Skip to content

Commit 997d1f3

Browse files
Merge branch 'main' into CI-7835
2 parents b41d9d3 + 72e82ac commit 997d1f3

33 files changed

Lines changed: 1478 additions & 388 deletions

File tree

.openpublishing.redirection.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13922,6 +13922,10 @@
1392213922
{
1392313923
"source_path": "support/power-platform/power-automate/desktop-flows/ui-automation/ui-sap-automation/sap-click-element-dpi.md",
1392413924
"redirect_url": "/troubleshoot/power-platform/power-automate/desktop-flows/sap-automation/sap-click-element-dpi"
13925+
},
13926+
{
13927+
"source_path": "support/power-platform/power-automate/desktop-flows/browser-automation/browser-automation-error-after-chromium-update.md",
13928+
"redirect_url": "/troubleshoot/power-platform/power-automate/desktop-flows/browser-automation/failed-to-assume-control-of-edge-chrome-firefox-error"
1392513929
}
1392613930
]
1392713931
}

support/azure/azure-monitor/app-insights/availability/availability-monitoring-common-issues-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ metadata:
44
description: Review a list of frequently asked questions (FAQ) about common issues that occur when you use Application Insights availability monitoring.
55
ms.topic: faq
66
ms.date: 07/09/2025
7-
ms.reviewer: v-leedennis, toddfous, v-weizhu
7+
ms.reviewer: toddfous
88
ms.service: azure-monitor
99
ms.custom: sap:Availability Tests
1010

support/azure/azure-storage/blobs/alerts/storage-explorer-troubleshooting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -479,7 +479,7 @@ If you accidentally attached by using an invalid shared access signature URL and
479479
Storage Explorer comes packaged with all dependencies it needs to run on Windows.
480480

481481
> [!NOTE]
482-
> Some components need command line access. If it's restricted, Storage Explorer might not work as expected. If you encounter issues, contact your system administrator.
482+
> Some components need command line access. If restricted, Storage Explorer might not work as expected. If you encounter issues, contact your system administrator.
483483
484484
## [macOS](#tab/macOS)
485485

@@ -840,7 +840,7 @@ docker run \
840840

841841
## Storage Explorer doesn't run within FSLogix session
842842

843-
If FSLogix manages your user profile, Storage Explorer might be unable to run due to an `EEXIST` error. The error occurs due to a known issue with recent versions of FSLogix. If you encounter the error, you can work around it by following these steps:
843+
If FSLogix manages your user profile, Storage Explorer might be unable to run due to an `EEXIST` error. The error occurs due to a known issue with certain versions of FSLogix. If you encounter the error, make sure you're using the latest version of FSLogix. If the issue still occurs, you can work around it by following these steps:
844844

845845
1. Open the Group Policy Management Console (gpmc.msc).
846846

support/azure/azure-storage/files/security/files-troubleshoot-smb-authentication.md

