<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Azure Virtual Desktop topics</title>
    <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/bd-p/AzureVirtualDesktopForum</link>
    <description>Azure Virtual Desktop topics</description>
    <pubDate>Mon, 20 Apr 2026 23:37:55 GMT</pubDate>
    <dc:creator>AzureVirtualDesktopForum</dc:creator>
    <dc:date>2026-04-20T23:37:55Z</dc:date>
    <item>
      <title>AVD Environment- FSLogix Profile Login Failure – Write Protected Error</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/avd-environment-fslogix-profile-login-failure-write-protected/m-p/4512559#M14050</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are currently facing an issue with FSLogix user profiles in our environment and would appreciate your assistance in identifying and resolving the problem.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue Description:&lt;/STRONG&gt;&lt;BR /&gt;Users are unable to log in successfully, and we are encountering the following error message:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;"No Create access → The media is write protected."&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Environment Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Session Hosts: Microsoft Entra joined&lt;/LI&gt;&lt;LI&gt;Users: Hybrid identities&lt;/LI&gt;&lt;LI&gt;Profile Storage: Azure File Share&lt;/LI&gt;&lt;LI&gt;Authentication Method: Identity-based access using &lt;STRONG&gt;Microsoft Entra Kerberos&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Configuration Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We have assigned the FSLogix user group the role &lt;STRONG&gt;"Storage File Data SMB Share Contributor"&lt;/STRONG&gt; on the Azure file share.&lt;/LI&gt;&lt;LI&gt;Registry entry for Kerberose Ticket is also created.&lt;/LI&gt;&lt;LI&gt;NTFS permissions have been configured via Azure Portal (Manage Access), granting &lt;STRONG&gt;Modify&lt;/STRONG&gt; permissions to the FSLogix profile users on the file share folder.&lt;/LI&gt;&lt;LI&gt;We can see that user profiles and corresponding VHDX files are being created successfully during login attempts.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Problem Statement:&lt;/STRONG&gt;&lt;BR /&gt;Despite the successful creation of profiles and VHDX files, users are still unable to log in, and the error mentioned above persists.&lt;/P&gt;&lt;P&gt;We would like your guidance on:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Possible causes for the "write protected" error despite correct role and NTFS permissions.&lt;/LI&gt;&lt;LI&gt;Any additional configurations or validations required for FSLogix with Entra Kerberos authentication.&lt;/LI&gt;&lt;LI&gt;Recommended troubleshooting steps or logs we should review to isolate the issue.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Please let us know if you need any additional logs, screenshots, or configuration details from our end.&lt;/P&gt;&lt;P&gt;Looking forward to your support.&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Ravi Yadav&lt;/P&gt;</description>
      <pubDate>Sat, 18 Apr 2026 02:49:33 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/avd-environment-fslogix-profile-login-failure-write-protected/m-p/4512559#M14050</guid>
      <dc:creator>Ravi3472</dc:creator>
      <dc:date>2026-04-18T02:49:33Z</dc:date>
    </item>
    <item>
      <title>Graphic issue on single session host personal avd</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/graphic-issue-on-single-session-host-personal-avd/m-p/4508220#M14038</link>
      <description>&lt;P&gt;We recently deployed single session host with azure gallery image(windows1125H2enterprise+m365apps) and random users are facing graphic issue on the avd,screen fully get blue line unable to see anything on the display,how to resolve this?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 02:31:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/graphic-issue-on-single-session-host-personal-avd/m-p/4508220#M14038</guid>
      <dc:creator>Sriselvam92</dc:creator>
      <dc:date>2026-04-03T02:31:11Z</dc:date>
    </item>
    <item>
      <title>Uninstalling Remote Desktop client closes users' Windows App connections</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/uninstalling-remote-desktop-client-closes-users-windows-app/m-p/4507719#M14035</link>
      <description>&lt;P&gt;We have our users working from Windows App now to meet the 3/27 out of support date.&amp;nbsp; We are beginning to uninstall the Remote Desktop from their laptops and are finding it closes active Windows App connections on uninstall (of Remote Desktop).&amp;nbsp; That is less than ideal.&amp;nbsp; Looking to see if any way around that, but wondered if others had seen the same?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2026 13:46:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/uninstalling-remote-desktop-client-closes-users-windows-app/m-p/4507719#M14035</guid>
      <dc:creator>shaaric</dc:creator>
      <dc:date>2026-04-01T13:46:21Z</dc:date>
    </item>
    <item>
      <title>Feature request: allow setting web client features from direct-launch-url</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/feature-request-allow-setting-web-client-features-from-direct/m-p/4505993#M14032</link>
