You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: support/power-platform/power-automate/desktop-flows/troubleshoot-direct-connectivity-issues.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Direct connectivity issues in Power Automate for desktop
3
3
description: Provides more information about how to solve the direct connectivity issues in Power Automate for desktop.
4
4
ms.reviewer: guco, madiazor, johndund, qliu
5
-
ms.date: 05/15/2025
5
+
ms.date: 05/19/2025
6
6
ms.custom: sap:Desktop flows
7
7
---
8
8
# Direct connectivity issues in Power Automate for desktop
@@ -27,7 +27,7 @@ When attempting to run your desktop flows from a cloud flow or manage your deskt
27
27
#### Scenario 2
28
28
29
29
- Desktop flows run on a registered machine as long as a user session is running (attended runs) or even for some minutes after the last user signs out (unattended runs).
30
-
- The connection to the machine is lost after some minutes (for example, 15 minutes.)
30
+
- The connection to the machine is lost after some minutes (for example, 15 minutes).
31
31
- The connection is re-established once a user signs back in to the machine.
32
32
33
33
#### Scenario 3
@@ -40,7 +40,7 @@ Direct to machine connectivity uses [Azure Windows Communication Foundation (WCF
40
40
41
41
The most common cause of relay connectivity issues is the machine losing connection to the network. This can be caused by your machine not being powered on or losing network when no user is signed in to the machine.
42
42
43
-
The Power Automate service runs under its own Windows account (NT Service\UIFlowService by default) which must have access to the network and be able to connect to _*.servicebus.windows.net_ (for more information, see [network requirements](/power-automate/ip-address-configuration#desktop-flows-services-required-for-runtime).)
43
+
The Power Automate service runs under its own Windows account (NT Service\UIFlowService by default) which must have access to the network and be able to connect to _*.servicebus.windows.net_. For more information, see [network requirements](/power-automate/ip-address-configuration#desktop-flows-services-required-for-runtime).
44
44
45
45
> [!NOTE]
46
46
> If you use an Azure virtual machine (VM) to run Power Automate for desktop, make sure the Microsoft.ServiceBus endpoint is turned off at the subnet level where the Azure VM is located. This is a known limitation. For more information, see [Azure Relay doesn't support network service endpoints](/azure/azure-relay/network-security).
@@ -51,9 +51,9 @@ A common culprit in both scenarios is a network proxy or a firewall that restric
51
51
52
52
In particular, authenticated proxies that use the credentials of the connected Windows user, given that the Power Automate service runs under its own dedicated account.
53
53
54
-
You can refer to [Proxy setup](/power-automate/desktop-flows/how-to/proxy-settings) if you determine that you need to override the default proxy settings used by the Power Automate service. You may also need to [change the on-premises service account](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account).
54
+
You can refer to [Proxy setup](/power-automate/desktop-flows/how-to/proxy-settings) if you determine that you need to override the default proxy settings used by the Power Automate service. You might also need to [change the on-premises service account](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account).
55
55
56
-
Azure Relay requires to have all the relay gateways used by the primary and secondary namespaces allowed by the proxy and firewall configurations.
56
+
For Azure Relay to function properly, it's necessary to configure the proxy and firewall settings to permit the relay gateways associated with both the primary and secondary namespaces. This ensures that the communication between these gateways isn't blocked by the network security settings.
57
57
58
58
## How to investigate
59
59
@@ -63,14 +63,14 @@ Azure Relay requires to have all the relay gateways used by the primary and seco
63
63
64
64
2. Understand network topology.
65
65
66
-
- Trace the path of traffic through network devices (for example, NAT, firewalls, proxies) to the public internet.
66
+
- Trace the path of traffic through network devices (for example, NAT, firewalls, and proxies) to the public internet.
67
67
- Collect logs from devices during impacted runs and confirm traffic to _*.servicebus.windows.net_ successfully reaches the public internet.
68
68
69
69
3. If your network traffic runs though a proxy, consider [changing the on-premises account](/power-automate/desktop-flows/troubleshoot#change-the-on-premises-service-account) used by the Power Automate service (UIFlowService).
70
70
71
71
4. Get WCF logs from the Power Automate service (UIFlowService). For more information, see [Enable WCF tracing](#enable-wcf-tracing).
72
72
73
-
5. Make sure your network configuration allows web socket traffic and long-running connections. Connections terminated after a set time may cause issues.
