Quantcast
Channel: Azure Active Directory forum
Viewing all 16000 articles
Browse latest View live

Azure Active Directory Connect: Service ADSync was not found on computer '.'

$
0
0

I have an issue where after installing SQL Server 2016 Express on the same Server 2012 R2 machine that is used for AAD Connect.


The AAD service stopped syncing and I received emails from Office 365 telling me my Active Directory had not synced over the weekend.


This morning I investigate and find that the ADSync service was not running and would not start. After attempting to start it a couple of times I checked Event Viewer and found nothing. This service would not start and would not give me any clue as to what the issue was.


At was at this point I downloaded the latest version of AAD Connect from Microsoft and attempted to upgrade, this runs a short install process and then attempts to open AAD Connect to complete the upgrade. At which point I receive an error message complaining that the ADSync Service is not running.


So at this point I head over to Control panel. Uninstall the AAD Connect software and Reboot.


It appears the installer did not uninstall everything and I'm now in a state where I can't move backwards or forwards. The ADSync service has been removed. However upon trying to reinstall AADConnect It believes that the Azure AD Sync Engine is still installed and attempts to upgrade it, this then fails complaining that the service doesn't Exist.


Below is the output of the trace.log


[15:13:38.653] [  1] [INFO ] 
[15:13:39.110] [  1] [INFO ] ================================================================================
[15:13:39.110] [  1] [INFO ] Application starting
[15:13:39.110] [  1] [INFO ] ================================================================================
[15:13:39.110] [  1] [INFO ] Start Time (Local): Mon, 20 Feb 2017 15:13:39 GMT
[15:13:39.110] [  1] [INFO ] Start Time (UTC): Mon, 20 Feb 2017 15:13:39 GMT
[15:13:39.112] [  1] [INFO ] Application Version: 1.1.380.0
[15:13:39.112] [  1] [INFO ] Application Build Date: 2016-12-28 22:06:30Z
[15:13:39.112] [  1] [INFO ] Application Build Identifier: AD-IAM-HybridSync master (9504b04)
[15:13:39.757] [  1] [INFO ] machine.config path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config\machine.config.
[15:13:39.758] [  1] [INFO ] Default Proxy [ProxyAddress]: <Unspecified>
[15:13:39.758] [  1] [INFO ] Default Proxy [UseSystemDefault]: Unspecified
[15:13:39.758] [  1] [INFO ] Default Proxy [BypassOnLocal]: Unspecified
[15:13:39.759] [  1] [INFO ] Default Proxy [Enabled]: True
[15:13:39.759] [  1] [INFO ] Default Proxy [AutoDetect]: Unspecified
[15:13:39.823] [  1] [INFO ] AADConnect changes ALLOWED: Successfully acquired the configuration change mutex.
[15:13:39.885] [  1] [INFO ] RootPageViewModel.GetInitialPages: Beginning detection for creating initial pages.
[15:13:39.902] [  1] [INFO ] Checking if machine version is 6.1.7601 or higher
[15:13:39.926] [  1] [INFO ] The current operating system version is 6.3.9600, the requirement is 6.1.7601.
[15:13:39.926] [  1] [INFO ] Password Sync supported: 'True'
[15:13:39.947] [  1] [INFO ] DetectInstalledComponents stage: The installed OS SKU is 7
[15:13:40.100] [  1] [INFO ] ServiceControllerProvider: GetServiceStartMode(seclogon) is 'Manual'.
[15:13:40.115] [  1] [INFO ] DetectInstalledComponents stage: Checking install context.
[15:13:40.122] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft Online Services Sign-In Assistant for IT Professionals
[15:13:40.127] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.135] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {03c97135-0e31-4334-9215-63827d4f07d4}: no registered products found.