      <description>&lt;P&gt;We use the "direct launch URL" feature of the AVD web client to deep link users to a session desktop (&lt;A href="https://learn.microsoft.com/en-us/windows-app/direct-launch-urls?tabs=avd" target="_blank"&gt;https://learn.microsoft.com/en-us/windows-app/direct-launch-urls?tabs=avd&lt;/A&gt;). One of the reason we use the web client is because we use AVD in exam halls on Chromebooks in kiosk-mode. The ChromeOS kiosk-mode only supports websites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Students are faced with a connection dialog in which they can toggle IME and Special Keys. The students have to enable IME, but since these are university-owned devices, they do not know and just click "Connect".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We would like to be able to configure these client options automatically. For example, as query parameters in the direct-launch-url.&lt;/P&gt;&lt;P&gt;Ideally, we would also skip the "Connect" dialog entirely and just go strait into the session once the direct-launch-url is loaded.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 16:59:14 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/feature-request-allow-setting-web-client-features-from-direct/m-p/4505993#M14032</guid>
      <dc:creator>laurens2305</dc:creator>
      <dc:date>2026-03-26T16:59:14Z</dc:date>
    </item>
    <item>
      <title>Azure Virtual Desktop(AVD) - Enable Cloud Kerberos for storage accounts question</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-virtual-desktop-avd-enable-cloud-kerberos-for-storage/m-p/4502305#M14028</link>
      <description>&lt;P&gt;I need to enable Cloud Kerberos for storage accounts used for AVD host pool. I am thinking of following the following instruction. Is that correct steps and is that all that is required?:-&lt;/P&gt;&lt;P&gt;After enabling AADKERB on the storage account :-&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;1a. Find the AADKERB Service Principal&lt;/P&gt;&lt;P&gt;Use Azure CLI to log into correct tenant&lt;/P&gt;&lt;P&gt;az login –tenant &amp;lt;tenantName&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1b. Find the AADKERB Service Principal&lt;/P&gt;&lt;P&gt;Look up by display name pattern&lt;/P&gt;&lt;P&gt;az ad sp list --filter "startswith(displayName,'[Storage Account]')" --query "[?contains(displayName,'&amp;lt;storageAccountName&amp;gt;')].{id:id,appId:appId,name:displayName}" -o table&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1c. Grant Admin Consent&lt;/P&gt;&lt;P&gt;The AADKERB SP requires the following delegated permissions on Microsoft Graph:&lt;/P&gt;&lt;P&gt;openid&lt;/P&gt;&lt;P&gt;profile&lt;/P&gt;&lt;P&gt;User.Read ← This is often overlooked but required&lt;/P&gt;&lt;P&gt;Get the Microsoft Graph SP ID&lt;/P&gt;&lt;P&gt;$graphSpId=$(az ad sp list --filter "appId eq '00000003-0000-0000-c000-000000000000'" --query "[0].id" -o tsv)&lt;/P&gt;&lt;P&gt;Get the AADKERB SP ID&lt;/P&gt;&lt;P&gt;$aadkerbSpId=&amp;lt;from step 1a&amp;gt;&lt;/P&gt;&lt;P&gt;Check existing grants&lt;/P&gt;&lt;P&gt;az rest --method GET --url "https://graph.microsoft.com/v1.0/oauth2PermissionGrants?$filter=clientId eq '$aadkerbSpId' and resourceId eq '$graphSpId'"&lt;/P&gt;&lt;P&gt;Create or update the grant&lt;/P&gt;&lt;P&gt;az rest --method POST --url "https://graph.microsoft.com/v1.0/oauth2PermissionGrants" --body "{&lt;/P&gt;&lt;P&gt;"clientId": "$aadkerbSpId",&lt;/P&gt;&lt;P&gt;"consentType": "AllPrincipals",&lt;/P&gt;&lt;P&gt;"resourceId": "$graphSpId",&lt;/P&gt;&lt;P&gt;"scope": "openid profile User.Read"&lt;/P&gt;&lt;P&gt;}"&lt;/P&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Sun, 15 Mar 2026 09:55:10 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-virtual-desktop-avd-enable-cloud-kerberos-for-storage/m-p/4502305#M14028</guid>
      <dc:creator>curious7</dc:creator>
      <dc:date>2026-03-15T09:55:10Z</dc:date>
    </item>
    <item>
      <title>Windows App - RDP channel crashes when printing on a redirected canon printer</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/windows-app-rdp-channel-crashes-when-printing-on-a-redirected/m-p/4500284#M14023</link>
      <description>&lt;P&gt;Hey team,&lt;/P&gt;&lt;P&gt;I would like to know, if anyone else struggles with the following scenario:&lt;/P&gt;&lt;P&gt;A canon printer is installed on a &lt;STRONG&gt;local client&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;The user is working in the &lt;STRONG&gt;AVD environment&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The printers are redirected into the AVD-Session via "&lt;STRONG&gt;printer redirect&lt;/STRONG&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since the users are migrating to the new "&lt;STRONG&gt;Windows App&lt;/STRONG&gt;", the AVD session breaks as soon as the user is printing on a redirected Canon-Printer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When printing on another printer, there is no issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also: With the "&lt;STRONG&gt;Microsoft-Remotedesktop&lt;/STRONG&gt;" Application, everything works as it should.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A Microsoft ticket is already raised.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to know if there are other environments, which are encountering the same issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 08:06:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/windows-app-rdp-channel-crashes-when-printing-on-a-redirected/m-p/4500284#M14023</guid>
      <dc:creator>ChrisDub</dc:creator>
      <dc:date>2026-03-09T08:06:22Z</dc:date>
    </item>
    <item>
      <title>WindowsAppRuntime 1.4 Failures in AVD Multi-Session – Event ID 404 Production Case</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/windowsappruntime-1-4-failures-in-avd-multi-session-event-id-404/m-p/4496401#M14014</link>
