Skip to content

Commit 4ae54a2

Browse files
authored
Merge pull request #8822 from MicrosoftDocs/main
Auto push to live 2025-04-28 10:35:22
2 parents 62193ce + 01cf3fe commit 4ae54a2

File tree

8 files changed

+78
-54
lines changed

8 files changed

+78
-54
lines changed

.openpublishing.redirection.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13679,6 +13679,10 @@
1367913679
{
1368013680
"source_path": "support/dynamics/gp/suta-futa-taxable-wages-are-off.md",
1368113681
"redirect_url": "/troubleshoot/dynamics/gp/welcome-gp"
13682+
},
13683+
{
13684+
"source_path": "support/windows-server/active-directory/dcs-cannot-be-located-high-rate-outbound-sessions.md",
13685+
"redirect_url": "/troubleshoot/windows-server/user-profiles-and-logon/dcs-cannot-be-located-high-rate-outbound-sessions"
1368213686
}
1368313687
]
1368413688
}

support/azure/azure-kubernetes/create-upgrade-delete/429-too-many-requests-errors.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,6 @@ For an AKS cluster, you can use [AKS Diagnose and Solve Problems](/azure/aks/aks
8282
- Host: The host where HTTP status 429 responses were detected. Azure Resource Manager throttles come from `management.azure.com`; anything else is a lower-layer resource provider.
8383
- User agent: Requests with a specified user agent that were throttled.
8484
- Operation: Operations where HTTP status 429 responses were detected.
85-
- Client IP: The client IP address that sent the throttled requests.
8685

8786
Request throttling can be caused by a combination of any cluster in this subscription, not just the request rate for this cluster.
8887

support/azure/virtual-machines/linux/serial-console-linux.md

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -33,25 +33,18 @@ For Serial Console documentation for Windows, see [Serial Console for Windows](.
3333
> [!NOTE]
3434
> Serial Console is compatible with a managed boot diagnostics storage account.
3535
36-
## Prerequisites
36+
## Prerequisites to access the Azure Serial Console
3737

38-
- Your VM or virtual machine scale set instance must use the resource management deployment model. Classic deployments aren't supported.
38+
To access the Serial Console on your VM or virtual machine scale set instance, you will need the following:
3939

40-
- Your account that uses serial console must have the [Virtual Machine Contributor role](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) for the VM and the [boot diagnostics](../windows/boot-diagnostics.md) storage account
40+
- Boot diagnostics must be enabled for the VM.
41+
- A user account that uses password authentication must exist within the VM. You can create a password-based user with the [reset password](/azure/virtual-machines/extensions/vmaccess#reset-password) function of the VM access extension. Select **Reset password** from the **Help** section.
42+
- The Azure account accessing Serial Console must have [Virtual Machine Contributor role](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) for both the VM and the [boot diagnostics](../windows/boot-diagnostics.md) storage account.
43+
- Classic deployments aren't supported. Your VM or virtual machine scale set instance must use the Azure Resource Manager deployment model.
44+
- Serial Console is not supported when the storage account has **Allow storage account key access** disabled.
4145

42-
- Your VM or virtual machine scale set instance must have a password-based user. You can create one with the [reset password](/azure/virtual-machines/extensions/vmaccess#reset-password) function of the VM access extension. Select **Reset password** from the **Help** section.
43-
44-
- Your VM or virtual machine scale set instance must have [boot diagnostics](../windows/boot-diagnostics.md) enabled.
45-
46-
:::image type="content" source="media/serial-console-linux/diagnostics-settings.png" alt-text="Screenshot of the Diagnostics settings page in Azure portal. The Boot diagnostics option is enabled.":::
47-
48-
- For settings specific to Linux distributions, see [Serial console Linux distribution availability](#serial-console-linux-distribution-availability).
49-
50-
- Your VM or virtual machine scale set instance must be configured for serial output on `ttys0`. This is the default for Azure images, but you will want to double check this on custom images. Details [below](#custom-linux-images).
51-
52-
> [!NOTE]
53-
> The serial console requires a local user with a configured password. VMs or virtual machine scale sets configured only with an SSH public key won't be able to sign in to the serial console. To create a local user with a password, use the [VMAccess Extension](/azure/virtual-machines/extensions/vmaccess), which is available in the portal by selecting **Reset password** in the Azure portal, and create a local user with a password.
54-
> You can also reset the administrator password in your account by [using GRUB to boot into single user mode](./serial-console-grub-single-user-mode.md).
46+
> [!IMPORTANT]
47+
> Serial Console is now compatible with [managed boot diagnostics storage accounts](../windows/boot-diagnostics.md) and custom storage account firewalls.
5548
5649
## Serial Console Linux distribution availability
5750