73
+
5. Make sure your network configuration allows web socket traffic and long-running connections. Some network devices, like proxies, might automatically terminate connections after a certain period, which can disrupt the communication.
74
74
75
75
6. Make sure firewall allows connections to Azure Relay gateways:
76
76
@@ -83,21 +83,21 @@ Azure Relay requires to have all the relay gateways used by the primary and seco
83
83
3. Wait for the diagnostics to complete.
84
84
4. Select **Generate the report**.
85
85
5. Open the generated XLS file and locate the **Data** column.
86
-
6. Extract the namespace part from the URLs of **PrimaryRelay** and **SecondaryRelay** (for example, https://\<namespace>/guid_guid.)
86
+
6. Extract the namespace part from the URLs of **PrimaryRelay** and **SecondaryRelay**. For example, https://\<namespace>/guid_guid.
87
87
88
88
**Step 2: Configure the firewall with the DNS names required for both the primary and secondary relays**
89
89
90
90
1. Configure your firewalls with the Domain Name System (DNS) names of all the Relay gateways.
91
91
92
-
The DNS names can be found by running the [script](https://github.com/Azure/azure-relay-dotnet/blob/dev/tools/GetNamespaceInfo.ps1). This script will resolve the fully qualified domain names (FQDNs) of all the gateways to which you need to establish a connection.
92
+
The DNS names can be found by running the [script](https://github.com/Azure/azure-relay-dotnet/blob/dev/tools/GetNamespaceInfo.ps1). This script resolves the fully qualified domain names (FQDNs) of all the gateways to which you need to establish a connection.
93
93
94
94
2. Configure firewall rules to allow the DNS names on port 443 instead of IP addresses.
95
95
96
96
**Step 3: Perform manual connectivity tests**
97
97
98
-
WCF tracing can be enabled on the machine if there's cloud connectivity issue. For more information, see [Enable WCF tracing](#enable-wcf-tracing).
98
+
WCF tracing can be enabled on the machine if there's a cloud connectivity issue. For more information, see [Enable WCF tracing](#enable-wcf-tracing).
99
99
100
-
The WCF log should contain exceptions related to connectivity for a specific DNS or IP address or point to missing proxy configuration.
100
+
The WCF log should contain exceptions related to connectivity for a specific DNS or IP address, or point to missing proxy configuration.
101
101
102
102
To test the connection between the machine and the endpoint, run a TCP ping from PowerShell using the following command:
103
103
@@ -143,14 +143,14 @@ If the issue still persists, you can open a support ticket with Microsoft by pro
143
143
</system.diagnostics>
144
144
```
145
145
146
-
- You can substitute the `c:\logs\PADwcfTraces.svclog` value with any valid path you'd like but the folder (the `c:\logs` in this example) must exist, otherwise it won't be created and logs won't be written.
147
-
- The Power Automate service must have permission to write in the chosen folder, granting the 'Everyone' user full control over the folder works. You can get the serviceuser's Sid by running `sc showsid UIFlowService` in a command line if you want to give permissions to only that user.
146
+
- You can substitute the `c:\logs\PADwcfTraces.svclog` value with any valid path you want, but the folder (`c:\logs` in this example) must exist. Otherwise, it isn't be created and logs aren't be written.
147
+
- The Power Automate service needs permissions to write logs into the specified folder. You can grant full control to the `Everyone` user, allowing any user or service to write to the folder. Alternatively, to restrict permissions to only the Power Automate service, find the service user's Security Identifier (Sid) by running `sc showsid UIFlowService`, and then grant permissions to that user.
148
148
149
149
3. After saving the config file, restart the Power Automate service.
150
150
151
-
1. Open the Windows Services tool (search for "services" in the **Start** menu).
152
-
2. Find **Power Automate service**, right-click, and select **Restart**.
151
+
1. Search for "services" in the **Start** menu to open the Windows Services tool.
152
+
2. Find **Power Automate service**, right-click it, and select **Restart**.
153
153
154
-
:::image type="content" source="media/direct-connectivity-troubleshooting/restart-power-automate-service.png" alt-text="Restart the Power Automate Service in the Services tool.":::
154
+
:::image type="content" source="media/direct-connectivity-troubleshooting/restart-power-automate-service.png" alt-text="Screenshot of restarting the Power Automate Service in the Services tool.":::
155
155
156
-
Traces will be saved to the specified file, providing detailed logs to diagnose connectivity issues.
156
+
Traces are saved to the specified file, providing detailed logs to diagnose connectivity issues.
0 commit comments