[15:13:40.138] [  1] [INFO ] Determining installation action for Microsoft Online Services Sign-In Assistant for IT Professionals (03c97135-0e31-4334-9215-63827d4f07d4)
[15:13:40.138] [  1] [INFO ] Product Microsoft Online Services Sign-In Assistant for IT Professionals is not installed.
[15:13:40.139] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft Azure Active Directory Module for Windows PowerShell
[15:13:40.139] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.140] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {bbf5d0bf-d8ae-4e66-91ab-b7023c1f288c}: no registered products found.
[15:13:40.142] [  1] [INFO ] Determining installation action for Microsoft Azure Active Directory Module for Windows PowerShell
[15:13:40.290] [  1] [INFO ] CheckInstallationState: Packaged version (1.1.380.0), Installed version (0.0.0).
[15:13:40.291] [  1] [INFO ] CheckInstallationState: AAD PowerShell will be extracted (1.1.380.0 > 0.0.0).
[15:13:40.291] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft Visual C++ 2013 Redistributable Package
[15:13:40.291] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.295] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {20400cf0-de7c-327e-9ae4-f0f38d9085f8}: verified product code {a749d8e6-b613-3be3-8f5f-045c84eba29b}.
[15:13:40.295] [  1] [VERB ] Package=Microsoft Visual C++ 2013 x64 Minimum Runtime - 12.0.21005, Version=12.0.21005, ProductCode=a749d8e6-b613-3be3-8f5f-045c84eba29b, UpgradeCode=20400cf0-de7c-327e-9ae4-f0f38d9085f8
[15:13:40.295] [  1] [INFO ] Determining installation action for Microsoft Visual C++ 2013 Redistributable Package (20400cf0-de7c-327e-9ae4-f0f38d9085f8)
[15:13:40.296] [  1] [INFO ] Product Microsoft Visual C++ 2013 Redistributable Package (version 12.0.21005) is installed.
[15:13:40.296] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft Directory Sync Tool
[15:13:40.297] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.297] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {bef7e7d9-2ac2-44b9-abfc-3335222b92a7}: no registered products found.
[15:13:40.297] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {dc9e604e-37b0-4efc-b429-21721cf49d0d}: no registered products found.
[15:13:40.297] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {545334d7-13cd-4bab-8da1-2775fa8cf7c2}: verified product code {7c4397b7-9008-4c23-8cda-3b3b8faf4312}.
[15:13:40.298] [  1] [VERB ] Package=Microsoft Azure AD Connect synchronization services, Version=1.1.343.0, ProductCode=7c4397b7-9008-4c23-8cda-3b3b8faf4312, UpgradeCode=545334d7-13cd-4bab-8da1-2775fa8cf7c2
[15:13:40.304] [  1] [INFO ] Determining installation action for Microsoft Directory Sync Tool UpgradeCodes {bef7e7d9-2ac2-44b9-abfc-3335222b92a7}, {dc9e604e-37b0-4efc-b429-21721cf49d0d}
[15:13:40.305] [  1] [INFO ] DirectorySyncComponent: Product Microsoft Directory Sync Tool is not installed.
[15:13:40.305] [  1] [INFO ] Performing direct lookup of upgrade codes for: Azure AD Sync Engine
[15:13:40.306] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.306] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {545334d7-13cd-4bab-8da1-2775fa8cf7c2}: verified product code {7c4397b7-9008-4c23-8cda-3b3b8faf4312}.
[15:13:40.307] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {dc9e604e-37b0-4efc-b429-21721cf49d0d}: no registered products found.
[15:13:40.307] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {bef7e7d9-2ac2-44b9-abfc-3335222b92a7}: no registered products found.
[15:13:40.307] [  1] [VERB ] Package=Microsoft Azure AD Connect synchronization services, Version=1.1.343.0, ProductCode=7c4397b7-9008-4c23-8cda-3b3b8faf4312, UpgradeCode=545334d7-13cd-4bab-8da1-2775fa8cf7c2
