Skip to content

Commit 49bd2dc

Browse files
Merge pull request #263313 from rpsqrd/esu-troubleshooting-style
Updated ESU URLs to reflect HTTP protocol
2 parents 5fb390e + fff0243 commit 49bd2dc

File tree

4 files changed

+43
-35
lines changed

4 files changed

+43
-35
lines changed

articles/azure-arc/servers/includes/esu-network-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ If you are using Azure Arc-enabled servers only for the purpose of Extended Secu
1717
|`management.azure.com`|Azure Resource Manager - to create or delete the Arc server resource|When connecting or disconnecting a server, only| Public, unless a [resource management private link](../../../azure-resource-manager/management/create-private-link-access-portal.md) is also configured |
1818
|`*.his.arc.azure.com`|Metadata and hybrid identity services|Always| Private |
1919
|`*.guestconfiguration.azure.com`| Extension management and guest configuration services |Always| Private |
20-
|`microsoft.com/pkiops/certs`| Certificate download for ESUs | ESUs enabled by Azure Arc | Public |
20+
|`www.microsoft.com/pkiops/certs`| Intermediate certificate updates for ESUs (note: uses HTTP/TCP 80 and HTTPS/TCP 443) | ESUs enabled by Azure Arc | Public |
2121
|`san-af-<region>-prod.azurewebsites.net`| Azure Arc data processing service| SQL Server ESUs | Public|
2222

2323
#### [Azure Government](#tab/azure-government)
@@ -30,7 +30,7 @@ If you are using Azure Arc-enabled servers only for the purpose of Extended Secu
3030
|`management.usgovcloudapi.net`|Azure Resource Manager - to create or delete the Arc server resource|When connecting or disconnecting a server, only| Public, unless a [resource management private link](../../../azure-resource-manager/management/create-private-link-access-portal.md) is also configured |
3131
|`*.his.arc.azure.us`|Metadata and hybrid identity services|Always| Private |
3232
|`*.guestconfiguration.azure.us`| Extension management and guest configuration services |Always| Private |
33-
|`microsoft.com/pkiops/certs`| Certificate download for ESUs | ESUs enabled by Azure Arc | Public |
33+
|`www.microsoft.com/pkiops/certs`| Intermediate certificate updates for ESUs (note: uses HTTP/TCP 80 and HTTPS/TCP 443) | ESUs enabled by Azure Arc | Public |
3434

3535
#### [Microsoft Azure operated by 21Vianet](#tab/azure-china)
3636

articles/azure-arc/servers/includes/network-requirements.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The table below lists the URLs that must be available in order to install and us
4040

4141
> [!NOTE]
4242
> When configuring the Azure connected machine agent to communicate with Azure through a private link, some endpoints must still be accessed through the internet. The **Endpoint used with private link** column in the following table shows which endpoints can be configured with a private endpoint. If the column shows *Public* for an endpoint, you must still allow access to that endpoint through your organization's firewall and/or proxy server for the agent to function.
43-
>
43+
4444
| Agent resource | Description | When required| Endpoint used with private link |
4545
|---------|---------|--------|---------|
4646
|`aka.ms`|Used to resolve the download script during installation|At installation time, only| Public |
@@ -60,7 +60,7 @@ The table below lists the URLs that must be available in order to install and us
6060
|`dc.services.visualstudio.com`|Agent telemetry|Optional, not used in agent versions 1.24+| Public |
6161
| `san-af-<region>-prod.azurewebsites.net` | Azure Arc data processing service | For SQL Server enabled by Azure Arc. The Azure Extension for SQL Server uploads inventory and billing information to the data processing service. | Public |
6262
| `telemetry.<region>.arcdataservices.com` | For Arc SQL Server. Sends service telemetry and performance monitoring to Azure | Always | Public |
63-
|`microsoft.com/pkiops/certs`| Certificate download for ESUs |ESUs enabled by Azure Arc | Public |
63+
|`www.microsoft.com/pkiops/certs`| Intermediate certificate updates for ESUs (note: uses HTTP/TCP 80 and HTTPS/TCP 443) | ESUs enabled by Azure Arc | Public |
6464

6565
> [!NOTE]
6666
> To translate the `*.servicebus.windows.net` wildcard into specific endpoints, use the command `\GET https://guestnotificationservice.azure.com/urls/allowlist?api-version=2020-01-01&location=<region>`. Within this command, the region must be specified for the `<region>` placeholder.
@@ -71,7 +71,7 @@ The table below lists the URLs that must be available in order to install and us
7171