Lines changed: 58 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure Files identity-based authentication and authorization
33
description: Troubleshoot problems using identity-based authentication to connect to SMB Azure file shares and see possible resolutions.
44
ms.service: azure-file-storage
55
ms.custom: sap:Security, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
6-
ms.date: 02/11/2025
6+
ms.date: 12/05/2025
77
ms.reviewer: kendownie, v-surmaini, v-weizhu
88
---
99
# Troubleshoot Azure Files identity-based authentication and authorization issues (SMB)
@@ -173,12 +173,67 @@ The cmdlet performs these checks in sequence and provides guidance for failures:
173173
174174
If you just want to run a subselection of the previous checks, you can use the `-Filter` parameter, along with a comma-separated list of checks to run.
175175
176+
## Mount to Azure Files fails when using Entra Kerberos due to unsupported Kerberos encryption types
177+
178+
When mounting an Azure file share using Entra Kerberos authentication, the mount operation fails. Log collection might show that the Kerberos service ticket can't be decrypted.
179+
You might also find that the following registry key is configured: `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\SupportedEncryptionTypes`
180+
181+
### Cause
182+
183+
If the `SupportedEncryptionTypes` registry key is configured with a value that does **not include AES**, Windows will only allow the encryption types specified in the bitmask. For example, the value `0x7` indicates that the client supports only the following Kerberos encryption types:
184+
185+
- DES_CBC_CRC
186+
- DES_CBC_MD5
187+
- RC4_HMAC
188+
189+
Because Entra Kerberos always encrypts service tickets with **AES-256 (AES256-CTS-HMAC-SHA1-96)**, mounts will fail if AES isn't included in the supported encryption types for the account or machine.
190+
191+
> [!NOTE]
192+
> AES encryption is enabled by default on modern Windows operating systems. If the `SupportedEncryptionTypes` registry key isn't configured, Windows will automatically negotiate AES when available.
193+
194+
### Solution
195+
196+
To successfully mount Azure file shares using Entra Kerberos, AES-256 must be included in the supported encryption types.
197+
198+
Use one of the following options:
199+
200+
#### Option 1: Remove the registry key (recommended if not intentionally configured)
201+
202+
If the encryption types weren't deliberately restricted:
203+
204+
1. Delete the registry key: `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\Kerberos\Parameters\SupportedEncryptionTypes`
205+
1. Reboot the computer.
206+
207+
After rebooting, retry mounting the file share.
208+
209+
> [!TIP]
210+
> Removing the key restores Windows default behavior, allowing Active Directory to automatically negotiate AES for Kerberos tickets.
211+
212+
#### Option 2: Explicitly enable AES-256 using Group Policy
213+
214+
If your organization requires explicitly configured Kerberos encryption types:
215+
216+
1. Press **Win + R**, type `gpedit.msc`, and select **Enter**.
217+
1. Navigate to: **Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options**
218+
1. Open **Network Security: Configure encryption types allowed for Kerberos**.
219+
1. Enable the following encryption types:
220+
- **AES256_HMAC_SHA1**
221+
- **AES128_HMAC_SHA1** (optional)
222+
1. Apply the change and reboot the computer.
223+
224+
After rebooting, retry mounting the file share.
225+
226+
> [!IMPORTANT]
227+
> Entra Kerberos requires **AES256_HMAC_SHA1** to successfully mount Azure file shares. RC4 or DES-only configurations will fail.
228+
> To understand more about registry keys, see [Decrypting the Selection of Supported Kerberos Encryption Types](https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/decrypting-the-selection-of-supported-kerberos-encryption-types/1628797).
229+
176230
## Unable to configure directory/file level permissions (Windows ACLs) with Windows File Explorer
177231
178232
### Symptom
179233
180-
You might experience one of the symptoms described below when trying to configure Windows ACLs with File Explorer on a mounted file share:
181-
- After you click on **Edit permission** under the Security tab, the Permission wizard doesn't load.
234+
You might experience one of the symptoms described below when trying to configure Windows ACLs with Windows File Explorer on a mounted file share:
235+
236+
- After you click on **Edit permission** under the **Security** tab, the Permission wizard doesn't load.
182237
- When you try to select a new user or group, the domain location doesn't display the right AD DS domain.
183238
- You're using multiple AD forests and get the following error message: "The Active Directory domain controllers required to find the selected objects in the following domains are not available. Ensure the Active Directory domain controllers are available, and try to select the objects again."
184239

support/azure/information-protection/troubleshoot-aip-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How to troubleshoot Azure Information Protection policy issues
33
description: Discusses how to troubleshoot Azure Information Protection policy issues.
44
ms.date: 04/07/2022
5-
ms.service: information-protection
5+
ms.service: azure-information-protection
66
ms.author: jarrettr
77
author: JarrettRenshaw
88
ms.reviewer:

support/azure/information-protection/welcome-information-protection.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
title: Troubleshoot common issues with Azure Information Protection
88
description: Documentation for troubleshooting common issues with Azure Information Protection. # Required; article description that is displayed in search results. < 160 chars.
99
services: azure
10-
ms.service: information-protection #Required; service per approved list. service slug assigned to your service by ACOM.
10+
ms.service: azure-information-protection
1111
ms.topic: landing-page # Required
1212
author: JarrettRenshaw #Required; your GitHub user alias, with correct capitalization.
1313
ms.author: jarrettr #Required; microsoft alias of author; optional team alias.

support/azure/virtual-machines/linux/linux-azure-guest-agent-tools-vmassist.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Provides script-based tool to help diagnose and resolve Azure Guest
44
author: JarrettRenshaw
55
ms.author: jarrettr
66
manager: dcscontentpm
7-
ms.date: 10/24/2025
7+
ms.date: 12/04/2025
88
ms.reviewer: v-jsitser, scotro, v-ryanberg
99
ms.service: azure-virtual-machines
10-
ms.custom: sap:zzzz
10+
ms.custom: sap:VM Extensions not operating correctly
1111
---
1212
# Troubleshooting Tool for Linux Guest Agent - VM assist
1313

@@ -59,11 +59,12 @@ If no issues are discovered during the base checks by using bash, the Python scr
5959

