A Microsoft desktop and app virtualization service that runs on Azure. Previously known as Windows Virtual Desktop.
Hi
Thanks for reaching out. Please find the guidance regarding Azure AD Kerberos and FSLogix profile containers in cloud-only AVD environments below:
Confirm supported method to enable Azure AD Kerberos on Azure AD joined AVD hosts without domain join.
Microsoft Entra Kerberos is not supported for pure cloud-only environments with Entra ID joined AVD hosts and cloud-only user accounts. This feature requires hybrid identities (user accounts synced from on-premises Active Directory to Entra ID via Microsoft Entra Connect) to generate Kerberos tickets for Azure Files SMB access. Without hybrid sync, the Entra Kerberos feature cannot activate, even with manual registry changes.
We noticed that you attempted to enable Azure AD Kerberos by adding the registry key:
HKLM\SOFTWARE\Microsoft\AzureADKerberos\Enabled = 1
Please note that this method is not supported and will not activate the feature. The only supported way to enable Azure AD Kerberos on Azure AD joined AVD hosts is through Intune policy:
OMA-URI: ./Device/Vendor/MSFT/Kerberos/CloudKerberosTicketRetrievalEnabled Value: 1
This requires the session hosts to be enrolled in Intune and the Task Scheduler service enabled for policy execution.
Guidance on enforcing Azure AD Kerberos policy when Intune enrollment is blocked by Task Scheduler.
The Task Scheduler service must be enabled on the AVD session hosts to allow successful Intune enrollment and policy application. If Task Scheduler is disabled (for example, by a baseline security policy), it prevents the execution of key commands like dsregcmd /join and blocks device enrollment. You should re-enable Task Scheduler either manually or through Group Policy to proceed with enrollment and policy deployment.
- please check service is running or not: Get-Service Schedule
- To start the service: Start-Service -Name Schedule
Any alternative approach for FSLogix profile containers with Azure Files in cloud-only environments.
If Intune enrollment or hybrid join is not feasible, FSLogix profile containers cannot currently access Azure Files with Azure AD Kerberos authentication. Alternatives include:
- Using hybrid Azure AD joined or domain-joined session hosts where Kerberos authentication can be fully enabled.
- Leveraging other profile storage solutions such as Azure NetApp Files or Azure Blob Storage combined with alternate profile management strategies that do not require Kerberos tickets.
- Temporarily use key-based authentication (storage account key or SAS) for FSLogix profile containers.
Reference: https://learn.microsoft.com/en-us/fslogix/how-to-configure-profile-container-entra-id-hybrid
To better understand could you please clarify the following:
- Are your AVD session hosts purely cloud-only (Azure AD joined), or is there any hybrid AD DS connectivity configured?
- Could you confirm if the Task Scheduler service can be re-enabled via Group Policy or manually?
- Have there been any recent changes to your environment setup that might be affecting Intune enrollment?