7272
> [!NOTE]
7373
> When configuring the Azure connected machine agent to communicate with Azure through a private link, some endpoints must still be accessed through the internet. The **Endpoint used with private link** column in the following table shows which endpoints can be configured with a private endpoint. If the column shows *Public* for an endpoint, you must still allow access to that endpoint through your organization's firewall and/or proxy server for the agent to function.
74-
>
74+
7575
| Agent resource | Description | When required| Endpoint used with private link |
7676
|---------|---------|--------|---------|
7777
|`aka.ms`|Used to resolve the download script during installation|At installation time, only| Public |
@@ -84,7 +84,7 @@ The table below lists the URLs that must be available in order to install and us
8484
|`*.guestconfiguration.azure.us`| Extension management and guest configuration services |Always| Private |
8585
|`*.blob.core.usgovcloudapi.net`|Download source for Azure Arc-enabled servers extensions|Always, except when using private endpoints| Not used when private link is configured |
8686
|`dc.applicationinsights.us`|Agent telemetry|Optional, not used in agent versions 1.24+| Public |
87-
|`microsoft.com/pkiops/certs`| Certificate download for ESUs |ESUs enabled by Azure Arc | Public |
87+
|`www.microsoft.com/pkiops/certs`| Intermediate certificate updates for ESUs (note: uses HTTP/TCP 80 and HTTPS/TCP 443) | ESUs enabled by Azure Arc | Public |
8888

8989
#### [Microsoft Azure operated by 21Vianet](#tab/azure-china)
9090

articles/azure-arc/servers/run-command.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ Run Command on Azure Arc-enabled servers supports the following operations:
4040
4141
## Example scenarios
4242

43-
Suppose you have an Azure Arc-enabled server called “2012DatacenterServer1” in resource group “ContosoRG” with Subscription ID “aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa”. Consider a scenario where you need to provide remote access to an endpoint for Windows Server 2012 / R2 servers. Access to Extended Security Updates enabled by Azure Arc requires access to the endpoint `microsoft.com/pkiops/certs`. You need to remotely configure a firewall rule that allows access to this endpoint. Use Run Command in order to allow connectivity to this endpoint.
43+
Suppose you have an Azure Arc-enabled server called “2012DatacenterServer1” in resource group “ContosoRG” with Subscription ID “aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa”. Consider a scenario where you need to provide remote access to an endpoint for Windows Server 2012 / R2 servers. Access to Extended Security Updates enabled by Azure Arc requires access to the endpoint `www.microsoft.com/pkiops/certs`. You need to remotely configure a firewall rule that allows access to this endpoint. Use Run Command in order to allow connectivity to this endpoint.
4444

4545
### Example 1: Endpoint access with Run Command
4646

47-
Start off by creating a Run Command script to provide endpoint access to the `microsoft.com/pkiops/certs` endpoint on your target Arc-enabled server using the PUT operation.
47+
Start off by creating a Run Command script to provide endpoint access to the `www.microsoft.com/pkiops/certs` endpoint on your target Arc-enabled server using the PUT operation.
4848

4949
To directly provide the script in line, use the following operation:
5050

@@ -60,11 +60,11 @@ PUT https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaa
6060
"parameters": [
6161
{
6262
"name": "ruleName",
63-
"value": " Allow access to microsoft.com/pkiops/certs"
63+
"value": " Allow access to www.microsoft.com/pkiops/certs"
6464
},
6565
{
6666
"name": "endpoint",
67-
"value": ""microsoft.com/pkiops/certs"
67+
"value": "www.microsoft.com/pkiops/certs"
6868
},
6969
{
7070
"name": "port",
@@ -100,11 +100,11 @@ PUT https://management.azure.com/subscriptions/aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaa
100100
"parameters": [
101101
{
102102
"name": "ruleName",
103-
"value": " Allow access to microsoft.com/pkiops/certs"
103+
"value": " Allow access to www.microsoft.com/pkiops/certs"
104104
},
105105
{
106106
"name": "endpoint",
107-
"value": ""microsoft.com/pkiops/certs"
107+
"value": "www.microsoft.com/pkiops/certs"
108108
},
109109
{
110110
"name": "port",

articles/azure-arc/servers/troubleshoot-extended-security-updates.md

Lines changed: 31 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -57,36 +57,44 @@ If you're unable to enable this service offering, review the resource providers
5757

5858
Ensure that both the licensing package and servicing stack update (SSU) are downloaded for the Azure Arc-enabled server as documented at [KB5031043: Procedure to continue receiving security updates after extended support has ended on October 10, 2023](https://support.microsoft.com/topic/kb5031043-procedure-to-continue-receiving-security-updates-after-extended-support-has-ended-on-october-10-2023-c1a20132-e34c-402d-96ca-1e785ed51d45). Ensure you are following all of the networking prerequisites as recorded at [Prepare to deliver Extended Security Updates for Windows Server 2012](prepare-extended-security-updates.md?tabs=azure-cloud#networking).
5959

60-
61-
### Error: Trying to check IMDS again (HRESULT 12002)
60+
### Error: Trying to check IMDS again (HRESULT 12002 or 12029)
6261

6362
If installing the Extended Security Update enabled by Azure Arc fails with errors such as "ESU: Trying to Check IMDS Again LastError=HRESULT_FROM_WIN32(12029)" or "ESU: Trying to Check IMDS Again LastError=HRESULT_FROM_WIN32(12002)", you may need to update the intermediate certificate authorities trusted by your computer using one of the following two methods:
6463