[15:13:40.311] [  1] [INFO ] Determining installation action for Azure AD Sync Engine (545334d7-13cd-4bab-8da1-2775fa8cf7c2)
[15:13:40.506] [  1] [VERB ] Check product code installed: {4e67cad2-d71b-4f06-a7ae-bb49c566bb93}
[15:13:40.506] [  1] [INFO ] GetProductInfoProperty({4e67cad2-d71b-4f06-a7ae-bb49c566bb93}, VersionString): unknown product
[15:13:40.507] [  1] [INFO ] AzureADSyncEngineComponent: Product Azure AD Sync Engine (version 1.1.343.0) is installed, needs to be upgraded to version 1.1.380.0.
[15:13:40.507] [  1] [INFO ] Performing direct lookup of upgrade codes for: Azure AD Connect Synchronization Agent
[15:13:40.507] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.507] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {3cd653e3-5195-4ff2-9d6c-db3dacc82c25}: no registered products found.
[15:13:40.507] [  1] [INFO ] Determining installation action for Azure AD Connect Synchronization Agent (3cd653e3-5195-4ff2-9d6c-db3dacc82c25)
[15:13:40.507] [  1] [INFO ] Product Azure AD Connect Synchronization Agent is not installed.
[15:13:40.507] [  1] [INFO ] Performing direct lookup of upgrade codes for: Azure AD Connect Health agent for sync
[15:13:40.507] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.507] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {114fb294-8aa6-43db-9e5c-4ede5e32886f}: no registered products found.
[15:13:40.507] [  1] [INFO ] Determining installation action for Azure AD Connect Health agent for sync (114fb294-8aa6-43db-9e5c-4ede5e32886f)
[15:13:40.507] [  1] [INFO ] Product Azure AD Connect Health agent for sync is not installed.
[15:13:40.507] [  1] [INFO ] Performing direct lookup of upgrade codes for: Azure AD Connect agent
[15:13:40.507] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.507] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {a8b03820-e701-44d7-b65e-6ffbb866a861}: no registered products found.
[15:13:40.507] [  1] [INFO ] Determining installation action for Azure AD Connect agent (a8b03820-e701-44d7-b65e-6ffbb866a861)
[15:13:40.507] [  1] [INFO ] Product Azure AD Connect agent is not installed.
[15:13:40.507] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft SQL Server 2012 Command Line Utilities
[15:13:40.507] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.507] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {52446750-c08e-49ef-8c2e-1e0662791e7b}: no registered products found.
[15:13:40.507] [  1] [INFO ] Determining installation action for Microsoft SQL Server 2012 Command Line Utilities (52446750-c08e-49ef-8c2e-1e0662791e7b)
[15:13:40.507] [  1] [INFO ] Product Microsoft SQL Server 2012 Command Line Utilities is not installed.
[15:13:40.507] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft SQL Server 2012 Express LocalDB
[15:13:40.507] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.507] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {c3593f78-0f11-4d8d-8d82-55460308e261}: no registered products found.
[15:13:40.507] [  1] [INFO ] Determining installation action for Microsoft SQL Server 2012 Express LocalDB (c3593f78-0f11-4d8d-8d82-55460308e261)
[15:13:40.507] [  1] [INFO ] Product Microsoft SQL Server 2012 Express LocalDB is not installed.
[15:13:40.507] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft SQL Server 2012 Native Client
[15:13:40.507] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.508] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {1d2d1fa0-e158-4798-98c6-a296f55414f9}: verified product code {1385d3db-8e80-427b-91d2-b7535862b8e4}.
