FSLogix Profile Container Issue in Azure Virtual Desktop Environment
Hi,
I had to ask AI to summary my issue:
Environment Details:
- Azure Virtual Desktop (AVD) session hosts: Azure AD joined (not domain-joined).
- Storage backend: Azure Files with Microsoft Entra Kerberos enabled.
- FSLogix profile containers configured to use Azure Files SMB share.
Problem:
- FSLogix profile containers fail to mount.
- SMB access to Azure Files share (<storageaccount>.file.core.windows.net\profiles) fails with:
- Kerberos tickets are not issued (klist shows Cached Tickets: (0)).
- AVD hosts fall back to NTLM, which Azure Files does not support for identity-based access.
Root Cause Analysis:
- Azure AD Kerberos not active on AVD hosts
* dsregcmd /status shows:
* Registry key HKLM\SOFTWARE\Microsoft\AzureADKerberos\Enabled = 1 was added manually, but feature did not activate.
* Intune policy for Azure AD Kerberos could not apply because AVD VMs were not enrolled in Intune.
- Intune Enrollment Issues
* AVD VMs did not appear in Intune → OMA-URI policy for Kerberos could not apply.
* DeviceEligible : NO in dsregcmd /status confirmed enrollment was blocked.
* Task Scheduler service was disabled by baseline → dsregcmd /join failed with 0x80041326.
- Network and Permissions
* Port 445 connectivity verified (Test-NetConnection succeeded).
* DNS resolution verified (nslookup succeeded).
* IAM roles correctly assigned:
* Storage File Data SMB Share Contributor for AVD user group and session hosts.
* Microsoft Entra Kerberos enabled on storage account.
Actions Taken:
- Enabled Microsoft Entra Kerberos on storage account.
- Verified RBAC roles for users and session hosts.
- Attempted registry-based activation of Azure AD Kerberos.
- Tried Intune OMA-URI policy but blocked by lack of enrollment.
- Attempted manual re-join (dsregcmd /join) but failed due to Task Scheduler disabled.
- Restarted VMs after registry changes → No effect.
- Confirmed FSLogix requires Kerberos for Azure Files SMB access.
Current State:
- AVD hosts are Azure AD joined only.
- Azure AD Kerberos feature is not active.
- FSLogix profile containers cannot mount because Kerberos tickets are not issued.
- Intune enrollment and policy application blocked by Task Scheduler service disabled.
- One VM became unbootable after join attempts; recovery in progress.
Assistance Needed:
- Confirm supported method to enable Azure AD Kerberos on Azure AD joined AVD hosts without domain join.
- Guidance on enforcing Azure AD Kerberos policy when Intune enrollment is blocked by Task Scheduler.
- Any alternative approach for FSLogix profile containers with Azure Files in cloud-only environments.
text
AzureAdJoined : YES
text
System error 86: The specified network password is not correctEnvironment Details: