Skip to content

Commit 379c972

Browse files
authored
Merge pull request #8575 from MicrosoftDocs/main
Auto push to live 2025-03-26 10:00:02
2 parents 7f80be8 + 47168b0 commit 379c972

File tree

10 files changed

+185
-72
lines changed

10 files changed

+185
-72
lines changed

.openpublishing.redirection.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13195,6 +13195,18 @@
1319513195
{
1319613196
"source_path": "support/windows-server/active-directory/connection-adfs-failed-set-msoladfscontex.md",
1319713197
"redirect_url": "/previous-versions/troubleshoot/windows-server/connection-adfs-failed-set-msoladfscontex"
13198+
},
13199+
{
13200+
"source_path": "support/windows-client/user-profiles-and-logon/error-invalid-store-path-loadstate-user-state-migration-tool.md",
13201+
"redirect_url": "/troubleshoot/windows-client/setup-upgrade-and-drivers/error-invalid-store-path-loadstate-user-state-migration-tool"
13202+
},
13203+
{
13204+
"source_path": "support/windows-server/active-directory/file-replication-service-event-13552-13555.md",
13205+
"redirect_url": "/troubleshoot/windows-server/networking/file-replication-service-event-13552-13555"
13206+
},
13207+
{
13208+
"source_path": "support/windows-server/active-directory/remove-orphaned-domains.md",
13209+
"redirect_url": "/troubleshoot/windows-server/windows-security/remove-orphaned-domains"
1319813210
}
1319913211
]
1320013212
}

support/azure/virtual-machines/windows/reset-rdp.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.collection: windows
1212
ms.workload: infrastructure-services
1313
ms.tgt_pltfrm: vm-windows
1414
ms.topic: troubleshooting
15-
ms.date: 10/18/2024
15+
ms.date: 03/26/2025
1616
ms.author: genli
17-
ms.reviewer: herensin
17+
ms.reviewer: herensin, v-monicaba
1818
---
1919
# Reset Remote Desktop Services or its administrator password in a Windows VM
2020

@@ -91,6 +91,22 @@ First, make sure that you have the [latest PowerShell module installed and conf
9191
9292
1. If you still can't connect remotely to your virtual machine, see [Troubleshoot Remote Desktop connections to a Windows-based Azure virtual machine](troubleshoot-rdp-connection.md). If you lose the connection to the Windows domain controller, you will need to restore it from a domain controller backup.
9393
94+
## Troubleshoot and support
95+
96+
### Error messages
97+
98+
| Error | Description |
99+
| ---- | ---- |
100+
| {"innererror": {"internalErrorCode": "CannotModifyExtensionsWhenVMNotRunning"}, "code": "OperationNotAllowed","message": "Cannot modify extensions in the VM when the VM is not running."} | This error indicates that the operation to modify extensions in the VM isn't allowed because the VM isn't running. <br><br> To resolve this issue, ensure that the VM is running before attempting to modify extensions. |
101+
| VM has reported a failure when processing extension 'enablevmAccess' (publisher 'Microsoft.Compute' and type 'VMAccessAgent'). Error message: 'VMAccess Extension does not support Domain Controller.'. More information on troubleshooting is available at https://aka.ms/vmextensionwindowstroubleshoot . | This error indicates that the VM extension "enablevmAccess" failed because it doesn't support a domain controller. <br><br> To resolve this issue, ensure that the VM isn't configured as a domain controller when using this extension. For more information, see [Reset Remote Desktop Services or its administrator password in a Windows VM](reset-rdp.md). |
102+
| VM 'vmname' has not reported status for VM agent or extensions. Verify that the OS is up and healthy, the VM has a running VM agent, and that it can establish outbound connections to Azure storage. Please refer to https://aka.ms/vmextensionwindowstroubleshoot for additional VM agent troubleshooting information. | To troubleshoot this error, see [Troubleshooting checklist](windows-azure-guest-agent.md#troubleshooting-checklist). |
103+
|VM has reported a failure when processing extension 'enablevmAccess' (publisher 'Microsoft.Compute' and type 'VMAccessAgent'). Error message: 'Cannot update Remote Desktop Connection settings for Administrator account. Error: System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. ---> System.Runtime.InteropServices.COMException: The password does not meet the password policy requirements. Check the minimum password length, password complexity, and password history requirements. --- End of inner exception stack trace --- at System.DirectoryServices.DirectoryEntry.Invoke(String methodName, Object[] args) at Microsoft.WindowsAzure.GuestAgent.Plugins.WindowsUser.SetPassword(SecureString password, Boolean expirePassword) at Microsoft.WindowsAzure.GuestAgent.Plugins.RemoteAccessAccountManager.AddOrUpdateRemoteUserAccount(String userName, SecureString password, Boolean expirePassword) at Microsoft.WindowsAzure.GuestAgent.Plugins.JsonExtensions.VMAccess.VMAccessExtension.OnEnable()'. More information on troubleshooting is available at https://aka.ms/vmextensionwindowstroubleshoot. | This error indicates that the VM extension "enablevmAccess" failed to update the Remote Desktop Connection settings for the Administrator account due to a password policy violation. <br><br> To resolve this issue, ensure that the password meets Windows password policy requirements, including minimum length, complexity, and history. For more information, see [Troubleshoot VM extensions](/azure/virtual-machines/extensions/features-windows#troubleshoot-vm-extensions). |
104+
| VM has reported a failure when processing extension 'enablevmAccess' (publisher 'Microsoft.Compute' and type 'VMAccessAgent'). Error message: 'The Admin User Account password cannot be null or empty if provided the username.'. More information on troubleshooting is available at https://aka.ms/vmextensionwindowstroubleshoot . | This error indicates that the VM extension "enablevmAccess" failed because the Admin User Account password wasn't provided. <br><br> To resolve this issue, ensure that a non-null and non-empty password is specified for the Admin User Account. |
105+