[15:13:40.508] [  1] [VERB ] Package=Microsoft SQL Server 2012 Native Client , Version=11.3.6518.0, ProductCode=1385d3db-8e80-427b-91d2-b7535862b8e4, UpgradeCode=1d2d1fa0-e158-4798-98c6-a296f55414f9
[15:13:40.508] [  1] [INFO ] Determining installation action for Microsoft SQL Server 2012 Native Client (1d2d1fa0-e158-4798-98c6-a296f55414f9)
[15:13:40.508] [  1] [INFO ] Product Microsoft SQL Server 2012 Native Client (version 11.3.6518.0) is installed.
[15:13:40.508] [  1] [INFO ] Performing direct lookup of upgrade codes for: Microsoft Azure AD Connect Azure AD Connector
[15:13:40.508] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.508] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {fb3feca7-5190-43e7-8d4b-5eec88ed9455}: no registered products found.
[15:13:40.508] [  1] [INFO ] Determining installation action for Microsoft Azure AD Connect Azure AD Connector (fb3feca7-5190-43e7-8d4b-5eec88ed9455)
[15:13:40.508] [  1] [INFO ] Product Microsoft Azure AD Connect Azure AD Connector is not installed.
[15:13:40.510] [  1] [INFO ] Determining installation action for Microsoft Azure AD Connection Tool.
[15:13:40.653] [  1] [WARN ] Failed to read DisplayName registry key: An error occurred while executing the 'Get-ItemProperty' command. Cannot find path 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MicrosoftAzureADConnectionTool' because it does not exist.
[15:13:40.653] [  1] [INFO ] Product Microsoft Azure AD Connection Tool is not installed.
[15:13:40.653] [  1] [INFO ] Performing direct lookup of upgrade codes for: Azure Active Directory Connect
[15:13:40.653] [  1] [VERB ] Getting list of installed packages by upgrade code
[15:13:40.654] [  1] [INFO ] GetInstalledPackagesByUpgradeCode {d61eb959-f2d1-4170-be64-4dc367f451ea}: verified product code {0c143e16-4155-4add-beb9-5286574ad8ca}.
[15:13:40.654] [  1] [VERB ] Package=Microsoft Azure AD Connect, Version=1.1.380.0, ProductCode=0c143e16-4155-4add-beb9-5286574ad8ca, UpgradeCode=d61eb959-f2d1-4170-be64-4dc367f451ea
[15:13:40.654] [  1] [INFO ] Determining installation action for Azure Active Directory Connect (d61eb959-f2d1-4170-be64-4dc367f451ea)
[15:13:40.654] [  1] [INFO ] Product Azure Active Directory Connect (version 1.1.380.0) is installed.
[15:13:40.654] [  1] [INFO ] DetectInstalledComponents stage: Sync engine upgrade required.
[15:13:40.836] [  1] [INFO ] CallExportSyncConfig: launching ExportSyncConfig.exe.
[15:13:42.249] [  1] [INFO ] ServiceControllerProvider: verifying ADSync is in state (Running)
[15:13:42.252] [  1] [ERROR] Caught an exception while creating the initial page set on the root page.
Exception Data (Raw): System.InvalidOperationException: Service ADSync was not found on computer '.'. ---> System.ComponentModel.Win32Exception: The specified service does not exist as an installed service
   --- End of inner exception stack trace ---
   at System.ServiceProcess.ServiceController.GenerateNames()
   at System.ServiceProcess.ServiceController.get_ServiceName()
   at System.ServiceProcess.ServiceController.GenerateStatus()
   at System.ServiceProcess.ServiceController.get_Status()
   at Microsoft.Online.Deployment.Framework.Providers.ServiceControllerProvider.IsServiceInState(String serviceName, ServiceControllerStatus desiredStatus)
   at Microsoft.Online.Deployment.OneADWizard.Runtime.Stages.DetectInstalledComponents.Execute(String& message, GlobalContext existingContext, Boolean& isPasswordSyncSupported)
   at Microsoft.Online.Deployment.OneADWizard.UI.WizardPages.RootPageViewModel.GetInitialPagesCore()
   at Microsoft.Online.Deployment.OneADWizard.UI.WizardPages.RootPageViewModel.GetInitialPages()
[15:13:46.818] [  1] [INFO ] Opened log file at path C:\Users\admin\AppData\Local\AADConnect\trace-20170220-151338.log


