![]() ![]() You can open the files in a text editor, or provide them to support. You can find the log file in the directory you chose to save the logs to. Once you're finished, select Stop Logging. Use the Remote Desktop client as you normally would. Select a Core log level and a UI log level.įor When logging, write the output to, select the drop-down menu, then select Choose Folder and choose which folder to save the logs to. Open Microsoft Remote Desktop and make sure there aren't any connections to devices or apps.įrom the macOS menu bar, select Help, followed by Troubleshooting, then select Logging. Here's how to collect logs from the Remote Desktop client for macOS: | project =(TimeGenerated), UserPrincipalName, AuthenticationRequirement, =ResultDescription, Status, ConditionalAccessPolicies, DeviceDetail, =IPAddress, =ResourceDisplayName You can access your sign-in logs by running the following Kusto query: let UPN = "userupn" The events shown are non-interactive user login events for the VM, which means the IP address will appear to come from the external IP address from which your VM accesses Microsoft Entra ID. If you have integrated Microsoft Entra logs with Azure Monitor logs to access your Microsoft Entra sign-in logs through Log Analytics, you can see if you've enabled multifactor authentication and which Conditional Access policy is triggering the event. If you try to sign in with multifactor authentication on a VM, you won't be able to sign in and will receive an error message. VM sign-ins don't support per-user enabled or enforced Microsoft Entra multifactor authentication. To reconfigure your multifactor authentication, follow the instructions in Enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access. If you've answered no to either of those questions, you'll need to reconfigure your multifactor authentication. Does your Conditional Access policy exclude multifactor authentication requirements for the Azure Windows VM sign-in cloud application?.Have you assigned the Virtual Machine User Login role-based access control (RBAC) permission to the virtual machine (VM) or resource group for each user?.If you keep seeing error messages, check to make sure you've fulfilled the following requirements: If you can't sign in and keep receiving an error message that says your credentials are incorrect, first make sure you're using the right credentials. For more information, contact your system administrator, ensure the user account was given the Virtual Machine User Login role on the VMs. If you come across an error saying Your account is configured to prevent you from using this device. Your account is configured to prevent you from using this device ![]() If you're using the correct account, make sure your application group is associated with a workspace. If you're using the Remote Desktop Web client, you can use an InPrivate browser window to try a different account. If you've already signed in with a different account than the one you want to use for Azure Virtual Desktop, you should first sign out, then sign in again with the correct account. If you don't see the remote resources you're expecting to see in the app, check the account you're using. In this section you'll find troubleshooting guidance for general issues with the Remote Desktop client. This article describes issues you may experience with the Remote Desktop client for macOS when connecting to Azure Virtual Desktop and how to fix them.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |