Share via

How do I successfully create FSLogix profiles given the following:

Ashley Tym 0 Reputation points
2026-02-23T05:55:04.0733333+00:00

For simplicity's sake, here's the CoPilot summary of my problem, it concerns an Azure Virtual Desktop setup with Azure Files running a share for my FSLogix profiles. I can map to the FSLogix drive (it shows up in "net use" but not in File Explorer) and FSLogix will not create a profile container. RBAC is fine and all recommended registry settings are in place.

Here’s a concise, end‑to‑end summary of your troubleshooting so far and where things stand now.


1) What you started with

  • Azure Files storage account hwgsfslogix for FSLogix profile containers.
  • Initially, Default share‑level permissions were disabled and you couldn’t access the share; FSLogix could not attach, no logs were produced, and user profiles stayed local (non‑persistent).

2) Issues uncovered and fixed along the way

  • Storage networking / firewall: A 403 in the Files blade pointed to the storage account network restrictions. You changed Public network access → Enabled (from all networks) and confirmed reachability on port 445.
  • Name/DNS/endpoint clarity: We verified DNS now resolves hwgsfslogix.file.core.windows.net to a public Azure Files IP and that port 445 is open from the host.
  • Share existence & path: After some name checks, you settled on the share FSLOGIXSMBTEST and confirmed it is reachable.
  • Identity & auth (Entra‑only):
    • You enabled Microsoft Entra Kerberos for Azure Files (identity‑based access).
      • You assigned the correct Azure RBAC data‑plane roles (e.g., Storage File Data SMB Share Contributor/Elevated) to the users/groups.
        • Result: mapping the share now works without storage account keys and without credential prompts.
        • Transport/security posture:
          • With Secure transfer required ON, your client negotiates SMB 3.1.1 + encryption to Azure Files.
            • You verified this with Get‑SmbConnection → Dialect = 3.1.1, Encrypted = True.
            • Server reachability proof:
              • You successfully mapped the share: New‑PSDrive X: \hwgsfslogix.file.core.windows.net\FSLOGIXSMBTEST -Persist

Bottom line: Networking, DNS, storage firewall, identity (Entra Kerberos), and data‑plane RBAC are now all correct and working.


3) What still isn’t working

  • FSLogix itself is not attaching the profile container at logon. Evidence:
    • fsutil reparsepoint query C:\Users<user> → Error 4390 (not a reparse point).
      • No FSLogix Profile logs in C:\ProgramData\FSLogix\Logs\Profile.
        • frxstatus.exe not found in C:\Program Files\FSLogix\Apps.

This means the FSLogix agent installation is missing/incomplete on the AVD host. The storage side is fine; the profile engine simply isn’t running/installed, so nothing is attempting to attach or write logs.

Here’s a concise, end‑to‑end summary of your troubleshooting so far and where things stand now.


1) What you started with

  • Azure Files storage account hwgsfslogix for FSLogix profile containers.
  • Initially, Default share‑level permissions were disabled and you couldn’t access the share; FSLogix could not attach, no logs were produced, and user profiles stayed local (non‑persistent).

2) Issues uncovered and fixed along the way

  • Storage networking / firewall: A 403 in the Files blade pointed to the storage account network restrictions. You changed Public network access → Enabled (from all networks) and confirmed reachability on port 445.
  • Name/DNS/endpoint clarity: We verified DNS now resolves hwgsfslogix.file.core.windows.net to a public Azure Files IP and that port 445 is open from the host.
  • Share existence & path: After some name checks, you settled on the share FSLOGIXSMBTEST and confirmed it is reachable.
  • Identity & auth (Entra‑only):
    • You enabled Microsoft Entra Kerberos for Azure Files (identity‑based access).
      • You assigned the correct Azure RBAC data‑plane roles (e.g., Storage File Data SMB Share Contributor/Elevated) to the users/groups.
        • Result: mapping the share now works without storage account keys and without credential prompts.
        • Transport/security posture:
          • With Secure transfer required ON, your client negotiates SMB 3.1.1 + encryption to Azure Files.
            • You verified this with Get‑SmbConnection → Dialect = 3.1.1, Encrypted = True.
            • Server reachability proof:
              • You successfully mapped the share:
                New‑PSDrive X: \hwgsfslogix.file.core.windows.net\FSLOGIXSMBTEST -Persist

Bottom line: Networking, DNS, storage firewall, identity (Entra Kerberos), and data‑plane RBAC are now all correct and working.


3) What still isn’t working

  • FSLogix itself is not attaching the profile container at logon.
    Evidence:
    • fsutil reparsepoint query C:\Users<user> → Error 4390 (not a reparse point).
      • No FSLogix Profile logs in C:\ProgramData\FSLogix\Logs\Profile.
        • frxstatus.exe not found in C:\Program Files\FSLogix\Apps.

This means the FSLogix agent installation is missing/incomplete on the AVD host. The storage side is fine; the profile engine simply isn’t running/installed, so nothing is attempting to attach or write logs.

However: The FSLogix install is standard in my Azure Virtual Desktop deployment, and given the disk is currently ephemeral, installing/reinstalling it will do nothing.

Azure Virtual Desktop
Azure Virtual Desktop

A Microsoft desktop and app virtualization service that runs on Azure. Previously known as Windows Virtual Desktop.

{count} votes

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-02-23T05:55:15.6866667+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    To successfully create FSLogix profiles in your Azure Virtual Desktop setup with Azure Files, follow these steps based on your current troubleshooting status:

    1. Verify FSLogix Installation: Since you mentioned that the FSLogix agent installation is missing or incomplete, ensure that FSLogix is properly installed on your Azure Virtual Desktop (AVD) host. You can do this by checking if the FSLogix installation files exist in C:\Program Files\FSLogix\Apps\. If they are missing, you will need to install or reinstall FSLogix on the AVD host.
    2. Check Registry Settings: Ensure that the necessary registry settings for FSLogix profile containers are correctly configured. You should have the following settings in HKEY_LOCAL_MACHINE\SOFTWARE\FSLogix\Profiles:
      • Enabled (DWORD) set to 1
      • VHDLocations (MULTI_SZ or REG_SZ) pointing to your Azure Files share (e.g., \\hwgsfslogix.file.core.windows.net\FSLOGIXSMBTEST)
      • DeleteLocalProfileWhenVHDShouldApply (DWORD) set to 1 (recommended)
    3. Test User Sign-In: After confirming the installation and registry settings, test the user sign-in process. When a user logs in, they should see the message "Please wait for the FSLogix Apps Services". If this message does not appear, it indicates that the FSLogix service is not starting correctly.
    4. Check Logs: If the profiles are still not being created, check the logs in C:\ProgramData\FSLogix\Logs\Profile\ for any errors that may provide insight into what is failing during the profile attachment process.
    5. Network and Permissions: Since you've already verified network access and permissions, ensure that the user accounts have the correct Azure RBAC roles assigned to access the Azure Files share. The roles should include Storage File Data SMB Share Contributor or Elevated.
    6. Secure Transfer: Make sure that the secure transfer is enabled for your Azure Files storage account, as this is necessary for the FSLogix service to communicate securely with Azure Files.

    By ensuring that FSLogix is installed correctly, the registry settings are configured, and the user sign-in process is functioning as expected, you should be able to successfully create FSLogix profiles in your Azure Virtual Desktop environment.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.