AAD Connect and Groups

$
0
0

Hello,

How can we break the sync for groups between AD and AAD? We want to manage them separately.

Thanks!

AD Connect Group WriteBack to Exchange 2010 OnPrem

$
0
0

Hello, we got group writeback working however when I run the update-recipient "<group>" i get an error due to a couple of attribute values that Exchange 2010 doesn't understand.

msExchRecipientDisplayType 17
msExchRecipientTypeDetails 8796093022208

The property value you specified, "17", isn't defined in the Enum type "Nullable`1".
    + CategoryInfo          : NotSpecified: (AD.CORP.LOCAL/G...ff-b273de87f6f6:ADObjectId) [Update-Recipient], DataValidationException
    + FullyQualifiedErrorId : 5D595360,Microsoft.Exchange.Management.RecipientTasks.UpdateRecipient

The property value you specified, "8796093022208", isn't defined in the Enum type "RecipientTypeDetails".
    + CategoryInfo          : NotSpecified: (AD.CORP.LOCAL/G...ff-b273de87f6f6:ADObjectId) [Update-Recipient], DataValidationException
    + FullyQualifiedErrorId : 10FAD6F9,Microsoft.Exchange.Management.RecipientTasks.UpdateRecipient

If I manually blank out these value and run the cmdlet again, it works without error. The O365 group object is displayed as a group in the Exchange 2010 GAL. However, during the next dir sync, these values are put back and the object no longer "displays" as a group object in the GAL. The object entry is there in the GAL but there is no group icon nor is the name in bold (like other group objects). You can open the object and see the members and still use it for routing.

I read that you can prepare the schema for Exchange 2013 but I really don't want to go down that road. Is there a way to prevent those 2 attribute values from being sync'd back to OnPrem? I could probably write a powershell script that runs shortly after the dir sync to remove those values but preventing those attribute from writing back to on prem would be ideal.

Azure AD B2C - Can my ASP app have two separate Azure signin/signup?

$
0
0

Hi;

I'm building an ASP.Net Core app. It's users are into two separate groups (Vendors & Consumers).

The consumers can login third party providers with minimum user data.

The Vendors however, require an email/password signup with a series of data.

My questions are:

a) Can an app two Azure Login/signup forms with different policies like in my case?

b) If yes, where can I learn how to do it? I checked the docs but nothing?

Thank you in advance!

..Ben


..Ben

Invalind Grant error code AADSTS65001

$
0
0

Hello,

I have developed an application and for single sign on which works fine for my demo account in bot multi-tenant and single-tenant modes. On the other hand when my customers tries to login with his account I get an "{"error":"invalid_grant","error_description":"AADSTS65001: The user or administrator has not consented to use the application with ID \'f706fdc4-62ba-48dc-9d62-04280138344d\'. Send an interactive authorization request for this use
r and resource.\\r\\nTrace ID: 7cfc3b17-1b3a-4dac-88e0-8234d2bf466e\\r\\nCorrelation ID: 53130bbc-6837-4b3d-8bf7-2d960707f8d8\\r\\nTimestamp: 2016-04-18 08:32:15Z","error_codes":[65001],"timestamp":"2016-04-18 08:32:15Z","trace_id"
:"7cfc3b17-1b3a-4dac-88e0-8234d2bf466e","correlation_id":"53130bbc-6837-4b3d-8bf7-2d960707f8d8"}". The most weird thing is that in the multitenant configuration, he is prompt to accept the permission granting to my application but again the consent is not given even if he explicitly accepts the permissions.

Kind Regards,
Nikos

AADC user/contact matching issues

$
0
0

Hello,

We have gone from an on-prem Exchange to EOL but we still have on-prem Exchange for management of user objects but everything mail related is done in EOL

Now we're having issues that for some reason our "Azure AD Connect" has matched a user object (which isn't even enabled for Exchange) and a contact object and decided they are one and the same. Which means the contact isn't working in O365!

So, how do I break the matching? I've removed the "mail" attribute from the user object as well as all smtp/proxyaddress and made sure there is nothing in common between the two and done a full import/sync in AADC yet the matching is still there and then it writes back some X500 addresses back as proxyaddresses!

Is there any way to manually break the matching? Because they really have nothing in common!!

Azure AD Authentication Library - AcquireTokenAsync() got SSL/TLS Error - remote certificate is invalid according to the validation procedure

$
0
0

Recently we have run into some problem with our Web App integration with Azure AD B2C using Graph API.

