FSLogix Profile Container Issue in Azure Virtual Desktop Environment

Sean Wu 0 Reputation points
2025-10-24T20:27:04.05+00:00

Hi,

I had to ask AI to summary my issue:

Environment Details:

  • Azure Virtual Desktop (AVD) session hosts: Azure AD joined (not domain-joined).
  • Storage backend: Azure Files with Microsoft Entra Kerberos enabled.
  • FSLogix profile containers configured to use Azure Files SMB share.

Problem:

  • FSLogix profile containers fail to mount.
  • SMB access to Azure Files share (<storageaccount>.file.core.windows.net\profiles) fails with:
  • Kerberos tickets are not issued (klist shows Cached Tickets: (0)).
  • AVD hosts fall back to NTLM, which Azure Files does not support for identity-based access.

Root Cause Analysis:

  1. Azure AD Kerberos not active on AVD hosts

   * dsregcmd /status shows:

   * Registry key HKLM\SOFTWARE\Microsoft\AzureADKerberos\Enabled = 1 was added manually, but feature did not activate.

   * Intune policy for Azure AD Kerberos could not apply because AVD VMs were not enrolled in Intune.

  1. Intune Enrollment Issues

   * AVD VMs did not appear in Intune → OMA-URI policy for Kerberos could not apply.

   * DeviceEligible : NO in dsregcmd /status confirmed enrollment was blocked.

   * Task Scheduler service was disabled by baseline → dsregcmd /join failed with 0x80041326.

  1. Network and Permissions

   * Port 445 connectivity verified (Test-NetConnection succeeded).

   * DNS resolution verified (nslookup succeeded).

   * IAM roles correctly assigned:

     * Storage File Data SMB Share Contributor for AVD user group and session hosts.

   * Microsoft Entra Kerberos enabled on storage account.

Actions Taken:

  • Enabled Microsoft Entra Kerberos on storage account.
  • Verified RBAC roles for users and session hosts.
  • Attempted registry-based activation of Azure AD Kerberos.
  • Tried Intune OMA-URI policy but blocked by lack of enrollment.
  • Attempted manual re-join (dsregcmd /join) but failed due to Task Scheduler disabled.
  • Restarted VMs after registry changes → No effect.
  • Confirmed FSLogix requires Kerberos for Azure Files SMB access.

Current State:

  • AVD hosts are Azure AD joined only.
  • Azure AD Kerberos feature is not active.
  • FSLogix profile containers cannot mount because Kerberos tickets are not issued.
  • Intune enrollment and policy application blocked by Task Scheduler service disabled.
  • One VM became unbootable after join attempts; recovery in progress.

Assistance Needed:

  • Confirm supported method to enable Azure AD Kerberos on Azure AD joined AVD hosts without domain join.
  • Guidance on enforcing Azure AD Kerberos policy when Intune enrollment is blocked by Task Scheduler.
  • Any alternative approach for FSLogix profile containers with Azure Files in cloud-only environments.

text

AzureAdJoined : YES

text

System error 86: The specified network password is not correctEnvironment Details:
Azure Virtual Desktop
Azure Virtual Desktop
A Microsoft desktop and app virtualization service that runs on Azure. Previously known as Windows Virtual Desktop.
{count} votes

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.