| Provisioning of VM extension enablevmaccess has timed out. Extension provisioning has taken too long to complete. The extension did not report a message. | This error message indicates that the provisioning of the VM extension "enablevmaccess" has timed out because it took too long to complete. Additionally, the extension didn't provide any status message during the process. <br><br> To resolve this issue, consider checking the VM's performance and network conditions, and then retry the provisioning operation. For more information, see [Troubleshooting Azure Windows VM extension failures](/azure/virtual-machines/extensions/troubleshoot). |
106+
| VM has reported a failure when processing extension 'enablevmAccess' (publisher 'Microsoft.Compute' and type 'VMAccessAgent'). Error message: 'Cannot update Remote Desktop Connection settings for Administrator account. Error: System.Exception: User account scsadmin already exists but cannot be updated because it is not in the Administrators group. at Microsoft.WindowsAzure.GuestAgent.Plugins.RemoteAccessAccountManager.AddOrUpdateRemoteUserAccount(String userName, SecureString password, Boolean expirePassword) at Microsoft.WindowsAzure.GuestAgent.Plugins.JsonExtensions.VMAccess.VMAccessExtension.OnEnable()'. More information on troubleshooting is available at https://aka.ms/vmextensionwindowstroubleshoot . | This error indicates that the VM extension "enablevmAccess" failed because the user account "scsadmin" already exists but isn't in the Administrators group. <br><br> To resolve this issue, ensure that the user account is added to the Administrators group.|
107+
| VM has reported a failure when processing extension 'enablevmaccess' (publisher 'Microsoft.Compute' and type 'VMAccessAgent'). Error message: 'Cannot update Remote Desktop Connection settings for Administrator account. Error: System.Runtime.InteropServices.COMException (0x800708C5): The password does not meet the password policy requirements. Check the minimum password length, password complexity, and password history requirements. at System.DirectoryServices.DirectoryEntry.CommitChanges() at Microsoft.WindowsAzure.GuestAgent.Plugins.WindowsUser.SetPassword(SecureString password, Boolean expirePassword) at Microsoft.WindowsAzure.GuestAgent.Plugins.WindowsUserManager.CreateUserInGroup(String userName, SecureString password, Boolean expirePassword, String[] groups) at Microsoft.WindowsAzure.GuestAgent.Plugins.RemoteAccessAccountManager.AddOrUpdateRemoteUserAccount(String userName, SecureString password, Boolean expirePassword) at Microsoft.WindowsAzure.GuestAgent.Plugins.JsonExtensions.VMAccess.VMAccessExtension.OnEnable()'. More information on troubleshooting is available at https://aka.ms/vmextensionwindowstroubleshoot . | This error message indicates that the VM failed to process the "enablevmaccess" extension due to an issue with updating the Remote Desktop Connection settings for the Administrator account. The specific error is related to the password not meeting the policy requirements, such as minimum length, complexity, and history. <br><br> To resolve this issue, ensure that the password complies with the required policy standards. For more information, see [Troubleshoot VM extensions](/azure/virtual-machines/extensions/features-windows#troubleshoot-vm-extensions). |
108+
| {"innererror": {"internalErrorCode": "MultipleExtensionsPerHandlerNotAllowed"}, "code": "BadRequest","message": "Multiple VMExtensions per handler not supported for OS type 'Windows'. VMExtension 'enablevmaccess' with handler 'Microsoft.Compute.VMAccessAgent' already added or specified in input."} | This error message indicates that the OS type "Windows" doesn't support multiple VM extensions per handler. The "enablevmaccess" extension with the handler "Microsoft.Compute.VMAccessAgent" has already been added or specified in the input. <br><br> To resolve this issue, ensure that only one extension per handler is configured for the VM. <br><br> You can manually remove an extension by using the following PowerShell cmdlet and retry the operation: <br> `Remove-AzVMExtension -ResourceGroupName "ResourceGroup11" -Name "ExtensionName" -VMName "VirtualMachineName"` |
109+
94110
## Next steps
95111
96112
- If the Azure VM access extension fails to install you can [troubleshoot VM extension issues](/azure/virtual-machines/extensions/troubleshoot?toc=/azure/virtual-machines/windows/toc.json).