@@ -143,7 +136,7 @@ After the IP addresses are successfully added to the storage account firewall, r
143136

144137
### Access security
145138

146-
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multi-factor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
139+
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multifactor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
147140

148141
### Channel security
149142

support/azure/virtual-machines/linux/troubleshoot-ssh-connection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Use Network Watcher's [Next hop](/azure/network-watcher/diagnose-vm-network-rout
8181

8282
## Use the Azure VM Serial Console
8383

84-
The [Azure VM Serial Console](./serial-console-linux.md) provides access to a text-based console for Linux virtual machines. You can use the console to troubleshoot your SSH connection in an interactive shell. Ensure you have met the [prerequisites](./serial-console-linux.md#prerequisites) for using Serial Console and try the commands below to further troubleshoot your SSH connectivity.
84+
The [Azure VM Serial Console](./serial-console-linux.md) provides access to a text-based console for Linux virtual machines. You can use the console to troubleshoot your SSH connection in an interactive shell. Ensure you have met the [prerequisites](./serial-console-linux.md#prerequisites-to-access-the-azure-serial-console) for using Serial Console and try the commands below to further troubleshoot your SSH connectivity.
8585

8686
### Check that SSH service is running
8787

support/azure/virtual-machines/windows/serial-console-windows.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -33,17 +33,18 @@ For serial console documentation for Linux, see [Azure Serial Console for Linux]
3333
> [!NOTE]
3434
> Serial Console is compatible with a managed boot diagnostics storage account.
3535
36-
## Prerequisites
36+
## Prerequisites to access the Azure Serial Console
3737

38-
* Your VM or virtual machine scale set instance must use the resource management deployment model. Classic deployments aren't supported.
38+
To access the Serial Console on your VM or virtual machine scale set instance, you will need the following:
3939

40-
* Your account that uses serial console must have the [Virtual Machine Contributor role](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) for the VM and the [boot diagnostics](boot-diagnostics.md) storage account
40+
- Boot diagnostics must be enabled for the VM.
41+
- A user account that uses password authentication must exist within the VM. You can create a password-based user with the [reset password](/azure/virtual-machines/extensions/vmaccess#reset-password) function of the VM access extension. Select **Reset password** from the **Help** section.
42+
- The Azure account accessing Serial Console must have [Virtual Machine Contributor role](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) for both the VM and the [boot diagnostics](boot-diagnostics.md) storage account.
43+
- Classic deployments aren't supported. Your VM or virtual machine scale set instance must use the Azure Resource Manager deployment model.
44+
- Serial Console is not supported when the storage account has **Allow storage account key access** disabled.
4145

42-
* Your VM or virtual machine scale set instance must have a password-based user. You can create one with the [reset password](/azure/virtual-machines/extensions/vmaccess#reset-password) function of the VM access extension. Select **Reset password** from the **Help** section.
43-
44-
* The VM for virtual machine scale set instance must have [boot diagnostics](boot-diagnostics.md) enabled.
45-
46-
:::image type="content" source="media/serial-console-windows/diagnostics-settings.png" alt-text="Screenshot of the Boot diagnostics option under the Diagnostics settings.":::
46+
> [!IMPORTANT]
47+
> Serial Console is now compatible with [managed boot diagnostics storage accounts](boot-diagnostics.md) and custom storage account firewalls.
4748
4849
## Enable Serial Console functionality for Windows Server
4950

@@ -197,7 +198,7 @@ After the IP addresses are successfully added to the storage account firewall, r
197198

198199
### Access security
199200

200-
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multi-factor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
201+
Access to the serial console is limited to users who have an access role of [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) or higher to the virtual machine. If your Microsoft Entra tenant requires multifactor authentication (MFA), then access to the serial console will also need MFA because the serial console's access is through the [Azure portal](https://portal.azure.com).
201202

202203
### Channel security
203204

@@ -215,7 +216,7 @@ The Azure portal or [Azure CLI](/cli/azure/serial-console) act as remote termina
215216