65-
1. Configure your network firewall and/or proxy server to allow access from the Windows Server 2012 (R2) machines to `https://microsoft.com/pkiops/certs`. This will allow the machine to automatically retrieve updated intermediate certificates as required and is Microsoft's preferred approach.
66-
1. Download all intermediate CAs from a machine with internet access, copy them to each Windows Server 2012 (R2) machine, and import them to the machine's intermediate certificate authority store:
67-
1. Download the 4 intermediate CA certificates:
68-
1. [Microsoft Azure TLS Issuing CA 01](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2001%20-%20xsign.crt)
69-
1. [Microsoft Azure TLS Issuing CA 02](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2002%20-%20xsign.crt)
70-
1. [Microsoft Azure TLS Issuing CA 05](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2005%20-%20xsign.crt)
71-
1. [Microsoft Azure TLS Issuing CA 06](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2006%20-%20xsign.crt)
72-
1. Copy the certificate files to your Windows Server 2012 (R2) machine.
73-
1. Run the following commands in an elevated command prompt or PowerShell session to add the certificates to the "Intermediate Certificate Authorities" store for the local computer. The command should be run from the same directory as the certificate files. The commands are idempotent and won't make any changes if you've already imported the certificate:
74-
75-
```powershell
76-
certstore -addstore CA "Microsoft Azure TLS Issuing CA 01 - xsign.crt"
77-
certstore -addstore CA "Microsoft Azure TLS Issuing CA 02 - xsign.crt"
78-
certstore -addstore CA "Microsoft Azure TLS Issuing CA 05 - xsign.crt"
79-
certstore -addstore CA "Microsoft Azure TLS Issuing CA 06 - xsign.crt"
80-
```
81-
82-
After allowing the servers to reach the PKI URL or manually importing the intermediate certificates, try installing the Extended Security Updates again using Windows Update or your preferred patch management software. You may need to reboot your computer for the changes to take effect.
64+
#### Option 1: Allow access to the PKI URL
65+
66+
Configure your network firewall and/or proxy server to allow access from the Windows Server 2012 (R2) machines to `http://www.microsoft.com/pkiops/certs` and `https://www.microsoft.com/pkiops/certs` (both TCP 80 and 443). This will enable the machines to automatically retrieve any missing intermediate CA certificates from Microsoft.
67+
68+
Once the network changes are made to allow access to the PKI URL, try installing the Windows updates again. You may need to reboot your computer for the automatic installation of certificates and validation of the license to take effect.
69+
70+
#### Option 2: Manually download and install the intermediate CA certificates
71+
72+
If you're unable to allow access to the PKI URL from your servers, you can manually download and install the certificates on each machine.
73+
74+
1. On any computer with internet access, download these intermediate CA certificates:
75+
1. [Microsoft Azure TLS Issuing CA 01](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2001%20-%20xsign.crt)
76+
1. [Microsoft Azure TLS Issuing CA 02](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2002%20-%20xsign.crt)
77+
1. [Microsoft Azure TLS Issuing CA 05](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2005%20-%20xsign.crt)
78+
1. [Microsoft Azure TLS Issuing CA 06](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2006%20-%20xsign.crt)
79+
1. Copy the certificate files to your Windows Server 2012 (R2) machines.
80+
1. Run the following commands in an elevated command prompt or PowerShell session to add the certificates to the "Intermediate Certificate Authorities" store for the local computer. The command should be run from the same directory as the certificate files. The commands are idempotent and won't make any changes if you've already imported the certificate:
81+
82+
```powershell
83+
certstore -addstore CA "Microsoft Azure TLS Issuing CA 01 - xsign.crt"
84+
certstore -addstore CA "Microsoft Azure TLS Issuing CA 02 - xsign.crt"
85+
certstore -addstore CA "Microsoft Azure TLS Issuing CA 05 - xsign.crt"
86+
certstore -addstore CA "Microsoft Azure TLS Issuing CA 06 - xsign.crt"
87+
```
88+
89+
1. Try installing the Windows updates again. You may need to reboot your computer for the validation logic to recognize the newly imported intermediate CA certificates.
8390
8491
### Error: Not eligible (HRESULT 1633)
8592
8693
If you encounter the error "ESU: not eligible HRESULT_FROM_WIN32(1633)", follow these steps:
8794
88-
`Remove-Item “$env:ProgramData\AzureConnectedMachineAgent\Certs\license.json” -Force`
89-
90-
`Restart-Service himds`
95+
```powershell
96+
Remove-Item "$env:ProgramData\AzureConnectedMachineAgent\Certs\license.json" -Force
97+
Restart-Service himds
98+
```
9199

92100
If you have other issues receiving ESUs after successfully enrolling the server through Arc-enabled servers, or you need additional information related to issues affecting ESU deployment, see [Troubleshoot issues in ESU](/troubleshoot/windows-client/windows-7-eos-faq/troubleshoot-extended-security-updates-issues).

0 commit comments

Comments
 (0)