      <description>&lt;P&gt;We recently experienced a production issue in an Azure Virtual Desktop multi-session environment that initially looked random — but turned out to be a shared framework instability amplified by scale.&lt;/P&gt;&lt;P&gt;Environment:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AVD multi-session host pools&lt;/LI&gt;&lt;LI&gt;FSLogix profile containers&lt;/LI&gt;&lt;LI&gt;MSIX App Attach&lt;/LI&gt;&lt;LI&gt;Intune-managed&lt;/LI&gt;&lt;LI&gt;Clean golden image&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Everything looked healthy.&lt;/P&gt;&lt;P&gt;Yet packaged applications started failing across multiple host pools.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Symptoms observed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Users reported:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Error &lt;STRONG&gt;0x80070005&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;AppXDeploymentServer Event ID 404&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;WindowsAppRuntime 1.4 marked as &lt;STRONG&gt;NeedsRemediation&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Failures persisted after:&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;Reboots&lt;/LI&gt;&lt;LI&gt;Host redeployments&lt;/LI&gt;&lt;LI&gt;Image rebuild&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;This was not:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A profile corruption issue&lt;/LI&gt;&lt;LI&gt;An App Attach packaging issue&lt;/LI&gt;&lt;LI&gt;An Intune deployment failure&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;What actually broke&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Under session churn conditions (logoff / new session / runtime re-validation), WindowsAppRuntime 1.4 entered a &lt;STRONG&gt;NeedsRemediation&lt;/STRONG&gt; state.&lt;/P&gt;&lt;P&gt;Event Viewer showed:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AppXDeploymentServer Event ID 404&lt;/LI&gt;&lt;LI&gt;HRESULT 0x80070005&lt;/LI&gt;&lt;LI&gt;Runtime file creation failure under WindowsApps&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Multi-session did not cause the issue.&lt;/P&gt;&lt;P&gt;It amplified it.&lt;/P&gt;&lt;P&gt;Shared framework registration timing under concurrent sessions made a rare condition systemic.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Why multi-session exposed it&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;In single-session environments, runtime inconsistencies remain isolated.&lt;/P&gt;&lt;P&gt;In multi-session:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Shared framework dependencies are reused&lt;/LI&gt;&lt;LI&gt;Concurrent validation occurs&lt;/LI&gt;&lt;LI&gt;Host pools recycle under load&lt;/LI&gt;&lt;LI&gt;Registration timing becomes critical&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What would be a rare edge case became recurring instability.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remediation approach&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Instead of periodic polling, we moved to event-driven self-healing.&lt;/P&gt;&lt;P&gt;Detection trigger:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AppXDeploymentServer Event ID 404&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Remediation logic:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Restart AppXSVC&lt;/LI&gt;&lt;LI&gt;Re-provision WindowsAppRuntime 1.4&lt;/LI&gt;&lt;LI&gt;Prevent concurrent duplicate execution&lt;/LI&gt;&lt;LI&gt;Log execution&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We implemented a Scheduled Task:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Monitoring Operational log&lt;/LI&gt;&lt;LI&gt;Triggering immediately on Event ID 404&lt;/LI&gt;&lt;LI&gt;Running under SYSTEM&lt;/LI&gt;&lt;LI&gt;Deployed via Intune Win32 package&lt;/LI&gt;&lt;LI&gt;Detection logic validating task presence&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This converted reactive troubleshooting into automated correction across host pools.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Architectural takeaway&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Multi-session environments amplify shared dependency weaknesses.&lt;/P&gt;&lt;P&gt;WindowsAppRuntime is not “just another component” — it is a platform dependency.&lt;/P&gt;&lt;P&gt;If the runtime layer drifts, everything layered above it collapses:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;MSIX App Attach&lt;/LI&gt;&lt;LI&gt;Packaged apps&lt;/LI&gt;&lt;LI&gt;Registration consistency&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Self-healing must be part of AVD design.&lt;/P&gt;&lt;P&gt;For the structured technical case study (including deployment pattern and remediation logic), full write-up here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://modernendpoint.tech/avd-multi-session-failure-analysis/" target="_blank"&gt;https://modernendpoint.tech/avd-multi-session-failure-analysis/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Has anyone else observed WindowsAppRuntime 1.4 entering a NeedsRemediation state under multi-session load?&lt;/P&gt;&lt;P&gt;Curious if others saw correlation with specific Windows updates.&lt;/P&gt;&lt;P&gt;—&lt;BR /&gt;Menahem Suissa&lt;BR /&gt;Modern Endpoint Architect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 04:54:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/windowsappruntime-1-4-failures-in-avd-multi-session-event-id-404/m-p/4496401#M14014</guid>
      <dc:creator>Menahem</dc:creator>
      <dc:date>2026-02-23T04:54:46Z</dc:date>
    </item>
    <item>
      <title>SSL_ERR_CREDENTIAL_PROMPT_FAILED_WITH_CO_E_SERVER_EXEC_FAILURE (15623)</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/ssl-err-credential-prompt-failed-with-co-e-server-exec-failure/m-p/4495460#M14009</link>
