2
410410
href: /azure/virtual-machines/extensions/custom-script-linux#troubleshooting?context=/troubleshoot/azure/virtual-machines/linux/context/context

support/power-platform/power-automate/desktop-flows/msentramachinealwayspromptingforpassword-error.md

Lines changed: 25 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Unattended Desktop Flow Run Fails with MSEntraMachineAlwaysPromptingForPassword
33
description: Solves an error that occurs when you run an unattended desktop flow in Microsoft Power Automate for desktop.
44
ms.author: moelaabo
5-
ms.reviewer: guco, alarnaud
5+
ms.reviewer: guco, alarnaud, johndund
66
ms.custom: sap:Desktop flows\Unattended flow runtime errors
7-
ms.date: 12/09/2024
7+
ms.date: 02/11/2025
88
---
99
# An unattended desktop flow run fails with the MSEntraMachineAlwaysPromptingForPassword error
1010

@@ -29,7 +29,29 @@ Your unattended desktop flow run fails with the "MSEntraMachineAlwaysPromptingFo
2929

3030
Power Automate for desktop can't validate your Microsoft Entra ID (formerly Azure Active Directory) credentials on the machine. This issue is typically caused by a group policy setting on your machine.
3131

32-
## Resolution
32+
## Resolution 1: Use Microsoft Entra authentication for Remote Desktop with a user certificate
33+
34+
This resolution requires Power Automate for desktop version 2.50 or later and must be used when no [multifactor authentication (MFA) exception](~/power-platform/power-automate/administration/conditional-access-and-multi-factor-authentication-in-flow.md#details) can be granted to the desktop flow connection account.
35+
36+
For steps on how to set up Microsoft Entra certificate based authentication for Power Automate, see [Configure certificate-based authentication (preview)](/power-automate/desktop-flows/configure-certificate-based-auth).
37+
38+
## Resolution 2: Use Microsoft Entra authentication for Remote Desktop with a username and password
39+
40+
This resolution requires Power Automate for desktop version 2.49 or later. If you don't have MFA enabled for the account used by the desktop flows connection, you can set up Microsoft Entra authentication using a username and password instead.
41+
42+
1. Open the Registry Editor (regedit) with administrative privileges. Navigate to the following registry path, create a new DWORD-32 value with the name `UseRdsAadAuthentication`, and then set the value of `UseRdsAadAuthentication` to **1**.
43+
44+
|Registry path|Registry key| DWORD-32 value|
45+
|-------------|------------|---------------|
46+
|Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Power Automate Desktop\Service|`UseRdsAadAuthentication`|**1**|
47+
48+
2. [Hide the consent prompt dialog for a target device group](/power-automate/desktop-flows/run-unattended-desktop-flows#admin-consent-for-unattended-runs-using-cba-or-sign-in-credentials-with-nla-preview).
49+
50+
3. Restart the Power Automate service.
51+
52+
4. Use a Microsoft Entra ID connection with username and password credentials. Note that an MFA exception is required for this account.
53+
54+
## Resolution 3: Disable fPromptForPassword
3355