We believe the problem has something to do with the SSL/TLS certificate on one or more of Azure AD Graph API endpoint (on https://login.microsoftonline.com)

The problem seems to start in early July (seems like to align with the SSL3 obsolete timeline of June 30, 2018).

Before hand, our code works fine with integration with Azure AD B2C over Graph API using the Azure Active Directory Authentication Library (ADAL) .net.

Now, it seems like there are some random issue with the ADAL authentication context’s AcquireTokenAsync() call to throw the following exception:

2018-07-24T13:08:44  PID[6124] Information RemoteCertificateValidationCallback(F3B414056D8FB86D98FB6F282D8F451F0A87BA40, None)
2018-07-24T13:08:44  PID[6124] Error       AzureADRequest Error: System.AggregateException: One or more errors occurred. ---> System.AggregateException: One or more errors occurred. ---> System.Net.Http.HttpRequestException: An error occurred while sending the request. ---> System.Net.WebException: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. ---> System.Security.Authentication.AuthenticationException: The remote certificate is invalid according to the validation procedure.
   at System.Net.TlsStream.EndWrite(IAsyncResult asyncResult)
   at System.Net.PooledStream.EndWrite(IAsyncResult asyncResult)
   at System.Net.ConnectStream.WriteHeadersCallback(IAsyncResult ar)
   --- End of inner exception stack trace ---
   at System.Net.HttpWebRequest.EndGetRequestStream(IAsyncResult asyncResult, TransportContext& context)
   at System.Net.Http.HttpClientHandler.GetRequestStreamCallback(IAsyncResult ar)
   --- End of inner exception stack trace ---
   at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task)
   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)
   at System.Runtime.CompilerServices.TaskAwaiter.ValidateEnd(Task task)
   at Microsoft.IdentityModel.Clients.ActiveDirectory.Internal.Http.HttpClientWrapper.<GetResponseAsync>d__31.MoveNext()

The issue doesn’t happen all the time. It can be working fine for a while then it doesn’t work for maybe 15-30 min, then after restarting the web app there’s a chance that it’s back to normal for a while.

It seems like the one (or more) authentication servers on login.microsoftonline.com has a bad SSL/TLS certificate.

According to diagnostics trace, It seems like the failing certificate have the thumbprint of F3B414056D8FB86D98FB6F282D8F451F0A87BA40.

When the integration is working, we got the following log
2018-07-20T18:05:02  PID[6124] Information RemoteCertificateValidationCallback(D4444B60F628539C586F1AACE0AAA71F7AD8F726, None)

So it seems like that the Azure site can trust one certificate (D4444B60F628539C586F1AACE0AAA71F7AD8F726) from Azure AD but not the other (F3B414056D8FB86D98FB6F282D8F451F0A87BA40).

Furthermore, when we try to connect using our local dev environment, using either a console app test or unit test, we can get the token properly all the time. So we are not sure whether this is related to either Azure App Service or specific Data Center/Location, etc.

We also tried to override the ServerCertificateValidationCallback by attaching to ServicePointManager.ServerCertificateValidationCallback, but it's never being called. (seems like the ADAL library is doing its own thing.)

Any help would be appreciated!


Azure AD Connect (Express install) migration to another server

$
0
0

Hello Community,

I'm planning to move our current AADC application to another server. I haven't found any questions regarding to moving an Express installation to a new server. The reason it's important for me, because in Express installation mode, a user was created (MSOL_XYZ...) with Windows managed password (so I don't know its password), and previously we had a Custom installation which caused sync errors in the environment. But, the new environment has to be started in Staging mode which is only seems possible when using Custom installaton.

So my question is: Is it (if yes, how?) possible to migrate an Express installation to a server where I use Custom installation in Staging mode?

Thanks,

Csaba


Retrieving the all the users information from Azure Subscription

$
0
0

I want to retrieve all the user information from Subscription. We can get all the user list from an Azure subscription using below article.

https://docs.microsoft.com/en-us/rest/api/authorization/roleassignments/list

But above URl retrieves list of all User GUIDs(and some more information) but here i want user display name, mailid, etc.