6060
## How to run the tool
6161

62-
The VM assist scripting is run initially from the documentation. Subsequently, you can run the bash script directly: `vmassist.sh` as root or by using `sudo`.
62+
Go to the following GitHub location and follow the instructions there to [download, install, and run the tool](https://github.com/Azure/azure-support-scripts/blob/master/vmassist/linux/README.md). Subsequently, you can run the bash script directly: `vmassist.sh` as root or by using `sudo`.
6363

6464
If you open a support request, please include both of these files to aid the support agent who assists you.
6565

6666
## Known issues
67+
6768
- Don't try to run VM assist on appliances. Appliances don't run on general purpose operating systems, and the guest agent might not run at all.
6869
- Distributions outside PAYG versions of RedHat or SUSE, or any Ubuntu or Mariner or Azure Linux, might display false positive warnings about repository names. This situation requires a more careful reading because even official repositories might not match strict pattern matching. This condition is true because we don't build cases for all distributions.
6970
- Ubuntu 24.04 has a different architecture of the SSH service. It might flag the service even if the service is operating well.

support/azure/virtual-machines/windows/serial-console-overview.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,13 +32,16 @@ Serial Console is available for virtual machines and virtual machine scale sets
3232
- Australia Central 2
3333
- Australia East
3434
- Australia Southeast
35+
- Austria East
36+
- Belgium Central
3537
- Brazil South
3638
- Brazil Southeast
3739
- Canada Central
3840
- Canada East
3941
- Central India
4042
- Central US
4143
- Central US EUAP
44+
- Chile Central
4245
- China East 2
4346
- China East 3
4447
- China North 2
@@ -50,12 +53,15 @@ Serial Console is available for virtual machines and virtual machine scale sets
5053
- France South
5154
- Germany North
5255
- Germany West Central
56+
- Indonesia Central
5357
- Israel Central
58+
- Israel Northwest
5459
- Italy North
5560
- Japan East
5661
- Japan West
5762
- Korea Central
5863
- Korea South
64+
- Malaysia West
5965
- Mexico Central
6066
- New Zealand North
6167
- North Central US

support/azure/virtual-machines/windows/windows-vm-wureset-tool.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ ms.date: 11/18/2025
99
ms.custom: sap:Cannot create a VM, H1Hack27Feb2017
1010
ms.reviewer: macla, scotro, glimoli, jarrettr, azurevmcptcic
1111
---
12-
# Azure Virtual Machine (VM) Windows servicing stack reset tool
12+
# Azure Virtual Machine (VM) Windows Update Reset Tool
1313

1414
**Applies to:** :heavy_check_mark: Windows VMs
1515

1616
## Overview
1717

18-
This article covers steps to run a PowerShell script that resets the Windows servicing stack for a VM running in Azure. Running the tool can fix most problems that prevent Windows Updates from installing successfully.
18+
This article covers steps to run a PowerShell script that resets the Windows Update servicing stack for a VM running in Azure. Running the tool can fix most problems that prevent Windows Updates from installing successfully.
1919

2020
> [!NOTE]
2121
> This article is intended for use with support agents and IT professionals. If you're a home user and looking for more information about fixing Windows update errors, see [Fix Windows Update errors](https://support.microsoft.com/help/10164).
@@ -31,7 +31,7 @@ This article covers steps to run a PowerShell script that resets the Windows ser
3131
- Restarts services.
3232
- Generates a summary of actions performed.
3333

34-
For more information, see [Resetting Windows Update servicing stack script](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_WUA_Update_Reset?).
34+
For more information, see [Azure VM Windows WUA Update Reset Tool](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_WUA_Update_Reset?).
3535

3636

3737
:::image type="content" source="media/windows-vm-wureset-tool/windows-vm-wureset-tool.png" alt-text="Azure portal view Run Command example." lightbox="media/windows-vm-wureset-tool/windows-vm-wureset-tool.png":::
@@ -50,12 +50,12 @@ For more information, see [Run scripts in your Windows VM by using action run co
5050

5151
## Recommended workflow
5252

53-
1. Run `Windows_Update_Reset` to reset the servicing stack.
53+
1. Run `Windows_Update_Reset` to reset the Windows Update servicing stack.
5454
2. Try to install the Windows Update that previously failed.
5555

5656
## Additional resources
5757

58-
- [Resetting Window Update servicing stack script](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_Update_Reset).
58+
- [Azure VM Windows WUA Update Reset Tool](https://github.com/Azure/azure-support-scripts/blob/master/RunCommand/Windows/Windows_Update_Reset).
5959

6060

6161
[!INCLUDE [azure-help-support](~/includes/azure-help-support.md)]

0 commit comments

Comments
 (0)