Skip to content

Commit a854047

Browse files
Merge pull request #10287 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-03 18:00 UTC
2 parents c11af32 + de2c25f commit a854047

File tree

6 files changed

+90
-35
lines changed

6 files changed

+90
-35
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,6 @@
4545
"redirect_url": "/troubleshoot/windows-client/windows-tss/collect-data-analyze-troubleshoot-windows-clustering-scenarios",
4646
"redirect_document_id": false
4747
},
48-
{
49-
"source_path": "support/windows-client/windows-tss/gather-information-using-tss-wufb-reports.md",
50-
"redirect_url": "/troubleshoot/windows-client/windows-tss/collect-data-analyze-troubleshoot-windows-servicing-scenarios",
51-
"redirect_document_id": false
52-
},
5348
{
5449
"source_path": "support/windows-client/windows-tss/gather-information-using-tss-group-policy.md",
5550
"redirect_url": "/troubleshoot/windows-client/windows-tss/collect-data-analyze-troubleshoot-group-policy-scenarios",

support/power-platform/power-automate/desktop-flows/browser-automation/web-extensions-policies.md

Lines changed: 29 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Troubleshoot issues in Power Automate browser extensions
33
description: Provides a resolution for the Failed to assume control of browser (Internal error or communication failure) error or Get Extension message.
4-
ms.reviewer: nimoutzo, gtrantzas, jspantouris
5-
ms.date: 08/08/2025
4+
ms.reviewer: nimoutzo, gtrantzas, jspantouris, v-shaywood
5+
ms.date: 12/01/2025
66
ms.custom: sap:Desktop flows\UI or browser automation
77
---
88
# Troubleshoot issues in Power Automate browser extensions
99

10-
This article provides tips to troubleshoot and resolve issues that are related to Power Automate browser extensions when you use web automation in desktop flows.
10+
This article provides tips to troubleshoot and resolve issues related to Power Automate browser extensions when you use web automation in desktop flows.
1111

1212
## Symptoms
1313

@@ -53,7 +53,7 @@ Follow these steps:
5353
5454
1. If PAD.BrowserNativeMessageHost.exe isn't running, follow these steps:
5555

56-
1. Check whether the Power Automate web extension is installed and enabled. If it isnt installed, see the [Prerequisites](#prerequisites) section.
56+
1. Check whether the Power Automate web extension is installed and enabled. If it isn't installed, see the [Prerequisites](#prerequisites) section.
5757

5858
1. If the extension is installed, run the **Troubleshoot UI/Web automation issues** diagnostic in [Power Automate for desktop troubleshooter](/power-automate/desktop-flows/troubleshooter).
5959

@@ -77,7 +77,7 @@ Follow these steps:
7777

7878
The error message, "Access to the native messaging host was disabled by the system administrator," indicates that the **NativeMessagingBlocklist** policy is enabled for the Power Automate for desktop native messaging host or all native messaging hosts.
7979

80-
### Check for policies that are blocking the message host
80+
### Check for policies that block the message host
8181

8282
Follow these steps:
8383

@@ -96,15 +96,15 @@ Follow these steps:
9696

9797
#### [Microsoft Edge](#tab/microsoft-edge)
9898

99-
For adding policy in Local Machine level:
99+
To add a policy at the local machine level:
100100

101101
```console
102102
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist
103103
Name = {number}
104104
Data = com.robin.messagehost
105105
```
106106

107-
For adding policy in Current User level:
107+
To add a policy at the current user level:
108108

109109
```console
110110
Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist
@@ -114,15 +114,15 @@ Follow these steps:
114114

115115
#### [Google Chrome](#tab/google-chrome)
116116

117-
For adding policy in Local Machine level:
117+
To add a policy at the local machine level:
118118

119119
```console
120120
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\NativeMessagingAllowlist
121121
Name = {number}
122122
Data = com.robin.messagehost
123123
```
124124

125-
For adding policy in Current User level:
125+
To add a policy at the current user level:
126126

127127
```console
128128
Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Google\Chrome\NativeMessagingAllowlist
@@ -132,15 +132,15 @@ Follow these steps:
132132