support/windows-client/user-profiles-and-logon/error-invalid-store-path-loadstate-user-state-migration-tool.md renamed to support/windows-client/setup-upgrade-and-drivers/error-invalid-store-path-loadstate-user-state-migration-tool.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ audience: itpro
77
ms.topic: troubleshooting
88
ms.reviewer: kaushika, shijoy
99
ms.custom:
10-
- sap:user logon and profiles\user profiles
11-
- pcy:WinComm Directory Services
10+
- sap:windows setup,upgrade and deployment\user state migration tool (usmt)
11+
- pcy:WinComm Devices Deploy
1212
---
1313
# Error "Invalid store path" during the LoadState process when you use the User State Migration Tool
1414

support/windows-client/toc.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -839,6 +839,8 @@ items:
839839
href: ./setup-upgrade-and-drivers/updates-not-install-with-fast-startup.md
840840
- name: User state migration tool
841841
items:
842+
- name: Error "Invalid store path" during the LoadState process
843+
href: setup-upgrade-and-drivers/error-invalid-store-path-loadstate-user-state-migration-tool.md
842844
- name: USMT common issues
843845
href: ./setup-upgrade-and-drivers/usmt-common-issues.md
844846
- name: USMT return codes
@@ -1103,14 +1105,12 @@ items:
11031105
href: ./user-profiles-and-logon/cached-user-logon-fails-lsasrv-event-45058.md
11041106
- name: User profiles
11051107
items:
1106-
- name: Can't set a convenience PIN
1107-
href: ./user-profiles-and-logon/cannot-configure-a-convenience-pin.md
11081108
- name: Create a new profile if the profile is damaged
11091109
href: ./user-profiles-and-logon/create-new-user-profile.md
1110-
- name: Error "Invalid store path" during the LoadState process
1111-
href: ./user-profiles-and-logon/error-invalid-store-path-loadstate-user-state-migration-tool.md
11121110
- name: Windows Hello for Business
11131111
items:
1112+
- name: Can't set a convenience PIN
1113+
href: user-profiles-and-logon/cannot-configure-a-convenience-pin.md
11141114
- name: Windows Hello errors during PIN creation in Windows 10
11151115
href: ./user-profiles-and-logon/windows-hello-errors-during-pin-creation-in-windows-10.md
11161116
- name: Retrieve certificate to troubleshoot Windows Hello for Business logon failures

support/windows-server/active-directory/cannot-promote-dc-to-global-catalog-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ For more information, see:
120120
[Clean up server metadata by using GUI tools](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc816907(v=ws.10))
121121
[Clean up Active Directory Domain Controller server metadata](/windows-server/identity/ad-ds/deploy/ad-ds-metadata-cleanup).
122122