216217
### Audit logs
217218

218-
All access to the serial console is currently logged in the [boot diagnostics](./boot-diagnostics.md) logs of the virtual machine. Access to these logs are owned and controlled by the Azure virtual machine administrator.
219+
All access to the serial console is currently logged in the [boot diagnostics](./boot-diagnostics.md) logs of the virtual machine. Access to these logs is owned and controlled by the Azure virtual machine administrator.
219220

220221
> [!CAUTION]
221222
> No access passwords for the console are logged. However, if commands run within the console contain or output passwords, secrets, user names, or any other form of personally identifiable information (PII), those will be written to the VM boot diagnostics logs. They will be written along with all other visible text, as part of the implementation of the serial console's scroll back function. These logs are circular and only individuals with read permissions to the diagnostics storage account have access to them. However, we recommend following the best practice of using the Remote Desktop for anything that may involve secrets and/or PII.
@@ -243,7 +244,7 @@ The serial console has screen reader support built in. Navigating around with a
243244

244245
Scenario | Actions in the serial console
245246
:------------------|:-----------------------------------------
246-
Incorrect firewall rules | Access serial console and fix Windows firewall rules.
247+
Incorrect firewall rules | Access Serial Console and fix Windows Firewall rules.
247248
Filesystem corruption/check | Access the serial console and recover the filesystem.
248249
RDP configuration issues | Access the serial console and change the settings. For more information, see the [RDP documentation](/windows-server/remote/remote-desktop-services/clients/remote-desktop-allow-access).
249250
Network lock down system | Access the serial console from the Azure portal to manage the system. Some network commands are listed in [Windows commands: CMD and PowerShell](serial-console-cmd-ps-commands.md).
@@ -261,7 +262,7 @@ SAC does not take up the entire Serial Console area in the browser | This is a k
261262
Unable to type at SAC prompt if kernel debugging is enabled. | RDP to VM and run `bcdedit /debug {current} off` from an elevated command prompt. If you can't RDP, you can instead attach the OS disk to another Azure VM and modify it while attached as a data disk by running `bcdedit /store <drive letter of data disk>:\boot\bcd /debug <identifier> off`, then swapping the disk back.
262263
Pasting into PowerShell in SAC results in a third character if the original content had a repeating character. | For a workaround, run `Remove-Module PSReadLine` to unload the PSReadLine module from the current session. This action will not delete or uninstall the module.
263264
Some keyboard inputs produce strange SAC output (for example, **[A**, **[3~**). | [VT100](/windows/console/console-virtual-terminal-sequences) escape sequences aren't supported by the SAC prompt.
264-
Pasting long strings doesn't work. | The serial console limits the length of strings pasted into the terminal to 2048 characters to prevent overloading the serial port bandwidth.
265+
Pasting long strings doesn't work. | The serial console limits the length of strings pasted into the terminal to 2,048 characters to prevent overloading the serial port bandwidth.
265266

266267
## Frequently asked questions
267268

support/windows-server/system-management-components/error-event-1601-click-roles-server-manager.md

Lines changed: 45 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,69 @@
11
---
22
title: Error message when you select Roles in Server Manager on Windows Server
33
description: Resolves the Windows Server problem in which selecting Roles in Server Manager generates an error message and Event 1601.
4-
ms.date: 01/15/2025
4+
ms.date: 04/28/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
8-
ms.reviewer: kaushika
8+
ms.reviewer: kaushika, warrenw, adrianlutai
99
ms.custom:
1010
- sap:system management components\server manager
1111
- pcy:WinComm User Experience
1212
---
1313
# Error message when you select Roles in Server Manager on Windows Server
1414

15-
This article provides a resolution to the Windows Server problem in which selecting Roles in Server Manager generates an error message and event 1601.
15+
This article provides a resolution to the Windows Server problem in which selecting Roles in Server Manager generates an error message.
1616

1717
_Original KB number:_ &nbsp; 971509
1818

1919
## Symptoms
2020

21-
When you click **Roles** in **Server Manager** on a Windows Server computer, your profile doesn't load correctly and you receive an error message. If you select **Error Details**, you see the following message:
21+
When you install roles in **Server Manager** on a Windows Server computer, your profile doesn't load correctly and you receive an error message. If you select **Error Details**, you see the following message:
2222

2323
> **Server Manager:**
24-
Unexpected error refreshing Server Manager; cannot open an anonymous level security token. (Exception from HRESULT: 0x00070543)
24+
Unexpected error refreshing Server Manager; cannot open an anonymous level security token. (Exception from HRESULT: 0x80070543)
2525
For more information, see the event log: Diagnostics, Event Viewer, Applications and Services Logs, Microsoft, Windows, Server Manager, Operational.
2626