Please help me How can i do this.

We can send this user GUIDs to graph API to retrieve the User information but it needs consent from Tenant admin and also we need two more extra calls(one is to get Graph bearer access token and other is call to actual graph api with above list of User GUIDs). So how can i do this with out graph API.

Domain Joined device is not synced to Azure after enabling device writeback

$
0
0

Hi!

I've just enabled device writeback feature on Azure AD Connect, but devices which joining to On-Premise domain are now not replicated to Azure AD.

I checked Sync Service Manager and it only shows "Projections: 1" and "Connectors with Flow Updates: 1" with a new device. No "Adds" or whatsoever. Containers are checked and it worked before...

Does anyone know what could go wrong?

Office 365 Management Tool

$
0
0

Hello,

Could advice me the best o365 management Tool to use . i'am not using MSLO  powershell commands .

Regards

Cannot delete user's proxy address

$
0
0

I am attempting to remove a proxy address from a single Office 365 user with PowerShell, but cannot find the correct PS syntax to do so. I must remove the proxy address from this user in order to remove the corresponding domain from O365.

When I run the following command:

Get-Msoluser -userprincipalname user@domain.com | select -expandproperty proxyaddresses

I get back the listing of the user's proxy (SMTP) addresses. This user has two proxy addresses with one correct and one incorrect. 

One important fact is that there is NO domain sync (aka AD CONNECT) with an on-premise domain - it is all in Azure AD. Also, this user does not have an Exchange Online account, so there is no mailbox associated with him.

What is the command to remove the INCORRECT proxy address?

Thank you for your assistance!

<style type="text/css">p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica; color: #f7f7f7} span.s1 {font: 12.0px Helvetica; color: #000000} </style>


Active Directory user groups not syncing

$
0
0
I am using Azure Active Directory Connect to sync to Office 365. I am syncing users and groups however I am having a problem with syncing user groups. Basically I am adding new users to a local security group those new users are never reflected in Office 365. To be clear my local user group has 100 users the one in office 365 will show 50 users its like the changes never sync to office 365. Also I created a brand new user group as a test case that user group never synced to Office 365. So my question is how do I properly troubleshoot this?

Not able to access Azure Active Directory: Access denied

$
0
0
I have created a new account on portal.azure.com. When going to Azure Active Directory tab in account I am getting this error- Access denied You do not have access Looks like you don't have access to this content. To get access, please contact the owner.

Groups have no members

$
0
0
None of my groups on my Azure AD console have members.  I have recently had to reinstall Azure AD Connect so maybe I'm missing something.

Error upgrading Azure AD Connector

$
0
0

Hi all, 

I get an error when upgrading the latest AAD Connector, "Input string was not in a correct format".

The error occours after the AAD Connector connects to Azure AD and when the upgrade process are updating the on-premise rules.

The logfile indicate that logins to the webservices "AADSTS*****" are failing, but the password for sync account have been reset before upgrade process were started and the sync  account can login without problems.

I need to get this working again, anyone?


Unable to Join to Azure domain

$
0
0

I have a VM in Azure running Server 2016 with Active Directory Domain Controler. (Not Azure AD! But AD role setup on a VM!) and for this I use our public domain intra.test.online (I didn't share actual domain name!) . For some reason I'm no longer able to join any machine to this domain and it worked before? I get the prompt asking me for user name and password and then I get the error "The Network Path was not found". I did try disabling FW on both sides, and adding Azure VM's public IP as preferred DNS in local VM but still get the error!

Thanks!


Alen Mikic

Need help to configure own domain name in AAD

$
0
0

Hello all.

I'm trying AAD and want to add my domain name. I wrote my domain and added DNS records. But Azure cant't verify my domain name.

I added domain name and Azure cant't find it

I replaced origin domain resistrator service to Azure DNS Zone and added records.

I check DNS records with Dig and found needed records.

But I have error on verification domain name in AAD. 