133133
#### [Mozilla Firefox](#tab/mozilla-firefox)
134134

135-
For adding policy in Local Machine level:
135+
To add a policy at the local machine level:
136136

137137
```console
138138
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Mozilla\NativeMessagingAllowlist
139139
Name = {number}
140140
Data = com.robin.messagehost
141141
```
142142

143-
For adding policy in Current User level:
143+
To add a policy at the current user level:
144144

145145
```console
146146
Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Mozilla\NativeMessagingAllowlist
@@ -154,15 +154,15 @@ Follow these steps:
154154

155155
#### [Microsoft Edge](#tab/microsoft-edge)
156156

157-
For adding policy in Local Machine level:
157+
To add a policy at the local machine level:
158158

159159
```console
160160
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist
161161
Name = {number}
162162
Data = com.microsoft.pad.messagehost
163163
```
164164

165-
For adding policy in Current User level:
165+
To add a policy at the current user level:
166166

167167
```console
168168
Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Edge\NativeMessagingAllowlist
@@ -172,15 +172,15 @@ Follow these steps:
172172

173173
#### [Google Chrome](#tab/google-chrome)
174174

175-
For adding policy in Local Machine level:
175+
To add a policy at the local machine level:
176176

177177
```console
178178
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\NativeMessagingAllowlist
179179
Name = {number}
180180
Data = com.microsoft.pad.messagehost
181181
```
182182

183-
For adding policy in Current User level:
183+
To add a policy at the current user level:
184184

185185
```console
186186
Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Google\Chrome\NativeMessagingAllowlist
@@ -190,14 +190,14 @@ Follow these steps:
190190

191191
#### [Mozilla Firefox](#tab/mozilla-firefox)
192192

193-
For adding policy in Local Machine level:
193+
To add a policy at the local machine level:
194194

195195
```console
196196
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Mozilla\NativeMessagingAllowlist
197197
Name = {number}
198198
```
199199

200-
For adding policy in Current User level:
200+
To add a policy at the current user level:
201201

202202
```console
203203
Computer\HKEY_CURRENT_USER\SOFTWARE\Policies\Mozilla\NativeMessagingAllowlist
@@ -210,7 +210,7 @@ Follow these steps:
210210
1. Check the [NativeMessagingUserLevelHosts](/deployedge/microsoft-edge-browser-policies/nativemessaginguserlevelhosts) policy. If **NativeMessagingUserLevelHosts** is disabled, enable it or make sure that `com.robin.messagehost` for the legacy browser extension and `com.microsoft.pad.messagehost` for the default browser extension are added to your **NativeMessagingAllowlist** policy in HKLM (Local Machine level).
211211

212212
> [!NOTE]
213-
> **NativeMessagingUserLevelHosts** must be enabled when using the [Microsoft Store (MSIX) version of Power Automate for desktop](/power-automate/desktop-flows/install#install-power-automate-from-microsoft-store).
213+
> You must enable **NativeMessagingUserLevelHosts** when using the [Microsoft Store (MSIX) version of Power Automate for desktop](/power-automate/desktop-flows/install#install-power-automate-from-microsoft-store).
214214

215215
### Check whether the message host points to the correct location
216216

@@ -276,7 +276,7 @@ To check if more than one profile exists, select the profile icon in the browser
276276
If more than one browser profile exists:
277277

278278
1. Uninstall the Power Automate web extension from each existing browser profile.
279-
1. Close the browser and [install the extension](/power-automate/desktop-flows/install-browser-extensions) only in the browser profile that will be used by the automation.
279+
1. Close the browser and [install the extension](/power-automate/desktop-flows/install-browser-extensions) only in the browser profile that you use for the automation.
280280

281281
### Check for errors in Windows Event Viewer
282282

@@ -290,4 +290,14 @@ Follow these steps:
290290

291291
Try disabling all other web extensions except the Power Automate extension to see whether the issue persists.
292292