      <description>&lt;P&gt;Need help with the following issues on AVD. What could be causing these issues?? My users seem to get the error when they try to sign on.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 17:33:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/ssl-err-credential-prompt-failed-with-co-e-server-exec-failure/m-p/4495460#M14009</guid>
      <dc:creator>Dfalz01</dc:creator>
      <dc:date>2026-02-17T17:33:15Z</dc:date>
    </item>
    <item>
      <title>Improper AVD Host Decommissioning – A Practical Governance Framework</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/improper-avd-host-decommissioning-a-practical-governance/m-p/4495437#M14006</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;After working with multiple production Azure Virtual Desktop environments, I noticed a recurring issue that rarely gets documented properly:&lt;/P&gt;&lt;P&gt;Improper host decommissioning.&lt;/P&gt;&lt;P&gt;Scaling out AVD is easy.&lt;/P&gt;&lt;P&gt;Scaling down safely is where environments silently drift.&lt;/P&gt;&lt;P&gt;Common issues I’ve seen in the field:&lt;/P&gt;&lt;P&gt;Session hosts deleted before drain completion&lt;/P&gt;&lt;P&gt;Orphaned Entra ID device objects&lt;/P&gt;&lt;P&gt;Intune-managed device records left behind&lt;/P&gt;&lt;P&gt;Stale registration tokens&lt;/P&gt;&lt;P&gt;FSLogix containers remaining locked&lt;/P&gt;&lt;P&gt;Defender onboarding objects not cleaned&lt;/P&gt;&lt;P&gt;Host pool inconsistencies over time&lt;/P&gt;&lt;P&gt;The problem is not technical complexity.&lt;/P&gt;&lt;P&gt;It’s lifecycle governance.&lt;/P&gt;&lt;P&gt;So I built a structured approach to host decommissioning focused on:&lt;/P&gt;&lt;P&gt;Drain validation&lt;/P&gt;&lt;P&gt;Active session verification&lt;/P&gt;&lt;P&gt;Controlled removal from host pool&lt;/P&gt;&lt;P&gt;VM deletion sequencing&lt;/P&gt;&lt;P&gt;Identity cleanup validation&lt;/P&gt;&lt;P&gt;Registration token rotation&lt;/P&gt;&lt;P&gt;Logging and execution safety&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’ve published a practical framework here:&lt;/P&gt;&lt;P&gt;The framework is fully documented and includes validation logic and logging.&lt;/P&gt;&lt;P&gt;https://github.com/modernendpoint/AVD-Host-Decommission-Framework&lt;/P&gt;&lt;P&gt;The goal is simple:&lt;/P&gt;&lt;P&gt;Not just removing a VM —&lt;/P&gt;&lt;P&gt;but preserving platform integrity.&lt;/P&gt;&lt;P&gt;I’m curious:&lt;/P&gt;&lt;P&gt;How are you handling host lifecycle management in your AVD environments?&lt;/P&gt;&lt;P&gt;Fully automated?&lt;/P&gt;&lt;P&gt;Manual?&lt;/P&gt;&lt;P&gt;Integrated with scaling plans?&lt;/P&gt;&lt;P&gt;Identity cleanup included?&lt;/P&gt;&lt;P&gt;Would love to hear how others approach this.&lt;/P&gt;&lt;P&gt;Menahem Suissa&lt;/P&gt;&lt;P&gt;AVD | Intune | Identity-Driven Architecture&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 16:11:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/improper-avd-host-decommissioning-a-practical-governance/m-p/4495437#M14006</guid>
      <dc:creator>Menahem</dc:creator>
      <dc:date>2026-02-17T16:11:12Z</dc:date>
    </item>
    <item>
      <title>macOS: SSO no longer fully functional on AVD (Win11 25H2)</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/macos-sso-no-longer-fully-functional-on-avd-win11-25h2/m-p/4494544#M14001</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;Since updating our Test Azure Virtual Desktop Session Hosts from Windows 11 23h2 to 25H2 (26200.7462) , we've been experiencing an SSO issue that exclusively affects macOS clients.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Symptoms&lt;/P&gt;&lt;P&gt;For macOS users (Windows App), the following issues occur:&lt;/P&gt;&lt;P&gt;Example Teams&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Teams shows the user as "Unknown User"&lt;/LI&gt;&lt;LI&gt;Chat and collaboration features fail to load&lt;/LI&gt;&lt;LI&gt;Error message: "You need to sign in again. This may be a requirement from your IT department or Teams, or the result of a password update. - Sign in"&lt;/LI&gt;&lt;LI&gt;After clicking "Sign in," only a window appears with "Continue with sign-in" (no PW/MFA prompt)&lt;/LI&gt;&lt;LI&gt;After this, all other applications work without further authentication&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Technical Details&lt;/P&gt;&lt;P&gt;macOS Device:&lt;/P&gt;&lt;P&gt;AppleM4 Pro&lt;BR /&gt;macOS Tahoe 26.2&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Installed WindowsApp version:&lt;/P&gt;&lt;P&gt;11.3.2 (2848)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;dsregcmd /status:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;No errors detected&lt;/LI&gt;&lt;LI&gt;PRT is active and was updated for sign-in&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Entra Sign-In Logs:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Error code: 9002341&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;EventLog on Session Host (AAD-Operational):&lt;/P&gt;&lt;P&gt;Event ID: 1098 Error: 0xCAA2000C The request requires user interaction. Code: interaction_required Description: AADSTS9002341: User is required to permit SSO. Event ID: 1097 Error: 0xCAA90056 Renew token by the primary refresh token failed. Logged at RefreshTokenRequest.cpp, line: 148, method: RefreshTokenRequest::AcquireToken.