3456
To solve this issue, check the group policy setting on your machine.
3557

support/power-platform/power-automate/desktop-flows/troubleshoot-errors-running-attended-or-unattended-desktop-flows.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Error code occurs when running an attended or unattended desktop flow
33
description: Provides mitigation steps for the error codes that occur when running attended or unattended desktop flows.
4-
ms.reviewer: cefriant, kenseongtan, guco, johndund
5-
ms.date: 01/15/2024
4+
ms.reviewer: cefriant, kenseongtan, guco, johndund, alarnaud
5+
ms.date: 02/11/2025
66
ms.custom: sap:Desktop flows\Unattended flow runtime errors
77
---
88
# Error code occurs when running an attended or unattended desktop flow
@@ -28,6 +28,7 @@ _Original KB number:_ &nbsp; 4555406
2828
|UnattendedUserSessionDisconnected|400|Unattended|For more information about this error code, see [UnattendedUserSessionDisconnected](troubleshoot-desktop-flow-run-queue-errors.md#unattendedusersessiondisconnected).|
2929
|UnattendedUserSessionLocked|400|Unattended|For more information about this error code, see [UnattendedUserSessionLocked](troubleshoot-desktop-flow-run-queue-errors.md#unattendedusersessionlocked).|
3030
|SessionNotFound|400|Unattended|The Windows session on the machine for the given run can't be found. This issue can occur in the following cases:<br>- The machine reboots during the run.<br>- You're using a virtual machine that was cloned after installing Power Automate. If it was cloned after the installation and was registered, delete your machine from the Power Automate portal and re-register the machine.|
31+
|SessionNotFoundAfterCreation|400|Unattended|The Windows session on the machine for the given run can't be found after the session is created. This issue can occur if the Power Automate service ([UIFlowService](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account)) doesn't have the rights to enumerate remote sessions. To solve this issue, ensure the account running the Power Automate service (UIFlowService) is in the "Remote Desktop Users" group and not removed by group policy.|
3132
|TooManyActiveSessions|400|Unattended|Windows Server only.</br>You need to sign out at least one active session on the machine.|
3233
|SessionHasLoggedOff|400|Unattended|To solve this issue, see [SessionHasLoggedOff occurs during a desktop flow run connected with the cloud](session-has-logged-off-troubleshooting.md).|
3334
|SessionHasLoggedOffWithMaxIdleTime |400|Unattended|To solve this issue, see [SessionHasLoggedOffWithMaxIdleTime occurs during a desktop flow run](desktop-flow-max-session-duration-error.md).|
@@ -37,7 +38,7 @@ _Original KB number:_ &nbsp; 4555406
3738
|UnattendedUnsupportedWithOldConnection|403|Unattended|You need to create a new connection on the portal.|
3839
|RDPIsNotEnabled|400|Unattended|You need to enable Remote Desktop on the machine.|
3940
|UIFlowAlreadyRunning|429|Attended</br>Unattended|A desktop flow is already running on the machine. You need to wait for its completion. For more information about this error code, see [UIFlowAlreadyRunning](troubleshoot-desktop-flow-run-queue-errors.md#uiflowalreadyrunning).|
40-
|AadLogonFailure|400|Unattended|You need to disable Network Level Authentication (NLA) on the machine if you want to use Microsoft Entra credentials.|
41+
|MSEntraLogonFailure|400|Unattended|To resolve this issue, see [Desktop flows run failed with the MSEntraLogonFailure error code](ui-flows-run-failed-with-aadlogonfailure-error.md).|
4142
|Win10AlreadyHasActiveSession|400|Unattended|Windows 10 only. You need to sign out from the active session on the machine.|
4243
|UIFlowAgentNotAvailable|400|Attended</br>Unattended|You need to confirm that the service uiflowservice is up and running on your machine. If you have the following error when trying to start uiflowservice, see [Desktop flows failure](https://support.microsoft.com/help/4564550/):</br>**Windows could not start the UIFlowService service on Local Computer. Error 1069: The service did not start due to a logon failure**|
4344
|UnableToCallCrlEndpoint|400|Attended</br>Unattended|You need to ensure the revocation list for the certificates can be checked. Ensure that the CRL services aren't blocked on the target machine. The services that must be contacted are listed in this article: [Limits for automated, scheduled, and instant flows](/power-automate/limits-and-config#ui-flows-required-services)|

