For simplicity's sake, here's the CoPilot summary of my problem, it concerns an Azure Virtual Desktop setup with Azure Files running a share for my FSLogix profiles. I can map to the FSLogix drive (it shows up in "net use" but not in File Explorer) and FSLogix will not create a profile container. RBAC is fine and all recommended registry settings are in place.
Here’s a concise, end‑to‑end summary of your troubleshooting so far and where things stand now.
1) What you started with
- Azure Files storage account hwgsfslogix for FSLogix profile containers.
- Initially, Default share‑level permissions were disabled and you couldn’t access the share; FSLogix could not attach, no logs were produced, and user profiles stayed local (non‑persistent).
2) Issues uncovered and fixed along the way
- Storage networking / firewall: A 403 in the Files blade pointed to the storage account network restrictions. You changed Public network access → Enabled (from all networks) and confirmed reachability on port 445.
- Name/DNS/endpoint clarity: We verified DNS now resolves hwgsfslogix.file.core.windows.net to a public Azure Files IP and that port 445 is open from the host.
- Share existence & path: After some name checks, you settled on the share FSLOGIXSMBTEST and confirmed it is reachable.
- Identity & auth (Entra‑only):
- You enabled Microsoft Entra Kerberos for Azure Files (identity‑based access).
- You assigned the correct Azure RBAC data‑plane roles (e.g., Storage File Data SMB Share Contributor/Elevated) to the users/groups.
- Result: mapping the share now works without storage account keys and without credential prompts.
- Transport/security posture:
- With Secure transfer required ON, your client negotiates SMB 3.1.1 + encryption to Azure Files.
- You verified this with Get‑SmbConnection → Dialect = 3.1.1, Encrypted = True.
- Server reachability proof:
- You successfully mapped the share: New‑PSDrive X: \hwgsfslogix.file.core.windows.net\FSLOGIXSMBTEST -Persist
Bottom line: Networking, DNS, storage firewall, identity (Entra Kerberos), and data‑plane RBAC are now all correct and working.
3) What still isn’t working
- FSLogix itself is not attaching the profile container at logon. Evidence:
- fsutil reparsepoint query C:\Users<user> → Error 4390 (not a reparse point).
- No FSLogix Profile logs in C:\ProgramData\FSLogix\Logs\Profile.
- frxstatus.exe not found in C:\Program Files\FSLogix\Apps.
This means the FSLogix agent installation is missing/incomplete on the AVD host. The storage side is fine; the profile engine simply isn’t running/installed, so nothing is attempting to attach or write logs.
Here’s a concise, end‑to‑end summary of your troubleshooting so far and where things stand now.
1) What you started with
- Azure Files storage account hwgsfslogix for FSLogix profile containers.
- Initially, Default share‑level permissions were disabled and you couldn’t access the share; FSLogix could not attach, no logs were produced, and user profiles stayed local (non‑persistent).
2) Issues uncovered and fixed along the way
- Storage networking / firewall: A 403 in the Files blade pointed to the storage account network restrictions. You changed Public network access → Enabled (from all networks) and confirmed reachability on port 445.
- Name/DNS/endpoint clarity: We verified DNS now resolves hwgsfslogix.file.core.windows.net to a public Azure Files IP and that port 445 is open from the host.
- Share existence & path: After some name checks, you settled on the share FSLOGIXSMBTEST and confirmed it is reachable.
- Identity & auth (Entra‑only):
- You enabled Microsoft Entra Kerberos for Azure Files (identity‑based access).
- You assigned the correct Azure RBAC data‑plane roles (e.g., Storage File Data SMB Share Contributor/Elevated) to the users/groups.
- Result: mapping the share now works without storage account keys and without credential prompts.
- Transport/security posture:
- With Secure transfer required ON, your client negotiates SMB 3.1.1 + encryption to Azure Files.
- You verified this with Get‑SmbConnection → Dialect = 3.1.1, Encrypted = True.
- Server reachability proof:
- You successfully mapped the share:
New‑PSDrive X: \hwgsfslogix.file.core.windows.net\FSLOGIXSMBTEST -Persist
Bottom line: Networking, DNS, storage firewall, identity (Entra Kerberos), and data‑plane RBAC are now all correct and working.
3) What still isn’t working
- FSLogix itself is not attaching the profile container at logon.
Evidence:
- fsutil reparsepoint query C:\Users<user> → Error 4390 (not a reparse point).
- No FSLogix Profile logs in C:\ProgramData\FSLogix\Logs\Profile.
- frxstatus.exe not found in C:\Program Files\FSLogix\Apps.
This means the FSLogix agent installation is missing/incomplete on the AVD host. The storage side is fine; the profile engine simply isn’t running/installed, so nothing is attempting to attach or write logs.
However: The FSLogix install is standard in my Azure Virtual Desktop deployment, and given the disk is currently ephemeral, installing/reinstalling it will do nothing.