&lt;/P&gt;&lt;P&gt;Observations&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Affects: Both managed (internal) and unmanaged (external) macOS devices&lt;/LI&gt;&lt;LI&gt;Does NOT affect: Windows clients connecting via Windows App&lt;/LI&gt;&lt;LI&gt;Interesting: If a macOS user starts the session (with the error) and then reconnects on a Windows device, authentication works automatically there&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Workaround&lt;/P&gt;&lt;P&gt;The issue can be resolved for macOS clients by removing the "DE" flag from "Automatic app sign-in" in the following file:&lt;/P&gt;&lt;P&gt;C:\Windows\System32\IntegratedServicesRegionPolicySet.json&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Questions&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is this a known issue?&lt;/LI&gt;&lt;LI&gt;Has anyone experienced similar issues with macOS clients after the 25H2 update?&lt;/LI&gt;&lt;LI&gt;Why does this issue only occur with macOS clients?&lt;/LI&gt;&lt;LI&gt;Why does SSO only work after removing the "DE" flag for macOS devices, and why are Windows devices not affected?&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I would appreciate any insights or confirmation of this issue!&lt;/P&gt;&lt;P&gt;Thank you and greetings FT_1&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 10:57:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/macos-sso-no-longer-fully-functional-on-avd-win11-25h2/m-p/4494544#M14001</guid>
      <dc:creator>FT_1</dc:creator>
      <dc:date>2026-02-12T10:57:27Z</dc:date>
    </item>
    <item>
      <title>Azure’s Default Outbound Access Changes: Guidance for Azure Virtual Desktop Customers</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-s-default-outbound-access-changes-guidance-for-azure/m-p/4494462#M14000</link>
      <description>&lt;P&gt;After March 31, 2026, newly created Azure Virtual Networks (VNets) will no longer have default outbound internet access (DOA) enabled by default. Azure Virtual Desktop customers must configure outbound connectivity explicitly when setting up new VNets. This post explains what’s changing, who’s impacted, and the recommended actions, including Private Subnets.&lt;/P&gt;
&lt;H3&gt;What is Default Outbound Access (DOA)?&lt;/H3&gt;
&lt;P&gt;Default Outbound Access is Azure’s legacy behavior that allowed all resources in a virtual network to reach the public internet without configuring a specific internet egress path. This allowed telemetry, Windows activation, updates, and other service dependencies to reach external endpoints even when no explicit outbound connectivity method was configured.&lt;/P&gt;
&lt;H3&gt;What’s changing?&lt;/H3&gt;
&lt;P&gt;After &lt;STRONG&gt;March 31, 2026&lt;/STRONG&gt;, as detailed in &lt;A href="https://azure.microsoft.com/en-us/updates?id=492953" target="_blank"&gt;Azure’s communications&lt;/A&gt;, Azure will no longer enable &lt;STRONG&gt;DOA&lt;/STRONG&gt; by default for new virtual networks. Instead, the VNet will be configured for &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/default-outbound-access#private-subnets-overview" target="_blank"&gt;&lt;STRONG&gt;Private Subnet&lt;/STRONG&gt;&lt;/A&gt; option, allowing you to designate subnets without internet access for improved isolation and compliance. These changes encourage more intentional, secure network configurations while offering flexibility for different workload needs. Disabling Private Subnet option will allow administrators to restore DOA capabilities to the VNet, although Microsoft strongly recommends using NAT Gateway to provide outbound Internet access for session hosts.&lt;/P&gt;
&lt;H3&gt;Impact on Azure Virtual Desktop Customers&lt;/H3&gt;
&lt;P&gt;For Azure Virtual Desktop deployments created after March 31, 2026, outbound internet access must be explicitly configured, otherwise deployment and connectivity of the Session Hosts will fail. Existing VNets remain unaffected and will continue to use the configured internet access method.&lt;/P&gt;
&lt;H3&gt;What You Should Do&lt;/H3&gt;
&lt;P&gt;To prepare for Azure’s Default Outbound Access changes and ensure your Azure Virtual Desktop deployments remain secure and functional.&lt;/P&gt;
&lt;H3&gt;Recommendations&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Update deployment&lt;/STRONG&gt; &lt;STRONG&gt;plans&lt;/STRONG&gt; to ensure either an explicit NAT, such as a NAT Gateway or Default Outbound access (not recommended) is enabled by disabling the Private Subnet option.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Test connectivity&lt;/STRONG&gt; to ensure all services dependent on outbound access continue to function as expected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Supported Outbound Access Methods&lt;/H3&gt;
&lt;P&gt;To maintain connectivity, choose one of these &lt;A href="https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-outbound-connections#scenarios" target="_blank"&gt;supported methods&lt;/A&gt;:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/nat-gateway/nat-overview?source=recommendations" target="_blank"&gt;NAT Gateway&lt;/A&gt; (recommended)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Note: Direct RDP&amp;nbsp;Shortpath&amp;nbsp;(UDP over STUN) cannot be&amp;nbsp;established&amp;nbsp;through a NAT Gateway because its symmetric NAT policy&amp;nbsp;prevents&amp;nbsp;direct UDP connectivity over public networks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-overview" target="_blank"&gt;Azure Standard Load Balancer&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Public IP address on a VM&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/firewall/overview" target="_blank"&gt;Azure Firewall&lt;/A&gt; or third-party Network Virtual Appliance (NVA). Note, it is not recommended to route RDP or other long-lived connections through Azure Firewall or any other network virtual appliance which allows for automatic scale-in. A direct method such as NAT Gateway should be used.