293+
### Disable browser background settings
294+
295+
Some browser settings can interfere with the Power Automate extension. To resolve this issue, disable the following settings in your browser:
296+
297+
1. Open Microsoft Edge or Google Chrome.
298+
1. Go to **Settings** > **System and performance**.
299+
1. Turn off the following settings:
300+
1. **Continue running background extensions and apps when Microsoft Edge is closed** (or **Continue running background apps when Google Chrome is closed**).
301+
1. **Startup boost** (Microsoft Edge only).
302+
293303
[!INCLUDE [Third-party disclaimer](../../../../includes/third-party-disclaimer.md)]

support/sql/database-engine/startup-shutdown/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ items:
33
href: event-id-7000-access-denied.md
44
- name: Error 17113 when you start SQL Server service
55
href: error-17113-start-service.md
6-
- name: Error 1068 when starting SQL Server
6+
- name: Error 1068 when starting SQL Server and SQL Agent
77
href: agent-service-fails-start-stand-alone-server.md
88
- name: Error 1069 when starting SQL Server
99
href: error-1069-service-cannot-start.md

support/windows-client/toc.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1461,6 +1461,8 @@ items:
14611461
href: ./windows-tss/collect-data-analyze-troubleshoot-windows-clustering-scenarios.md
14621462
- name: Collect data to analyze and troubleshoot Group Policy scenarios
14631463
href: ./windows-tss/collect-data-analyze-troubleshoot-group-policy-scenarios.md
1464+
- name: Collect data to analyze and troubleshoot Hyper-V related issues
1465+
href: ./windows-tss/collect-data-analyze-troubleshoot-hyperv-scenarios.md
14641466
- name: Collect data to analyze and troubleshoot licensing and activation scenarios
14651467
href: ./windows-tss/collect-data-analyze-troubleshoot-licensing-activation-scenarios.md
14661468
- name: Collect data to analyze and troubleshoot Windows networking scenarios
@@ -1469,15 +1471,15 @@ items:
14691471
href: ./windows-tss/collect-data-analyze-troubleshoot-performance-scenarios.md
14701472
- name: Collect data to analyze and troubleshoot Remote Desktop Services scenarios
14711473
href: ./windows-tss/collect-data-analyze-troubleshoot-remote-desktop-services-scenarios.md
1472-
- name: Collect data to analyze and troubleshoot shell experience scenarios
1473-
href: ./windows-tss/collect-data-analyze-troubleshoot-shell-experiences-scenarios.md
14741474
- name: Collect data to analyze and troubleshoot Windows servicing, updates, and Features on Demand scenarios
14751475
href: ./windows-tss/collect-data-analyze-troubleshoot-windows-servicing-scenarios.md
1476-
- name: Collect data to analyze and troubleshoot system management components scenarios
1477-
href: ./windows-tss/collect-data-analyze-troubleshoot-sys-management-components-scenarios.md
1478-
- name: Collect data to analyze and troubleshoot Hyper-V related issues
1479-
href: ./windows-tss/collect-data-analyze-troubleshoot-hyperv-scenarios.md
1476+
- name: Collect data to analyze and troubleshoot shell experience scenarios
1477+
href: ./windows-tss/collect-data-analyze-troubleshoot-shell-experiences-scenarios.md
14801478
- name: Collect data to analyze and troubleshoot SQL cluster (AG/FCI) related issues
14811479
href: ./windows-tss/collect-data-analyze-troubleshoot-sql-cluster-ag-fci-scenarios.md
1480+
- name: Collect data to analyze and troubleshoot system management components scenarios
1481+
href: ./windows-tss/collect-data-analyze-troubleshoot-sys-management-components-scenarios.md
1482+
- name: Collect Data to Analyze and Troubleshoot Windows Update for Business Reports Scenarios
1483+
href: ./windows-tss/gather-information-using-tss-wufb-reports.md
14821484
- name: Use the xray feature of TSS
14831485
href: ./windows-tss/use-the-xray-feature-of-tss-to-identify-known-issues.md
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: Collect Data to Analyze and Troubleshoot Windows Update for Business Reports Scenarios
3+
description: Introduces how to gather information by using the TroubleShootingScript (TSS) toolset for Windows Update for Business reports-related issues.
4+
ms.date: 12/1/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.reviewer: kaushika, warrenw, v-lianna
9+
ms.custom: sap:Support Tools\TSS DnD, csstroubleshoot
10+
appliesto:
11+
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Supported versions of Windows Server</a>
12+
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Supported versions of Windows Client</a>
13+
---
14+
# Collect data to analyze and troubleshoot Windows Update for Business Reports scenarios
15+
16+
This article introduces how to gather information by using the TroubleShootingScript (TSS) toolset for Windows Update for Business reports-related issues.
17+
18+
Before contacting Microsoft support, you can gather information about your issue.
19+
20+
## Prerequisites
21+
22+
Refer to [Introduction to TroubleShootingScript toolset (TSS)](/windows-client/windows-tss/introduction-to-troubleshootingscript-toolset-tss#prerequisites) for prerequisites for the toolset to run properly.
23+
24+
## Gather key information before contacting Microsoft support
25+
26+
1. Download [TSS](https://aka.ms/getTSS) and extract it in the *C:\\tss* folder.
27+
2. Open the *C:\\tss* folder from an elevated PowerShell command prompt.
28+
> [!NOTE]
29+
> Don't use the Windows PowerShell Integrated Scripting Environment (ISE).
30+
3. Run the following cmdlets:
31+
32+
```powershell
33+
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
34+
```
35+
36+
```powershell
37+
.\TSS.ps1 -Collectlog DND_WUfBReport
38+
```
39+
40+
4. Enter *A* for "Yes to All" for the execution policy change.
41+
42+
> [!NOTE]
43+
>
44+
> - The traces are stored in a compressed file in the *C:\\MS_DATA* folder. After a support case is created, this file can be uploaded to the secure workspace for analysis.
45+
> - If you've downloaded this tool previously, we recommend downloading the latest version. It doesn't automatically update when running `-Collectlog DND_WUfBReport`.
46+