123-
After you have verified that the replication between domain controllers is working correctly, determine whether an orphaned domain object exists. You can use the Ntdsutil.exe utility to clear the orphaned domain object. If there's any orphaned domain controller object for that domain, also delete the domain controller object. For more information, see [How to remove orphaned domains from Active Directory](remove-orphaned-domains.md).
123+
After you have verified that the replication between domain controllers is working correctly, determine whether an orphaned domain object exists. You can use the Ntdsutil.exe utility to clear the orphaned domain object. If there's any orphaned domain controller object for that domain, also delete the domain controller object. For more information, see [How to remove orphaned domains from Active Directory](../windows-security/remove-orphaned-domains.md).
124124

125125
For more information about how to remove orphaned domain controller objects, see [Clean up Active Directory Domain Controller server metadata](/windows-server/identity/ad-ds/deploy/ad-ds-metadata-cleanup).
126126

@@ -150,4 +150,4 @@ The command completed successfully
150150

151151
Verify that the `Flags` entry of the output includes `GC`.
152152

153-
For more information, see [How to remove orphaned domains from Active Directory](remove-orphaned-domains.md).
153+
For more information, see [How to remove orphaned domains from Active Directory](../windows-security/remove-orphaned-domains.md).
Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
---
2+
title: Error 0x5 Access Denied When You Rename a Computer That Is a Member of a Domain
3+
description: Helps resolve error 0x5 Access Denied when you rename a computer that is a member of a domain.
4+
ms.date: 03/26/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.reviewer: kaushika, raviks, herbertm, dennhu, eriw, v-lianna
9+
ms.custom:
10+
- sap:active directory\on-premises active directory domain join
11+
- pcy:WinComm Directory Services
12+
---
13+
# Error 0x5 Access Denied when you rename a computer that is member of a domain
14+
15+
This article helps resolve error 0x5 **Access Denied** when you rename a computer that is a member of a domain.
16+
17+
When you check the **NetSetup.log** file, you see the following entries:
18+
19+
```output
20+
NetpChangeMachineName: from 'TESTNAME97' to 'TESTNAME98' using 'ADATUM.COM\test_adm_user' [0x2]
21+
NetpDsGetDcName: trying to find DC in domain 'ADATUM', flags: 0x1010
22+
NetpDsGetDcName: found DC '\\ADATUMDC01' in the specified domain
23+
NetpChangeMachineName: status of connecting to dc '\\ADATUMDC01': 0x0
24+
NetpGetLsaPrimaryDomain: status: 0x0
25+
NetpManageMachineAccountWithSid: status of NetUserSetInfo on '\\ADATUMDC01' for 'TESTNAME97$': 0x5 Access Denied
26+
```
27+
28+
`NetUserSetInfo` targets the domain controller (DC) Security Accounts Manager Server (SAM) server component, which uses the SAM Remote Procedure Call (RPC) function on Server Message Block (SMB) Named Pipes. Here's the complete TCP connection network traffic during the NetSetup failure event, which indicates the failure at a SAM connection:
29+
30+
```output
31+
ADATUMDC01 10.101.56.150 TCP TCP: [Bad CheckSum]Flags=...A..S., SrcPort=Microsoft-DS(445), DstPort=59729, PayloadLen=0, Seq=347025249, Ack=2963325843, Win=8192 (Negotiated scale factor 0x8) = 8192
32+
10.101.56.150 ADATUMDC01 TCP TCP:Flags=...A...., SrcPort=59729, DstPort=Microsoft-DS(445), PayloadLen=0, Seq=2963325843, Ack=347025250, Win=256
33+
...
34+
ADATUMDC01 10.101.56.150 MSRPC MSRPC:c/o Fault: Call=0x2 Context=0x0 Status=0x5 Cancels=0x0 0x5 Access Denied
35+
...
36+
```
37+
38+
## Security policy prevent malicious SAM enumeration
39+
40+
Remote SAM access control was introduced in Windows Server 2016 and Windows 10, version 1607 and later versions as a new security policy to prevent malicious SAM enumeration. Here's the information of the policy:
41+
42+
|Security policy path |Local Security Policy > Security Settings > Local Policies > Security Options |
43+
|---------|---------|
44+
|**Policy** |**Network access: Restrict clients allowed to make remote calls to SAM** |
45+
|**Registry value** |`HKLM\SYSTEM\CurrentControlSet\Control\Lsa\RestrictRemoteSam` |
46+
47+
Only security groups allowed to read the Remote SAM Remote Procedure Call (RPC) access defined in the policy setting can set up a SAM connection with the target machine.
48+
49+
This policy setting isn't useful on DCs because Active Directory objects have their own access control settings, which aren't available for domain members or stand-alone machines with the SAM database.
50+
51+
DCs might have the setting as it stays configured when you promote a member server with this setting to be a DC.
52+
53+
To resolve this issue, you can use one of the following methods:
54+
55+
## Method 1: Define a policy setting for DCs that allows the calls
56+
57+
Set the **Network access: Restrict clients allowed to make remote calls to SAM** policy to allow **Everyone** or **Authenticated Users** and apply it to all DCs.
58+
59+
This resolves the problem for all DCs, and ensures they all use the same setting.
60+
61+
## Method 2: Delete the registry value RestrictRemoteSam
62+
63+
> [!NOTE]
64+
>
65+
> - Only consider this approach if for some reason you can't follow method 1. With this method, you might encounter the problem again if a DC happens to have `RestrictRemoteSam` set to a restrictive Access Control List.
66+
> - The default Security Descriptor Definition Language (SDDL) could be overwritten by the setting defined in other level Group Policy Objects (GPOs).
67+
68+
Delete the registry value to apply the default SDDL. The default value for DCs means that everyone has read permissions to preserve compatibility. To delete the registry value, run the following command:
69+
70+
```console
71+
reg delete "HKLM\system\currentControlSet\control\lsa" /v restrictRemoteSam /f
72+
```
73+
74+
> [!NOTE]
75+
> This change doesn't require a restart.
76+
77+
A customized SDDL for the policy might result in unexpected failures. Here're some scenarios to be aware of:
78+
79+
- Admin tools, scripts, and software that previously enumerated users, groups, and group memberships might fail.
80+
- Remote Desktop Protocol (RDP) connections to Remote Desktop Services (RDS) Servers fail when the RDS tries to retrieve user details using remote SAM RPC calls.
81+
- Applications that use Authorization (AuthZ) against accounts that are disabled can run into Access Denied errors. For example, Microsoft Exchange Server might encounter this issue during Offline Address Book (OAB) generation checks.
82+
83+
For more information, see [AuthZ fails with an Access Denied error when an application does access checks in Windows Server](../group-policy/authz-fails-access-denied-error-application-access-check.md).

support/windows-server/active-directory/rodc-replicates-passwords-grant-incorrect-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ audience: itpro
77
ms.topic: troubleshooting
88
ms.reviewer: kaushika, v-jeffbo
99
ms.custom:
10-
- sap:active directory\active directory backup,restore,or disaster recovery
10+
- sap:active directory\active directory replication and topology
1111
- pcy:WinComm Directory Services
1212
---
1313
# RODC replicates passwords when it's granted incorrect permissions in Windows Server

support/windows-server/active-directory/file-replication-service-event-13552-13555.md renamed to support/windows-server/networking/file-replication-service-event-13552-13555.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ audience: itpro
77
ms.topic: troubleshooting
88
ms.reviewer: kaushika, skushida, v-ivz, shinicht, torumi
99
ms.custom:
10-
- sap:active directory\active directory backup,restore,or disaster recovery
11-
- pcy:WinComm Directory Services
10+
- sap:network connectivity and file sharing\file replication technologies (frs and dfsr)
11+
- pcy:WinComm Networking
1212
---
1313
# Event ID 13552 and 13555 are logged in the File Replication Service log on a Windows-based domain controller
1414

0 commit comments

Comments
 (0)