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;More information about the pros and cons of each method can be found at &lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/default-outbound-access#how-can-i-disable-default-outbound-access" target="_blank"&gt;Default Outbound Access&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;Resources:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://azure.microsoft.com/en-us/updates?id=492953" target="_blank"&gt;Azure updates | Microsoft Azure&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/default-outbound-access#how-can-i-disable-default-outbound-access" target="_blank"&gt;Default Outbound Access in Azure&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/default-outbound-access#how-can-i-transition-to-an-explicit-method-of-public-connectivity-and-disable-default-outbound-access" target="_blank"&gt;Transition to an explicit method of public connectivity| Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/nat-gateway/quickstart-create-nat-gateway" target="_blank"&gt;Quickstart: Create a NAT Gateway&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Quick FAQ&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Does this affect existing VNets? &lt;/STRONG&gt;No. Only VNets created after March 31, 2026, are affected. &amp;nbsp;Existing VNets will continue to operate as normal.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What if I do nothing on a new VNet? &lt;/STRONG&gt;Host pool deployment will fail, and&lt;STRONG&gt; &lt;/STRONG&gt;connectivity will fail because the VNet does not have internet access&lt;STRONG&gt;. &lt;/STRONG&gt;Configure NAT Gateway or another supported method before starting a host pool deployment.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why do Azure Virtual Desktop session hosts need outbound internet access?&lt;/STRONG&gt; Many Azure Virtual Desktop functions depend on the session host having outbound access to Microsoft services. Without configuring NAT Gateway or another supported method of explicit outbound for the VNet, Azure Virtual Desktop will not deploy or function correctly.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What are the required endpoints?&lt;/STRONG&gt; Please see &lt;A href="https://learn.microsoft.com/azure/virtual-desktop/required-fqdn-endpoint?tabs=azure" target="_blank"&gt;https://learn.microsoft.com/azure/virtual-desktop/required-fqdn-endpoint?tabs=azure&lt;/A&gt; for a list of the endpoints required.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why might peer-to-peer connectivity using STUN-based UDP hole punching not work when using NAT Gateway?&lt;/STRONG&gt; NAT Gateway uses a type of network address translation that does not support cone symmetric NAT behavior. This can prevent STUN (Simple Traversal Underneath NAT) based UDP hole punching, commonly used for establishing peer-to-peer connections, from working as expected. If your application relies on reliable UDP connectivity between peers, STUN may revert to TURN (Traversal Using Relays around NAT) in some instances. TURN relays traffic between endpoints, ensuring consistent connectivity even when direct peer-to-peer paths are blocked. This helps maintain smooth real-time experiences for your users.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What explicit outbound options support STUN?&lt;/STRONG&gt; Azure Standard Load Balancer supports UDP over STUN.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How do I configure Azure Firewall?&lt;/STRONG&gt; For additional security you can configure Azure Firewall using these instructions: &lt;A href="https://learn.microsoft.com/en-us/azure/firewall/protect-azure-virtual-desktop?context=/azure/virtual-desktop/context/context" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/firewall/protect-azure-virtual-desktop?context=/azure/virtual-desktop/context/context&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;. It is strongly recommended that a direct method of access is used for RDP and other long-lived connections such as VPN or Secure Web Gateway tunnels. This is due to devices such as Azure firewall scaling in when load is low which can disrupt connectivity.&lt;/P&gt;
&lt;H3&gt;Wrap-up&lt;/H3&gt;
&lt;P&gt;Azure’s change reinforces intentional networking for better security. By planning explicit egress, Azure Virtual Desktop customers can stay compliant and keep session hosts reliably connected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 22:31:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-s-default-outbound-access-changes-guidance-for-azure/m-p/4494462#M14000</guid>
      <dc:creator>Kathryn_Jakubek</dc:creator>
      <dc:date>2026-02-11T22:31:27Z</dc:date>
    </item>
    <item>
      <title>Your computer was unable to connect to the remote computer</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/your-computer-was-unable-to-connect-to-the-remote-computer/m-p/4494411#M13999</link>