27-
To see the event details, open Event Viewer and navigate to **Applications and Services Logs\\Microsoft\\Windows\\Server Manager\\Operational**. Look for Event 1601. This entry provides the following information:
28-
29-
> Log Name: Microsoft-Windows-Server Manager/Operational
30-
Source: Microsoft-Windows-ServerManager
31-
Date: MM/DD/YYYY hr:min:sec PM
32-
Event ID: 1601
33-
Task Category: None
34-
Level: Error
35-
Keywords:
36-
User: XXXXXXXXXXXX
37-
Computer: XXXXXX.XXXXX
38-
Description:
39-
Could not discover the state of the system. An unexpected exception was found: System.Runtime.InteropServices.COMException (0x80070543): Cannot open an anonymous level security token. (Exception from HRESULT: 0x80070543) at System.Runtime.InteropServices.Marshal.ThrowExceptionForHRInternal(Int32 errorCode, IntPtr errorInfo) at Microsoft.Windows.ServerManager.ComponentInstaller.CreateSessionAndPackage(IntPtr& session, IntPtr& package) at Microsoft.Windows.ServerManager.ComponentInstaller.InitializeUpdateInfo() at Microsoft.Windows.ServerManager.ComponentInstaller.Initialize() at Microsoft.Windows.ServerManager.Common.Provider.Initialize(DocumentCollection documents) at Microsoft.Windows.ServerManager.ServerManagerModel.InternalRefreshModelResult(Object state)
27+
To see the event details, open Event Viewer and navigate to **Applications and Services Logs\\Microsoft\\Windows\\ServerManager-DeploymentProvider\\Operational** and **Applications and Services Logs\\Microsoft\\Windows\\ServerManager-MultiMachine\\Operational**. You might see the following errors:
28+
29+
```output
30+
Log Name: Microsoft-Windows-ServerManager-DeploymentProvider/Operational
31+
Source: Microsoft-Windows-ServerManager-DeploymentProvider
32+
Date: MM/DD/YYYY hr:min:sec PM
33+
Event ID: 403
34+
Task Category: GetAlterationState method call.
35+
Level: Error
36+
Keywords:
37+
User: XXXXXXXXXXXX
38+
Computer: XXXXXX.XXXXX
39+
Description: GetAlterationState method returned Failed. Error: The request to add or remove features on the specified server failed. Installation of one or more roles, role services, or features failed. Cannot open an anonymous level security token. Error: 0x80070543
40+
```
41+
42+
```output
43+
Log Name: Microsoft-Windows-ServerManager-DeploymentProvider/Operational
44+
Source: Microsoft-Windows-ServerManager-DeploymentProvider
45+
Date: MM/DD/YYYY hr:min:sec PM
46+
Event ID: 1315
47+
Task Category: GetServerComponent request on a separate thread.
48+
Level: Error
49+
Keywords:
50+
User: XXXXXXXXXXXX
51+
Computer: XXXXXX.XXXXX
52+
Description: Exception Detected: Installation of one or more roles, role services, or features failed. Cannot open an anonymous level security token. Error: 0x80070543 ErrorID: DISMAPI_Error__Failed_To_Enable_Updates
53+
```
54+
55+
```output
56+
Log Name: Microsoft-Windows-ServerManager-MultiMachine/Operational
57+
Source: Microsoft-Windows-ServerManager-MultiMachine
58+
Date: MM/DD/YYYY hr:min:sec PM
59+
Event ID: 4002
60+
Task Category: Add-_InternalWindowsRole task.
61+
Level: Error
62+
Keywords:
63+
User: XXXXXXXXXXXX
64+
Computer: XXXXXX.XXXXX
65+
Description: Add-_InternalWindowsRole workflow reported an error installing or removing the requested component(s), TargetComputer:, RequestState:2, RebootRequired: false, ErrorMessage: The request to add or remove features on the specified server failed. Installation of one or more roles, role services, or features failed. Cannot open an anonymous level security token. Error: 0x80070543 , ErrorId: DISMAPI_Error__Failed_To_Enable_Updates, ErrorCategory: 7, Warning:
66+
```
4067

4168
## Cause
4269

0 commit comments

Comments
 (0)