support/power-platform/power-automate/desktop-flows/troubleshoot-session-creation-errrors.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Session creation error codes in unattended desktop flow runs
33
description: Solves error codes related to session creation during unattended desktop flow runs in Power Automate.
44
author: johndund
55
ms.author: johndund
6-
ms.date: 06/06/2024
6+
ms.date: 02/11/2025
77
ms.reviewer: madiazor, guco, fredg
88
ms.custom: sap:Desktop flows\Unattended flow runtime errors
99
---
@@ -53,5 +53,6 @@ To solve the issue:
5353
- Ensure that you can remote desktop to the machine from another machine on your network. If you're using Windows Server, you can try to remote desktop to "localhost" from the local machine itself when logged in as another account. If these actions fail, see [General Remote Desktop connection troubleshooting](../../../windows-server/remote/rdp-error-general-troubleshooting.md).
5454
- If you have a legal notice enabled for login, work with your system administrator to try disabling it. To see if the legal notice is activated, open Registry Editor and go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System`. If `legalnoticecaption` or `legalnoticetext` isn't empty, work with your system administrator to disable the legal notice.
5555
- Ensure that no third-party software is installed that might affect login or interfere with creating a remote desktop connection.
56+
- If you use a domain account (DOMAIN\user) to connect, connectivity issues with the domain controller might prevent the session from opening correctly. Work with your system administrator to examine connectivity logs. If you're on a Microsoft Entra joined or Entra hybrid joined device, try using a UPN (`[email protected]`). To see if you can use a UPN, go to **Start** > **Run**, and run the [dsregcmd /status](/entra/identity/devices/troubleshoot-device-dsregcmd) command. If you see `AzureAdJoined: YES` under `Device State`, try changing the user specified in the connection to the `[email protected]` format.
5657

5758
[!INCLUDE [Third-party disclaimer](../../../includes/third-party-disclaimer.md)]

support/power-platform/power-automate/desktop-flows/ui-flows-run-failed-with-aadlogonfailure-error.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Desktop flows run failed with AadLogonFailure
3-
description: Provides a resolution for an issue where desktop flows run failed with the AadLogonFailure error code.
4-
ms.reviewer: fredg, johndund
2+
title: Desktop flows run failed with MSEntraLogonFailure
3+
description: Provides a resolution for an issue where desktop flows run failed with the MSEntraLogonFailure error code.
4+
ms.reviewer: fredg, johndund, alarnaud
55
author: QuentinSele
66
ms.author: quseleba
7-
ms.date: 11/20/2023
7+
ms.date: 02/08/2025
88
ms.custom: sap:Desktop flows\Power Automate for desktop errors
99
---
10-
# Desktop flows run failed with the AadLogonFailure error code
10+
# Desktop flows run failed with the MSEntraLogonFailure error code
1111

1212
This article provides a resolution to solve the unattended desktop flows run failure issue.
1313

@@ -16,13 +16,17 @@ _Original KB number:_ &nbsp; 4555446
1616

1717
## Symptoms
1818

19-
Your unattended desktop flows run failed with the error code **AadLogonFailure**.
19+
Your unattended desktop flows run failed with the error code **MSEntraLogonFailure**.
2020

2121
## Cause
2222

2323
Desktop flows failed to validate your Microsoft Entra credentials on the machine.
2424

25-
## Resolution
25+
## Resolution for Power Automate for desktop version 2.49 or later
26+
27+
You need to [configure Microsoft Entra authentication for Remote Desktop](/power-automate/desktop-flows/run-unattended-desktop-flows#admin-consent-for-unattended-runs-using-cba-or-sign-in-credentials-with-nla-preview).
28+
29+
## Resolution for Power Automate for desktop version 2.48 or earlier
2630

2731
You need to disable Network Level Authentication (NLA) on the machine.
2832

support/windows-365/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ items:
2121
href: ./troubleshoot-windows-365-boot.md
2222
- name: Windows 365 Boot known issues
2323
href: ./windows-365-boot-known-issues.md
24+
- name: Troubleshoot Windows 365 Enterprise Cloud PCs grace period issue
25+
href: ./troubleshoot-windows-365-enterprise-cloud-pcs-grace-period-issue.md
2426
- name: Windows 365 setup issues
2527
href: ./troubleshoot-windows-365-business.md
2628
- name: Windows 365 Switch known issues

0 commit comments

Comments
 (0)