      <description>&lt;P&gt;I'm Having this AVD issue with a new workspace that was setup. It's a SessionDesktop application with a hostpool.&amp;nbsp; The Web version of the client works fine, can connect and open RDP session but the Windows App will not work either on-prem or off-prem showing the error in the title when attempting to launch the session.&amp;nbsp; I have tried playing with every setting I can find from RDP Properties, to Network ones, RDP shortpath, Entra SSO, Cred SSP, etc. Even if there was some sort of on-prem network issue it should still work when off-prem and it doesn't. But the web client works fine so I can't figure out what would cause this. The Application is just "SessionDesktop" and has no configurable parameters other than Display Name. The Host Pool has a private endpoint and when attempting to launch from the Windows App I can see some traffic going through our firewalls between the app and the PE as well as a few FQND's like windows365.microsoft.com, xxx.rdweb-g-us-r0-wvd.microsoft.com, xxx.afdfp-rdgateway-r0.wvd.microsoft.com etc... It's all 443 traffic though, no 3389 or 3390.&lt;/P&gt;&lt;P&gt;Entra logs show successful auth to Windows App and Conditional Access Policy result is Success with Grant Controls Satisfied and Session Controls Enforced.&lt;/P&gt;&lt;P&gt;I have the Windows App version 2.0.918.0 with Client version 1.2.6876.0 which should be the latest at the time of this writing. I tried the old deprecated RemoteDesktop app and it does the same thing.&lt;/P&gt;&lt;P&gt;One other thing I tried was downloading the. rdpw file from the web client and adding a bunch of parameters to the RDP advanced config like gatewayusagemethod, gatewaybrokeringtype, wvd endpoint pool etc. as they don't seem to be in there by default but it had no effect. I suspect those properties should be dynamically added at runtime rather than baked in to the config.&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 18:03:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/your-computer-was-unable-to-connect-to-the-remote-computer/m-p/4494411#M13999</guid>
      <dc:creator>cadminimum</dc:creator>
      <dc:date>2026-02-11T18:03:11Z</dc:date>
    </item>
    <item>
      <title>Issues with FSLogix Profiles on Win11 25H2 Multiuser sessionhost's</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/issues-with-fslogix-profiles-on-win11-25h2-multiuser-sessionhost/m-p/4491584#M13994</link>
      <description>&lt;P&gt;Hey guys&lt;/P&gt;&lt;P&gt;we have currently lot of issues with AVD and FSLogix 26.01. There seems to be an issue that the profile container isnt't unmounted correctly. We have lot's of users who are not able to login correctly because the profile can't be mounted because its already in use by another process.&lt;/P&gt;&lt;P&gt;I'm currently looking what could cause that. We use a Azure files storage were i don't see any issues. It looks like a process within the userprofile is blocking the unload of the profile.&lt;/P&gt;&lt;P&gt;Should i be able to see in the logs of FSLogix which process is causing this. Or what is a effective way to troubleshoot that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Marc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 17:39:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/issues-with-fslogix-profiles-on-win11-25h2-multiuser-sessionhost/m-p/4491584#M13994</guid>
      <dc:creator>marc_kuhn</dc:creator>
      <dc:date>2026-02-02T17:39:04Z</dc:date>
    </item>
    <item>
      <title>RemoteApp for Word/Excel with Google Drive</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/remoteapp-for-word-excel-with-google-drive/m-p/4490874#M13990</link>
      <description>&lt;P&gt;I want to set up RemoteApp so users can use Word and Excel remotely. At the same time, I want them to be able to access and save files directly from Google Drive within those apps.&lt;/P&gt;&lt;P&gt;We currently only have 3 users who need this, but we plan to expand in the future.&lt;/P&gt;&lt;P&gt;What’s the best way to do this? Do I need a specific setup, plugin, or service to make Google Drive work seamlessly with Word/Excel in a RemoteApp environment?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 17:24:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/remoteapp-for-word-excel-with-google-drive/m-p/4490874#M13990</guid>
      <dc:creator>Luke227</dc:creator>
      <dc:date>2026-01-30T17:24:58Z</dc:date>
    </item>
    <item>
      <title>AVD Remote published Application Disconnection</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/avd-remote-published-application-disconnection/m-p/4490873#M13989</link>
      <description>&lt;P&gt;Is anyone aware of any known issues with AVD Remote Applications?&lt;/P&gt;&lt;P&gt;We’re experiencing random disconnections across all Remote App users, with error details in insight point to StackCrash&amp;nbsp;. The January 2026 update and OBB fix patches have already been applied, but the problem persists.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ServiceRDStackStackCrash (-1073741819)&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 17:14:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/avd-remote-published-application-disconnection/m-p/4490873#M13989</guid>
      <dc:creator>johnsAVD</dc:creator>
      <dc:date>2026-01-30T17:14:19Z</dc:date>
    </item>
    <item>
      <title>Need Help: Shortpath Drops &amp; RDstack error in AVD</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/need-help-shortpath-drops-rdstack-error-in-avd/m-p/4490522#M13986</link>
      <description>&lt;P&gt;I’m seeing persistent AVD connection issues and would appreciate guidance.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Frequent ShortpathTransportNetworkDrop (68) and ShortpathNetworkDrop (16644) errors&lt;/LI&gt;&lt;LI&gt;GetInputDeviceHandlesError (4463)&lt;/LI&gt;&lt;LI&gt;US based users and hostpool/sessionhost&lt;/LI&gt;&lt;LI&gt;Users experience instability and degraded performance&lt;BR /&gt;&lt;BR /&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 29 Jan 2026 19:31:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/need-help-shortpath-drops-rdstack-error-in-avd/m-p/4490522#M13986</guid>