support/windows-server/toc.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3311,13 +3311,15 @@ items:
33113311
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-windows-clustering-scenarios.md?context=/troubleshoot/windows-server/context/context
33123312
- name: Collect data to analyze and troubleshoot Group Policy scenarios
33133313
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-group-policy-scenarios.md?context=/troubleshoot/windows-server/context/context
3314-
- name: Collect data to analyze and troubleshoot Windows servicing, updates, and Features on Demand scenarios
3315-
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-windows-servicing-scenarios.md?context=/troubleshoot/windows-server/context/context
3316-
- name: Collect data to analyze and troubleshoot system management components scenarios
3317-
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-sys-management-components-scenarios.md?context=/troubleshoot/windows-server/context/context
33183314
- name: Collect data to analyze and troubleshoot Hyper-V related issues
33193315
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-hyperv-scenarios.md?context=/troubleshoot/windows-server/context/context
3316+
- name: Collect data to analyze and troubleshoot Windows servicing, updates, and Features on Demand scenarios
3317+
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-windows-servicing-scenarios.md?context=/troubleshoot/windows-server/context/context
33203318
- name: Collect data to analyze and troubleshoot SQL cluster (AG/FCI) related issues
33213319
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-sql-cluster-ag-fci-scenarios.md?context=/troubleshoot/windows-server/context/context
3320+
- name: Collect data to analyze and troubleshoot system management components scenarios
3321+
href: ../windows-client/windows-tss/collect-data-analyze-troubleshoot-sys-management-components-scenarios.md?context=/troubleshoot/windows-server/context/context
3322+
- name: Collect Data to Analyze and Troubleshoot Windows Update for Business Reports Scenarios
3323+
href: ../windows-client/windows-tss/gather-information-using-tss-wufb-reports.md?context=/troubleshoot/windows-server/context/context
33223324
- name: Use the xray feature of TSS
33233325
href: ../windows-client/windows-tss/use-the-xray-feature-of-tss-to-identify-known-issues.md?context=/troubleshoot/windows-server/context/context

0 commit comments

Comments
 (0)