      <dc:creator>Dfalz01</dc:creator>
      <dc:date>2026-01-29T19:31:13Z</dc:date>
    </item>
    <item>
      <title>Seamless SSO According to MS Support</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/seamless-sso-according-to-ms-support/m-p/4485395#M13982</link>
      <description>&lt;P&gt;I am in the process of setting up a POC for AVD and followed all the instructions that I have found for enabling Seamless SSO for AVD.&amp;nbsp; We are currently running in hybrid mode and I have created a server 2025 with latest patches.&amp;nbsp; When I attempt to sign in via web or windows app, I signin to the web interface or the app and I am presented with the desktops.&amp;nbsp; I launch a desktop and it prompts me for a user and pass (the user is pre-populated)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is that this should not happen.&amp;nbsp; It should seamlessly signin&amp;nbsp; (This would cause issues with our users not using passwords)&amp;nbsp; I contacted Microsoft support and they state that this is by design.&amp;nbsp; They stated this is how it operates in their lab.&lt;BR /&gt;&lt;BR /&gt;Can someone clarify, if I sign into Windows app or the web, that my authentication should seamlessly sign me into the AVD server I have published?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 21:13:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/seamless-sso-according-to-ms-support/m-p/4485395#M13982</guid>
      <dc:creator>RobYoung</dc:creator>
      <dc:date>2026-01-13T21:13:46Z</dc:date>
    </item>
    <item>
      <title>Ubuntu as session host</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/ubuntu-as-session-host/m-p/4483664#M13978</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;I understand there is no native solution for running an ubuntu vm as a session host. I didn't find any image in the marketplace for this.&lt;BR /&gt;I found this &lt;A class="lia-external-url" href="https://github.com/microsoft/LinuxBrokerForAVDAccess" target="_blank"&gt;GitHub project&lt;/A&gt; that proposes a solution. Does anyone actually uses this or any other solutions?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2026 08:58:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/ubuntu-as-session-host/m-p/4483664#M13978</guid>
      <dc:creator>dhab</dc:creator>
      <dc:date>2026-01-07T08:58:53Z</dc:date>
    </item>
    <item>
      <title>Azure Virtual Desktop not functioning</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-virtual-desktop-not-functioning/m-p/4480528#M13976</link>
      <description>&lt;P&gt;Hi, we are experiencing issues with the Azure Desktop Client. Users are able to login, but no desktops appear and there's no user information displayed either. It was working fine yesterday.&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;This is what it looks like now.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 08:39:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-virtual-desktop-not-functioning/m-p/4480528#M13976</guid>
      <dc:creator>RebeccaBroos</dc:creator>
      <dc:date>2025-12-23T08:39:02Z</dc:date>
    </item>
    <item>
      <title>Azure Virtual Desktop (Pooled) – Sessions ending unexpectedly and users stuck across session hosts</title>
      <link>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-virtual-desktop-pooled-sessions-ending-unexpectedly-and/m-p/4478548#M13967</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are currently investigating an issue in an Azure Virtual Desktop (AVD) environment where users are intermittently disconnected during sign-in or are unable to reconnect to their sessions.&lt;/P&gt;&lt;P&gt;Environment:&lt;BR /&gt;Azure Virtual Desktop&lt;BR /&gt;Host pool: Pooled&lt;BR /&gt;OS: Windows 10 / Windows 11 Enterprise multi-session&lt;BR /&gt;FSLogix enabled&lt;BR /&gt;Client: Windows App (Remote Desktop)&lt;/P&gt;&lt;P&gt;Error message seen by users:&lt;BR /&gt;"Your Remote Desktop Services session has ended.&lt;BR /&gt;The administrator has ended the session, an error occurred while the connection was being established, or a network problem occurred."&lt;/P&gt;&lt;P&gt;What we are seeing:&lt;BR /&gt;Users fail to connect or get disconnected shortly after login.&lt;BR /&gt;Session hosts appear healthy and powered on.&lt;BR /&gt;No admin-initiated logoff is taking place.&lt;BR /&gt;Rebooting the affected session host sometimes resolves the issue, but only temporarily.&lt;/P&gt;&lt;P&gt;Actions already taken:&lt;BR /&gt;Restarted AVD agent services on the session hosts.&lt;BR /&gt;Placed affected hosts in drain mode.&lt;BR /&gt;Rebooted the VMs.&lt;/P&gt;&lt;P&gt;What we suspect:&lt;BR /&gt;Some users may still have active or disconnected sessions on previous session hosts, possibly combined with FSLogix profile locks, which could be preventing new sessions from starting correctly.&lt;/P&gt;&lt;P&gt;Questions:&lt;BR /&gt;What is the recommended way to identify which users are logged into which session hosts across a pooled host pool?&lt;BR /&gt;Are there best practices using the Azure Portal or PowerShell to detect and clean up stuck or disconnected sessions?&lt;BR /&gt;Has anyone seen similar behavior in pooled AVD environments with Windows 10/11 and FSLogix enabled?&lt;/P&gt;&lt;P&gt;Any advice or pointers would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 22:47:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/azure-virtual-desktop/azure-virtual-desktop-pooled-sessions-ending-unexpectedly-and/m-p/4478548#M13967</guid>
      <dc:creator>StormShadow007</dc:creator>
      <dc:date>2025-12-16T22:47:32Z</dc:date>
    </item>
  </channel>
</rss>