Level of Subscription - Free trial.


Fully block the Azure Login Page (https://portal.azure.com) to all users

$
0
0

Hello all,

(I know this has been discussed before and would like to check if there is any updates)

Is there a way to fully block the access to the Azure portal at https://portal.microsoft.com to all the users' accounts in the Office 365 subscriptions?

Currently what we can do is only to block access to the Azure Active Directory Management page with the Azure portal.

Though the other remaining resources within the Azure page are not accessible by the users or even require them to run free trial etc, I think the idea to access the Azure portal with the users accounts are not quite right.


I was advised by the Support that

Azure is part of every Office 365 subscription --  it is the place where we store your users, licenses and information. Azure Premium version gives more options to work with it. 

Do we need Azure Premium edition to disable the login access to Azure Portal

Thank you in advance.

Daryl

Azure AD Connect Health Agent Error - Azure Germany

$
0
0

I have uninstalled an Azure AD Connect (removed all features like SQL Express etc.) and reinstalled it on the same server to change the Office365 tenant. The old tenant was in "normal" Azure and the new is in Azure Germany. Sync-config is with password hash sync. It does it's job like it should and syncs the User as expected, but the Azure AD Connect Health agent cannot register. (Error at the end of the wizard)

I ran Register-AzureADConnectHealthSyncAgent -attributefilter $false -stagingmode $false with no success. 

Register-AzureADConnectHealthSyncAgent : Failed configuring Monitoring Service [...]

Are there any known issues with this health-service in Azure Germany? Am I missing something? Thanks in advance for anyone trying to help!

First error in the corresponding logfile:

2018-02-07 14:23:14.542 Monitoring Agent Registration Attempt end, ExitCode = 1, Result = Fail
2018-02-07 14:23:14.542 Attempt Failed. Exception: System.InvalidOperationException: Failed configuring Monitoring Service using command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
   at Microsoft.Identity.Health.Common.Clients.PowerShell.ConfigurationModule.RegisterADHealthAgent.<>c__DisplayClass76_0.<StoreMonitoringServiceCertificateAndConfig>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.<>c__DisplayClass1.<ExecuteAction>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.ExecuteAction[TResult](Func`1 func)

I started the two health agent services manually and tried to register... no luck again.

I rebooted the Server and tried to register... still no change.

Here the complete Errorlog:

Getting "ServiceType" from ServiceRuntime: FAIL.
Getting "ServiceType" from ConfigurationManager: FAIL.
2018-02-07 14:22:37.783 ProductName: Microsoft Azure AD Connect Health agent for sync, FileVersion: 3.0.129.0, Current UTC Time: 2018-02-07 14:22:37Z
2018-02-07 14:22:37.799 enableRegiration: True
2018-02-07 14:22:37.815 AHealthServiceUri (ARM): https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/
2018-02-07 14:22:37.815 AdHybridHealthServiceUri: https://frontend.aadconnecthealth.microsoftazure.de/
2018-02-07 14:22:37.815 AHealthServiceUri (ARM): https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/
2018-02-07 14:22:37.815 AdHybridHealthServiceUri: https://frontend.aadconnecthealth.microsoftazure.de/
2018-02-07 14:22:37.83 User Context outbound connections to https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/ will use proxy address https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/ (if equal, no proxy is used)
2018-02-07 14:22:37.877 Service Context: Outbound connections to https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/ will use proxy address https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/ (if equal, no proxy is used)
2018-02-07 14:22:37.877 UploadLogFileFromDisk: arguments LogFileLocation=C:\Users\admin_mc\AppData\Local\Temp\AdHealthAadSyncAgentConfiguration.2018-02-07_15-22-37.log;ProductName=Microsoft Azure AD Connect Health agent for sync;ProductVersion=3.0.129.0;MachineName=S4BEON01;ServiceUri=https://frontend.aadconnecthealth.microsoftazure.de/;Result=started;type=registration,activityId=11549c77-e911-4562-85c0-285f969501f3
2018-02-07 14:22:37.877 UploadLogFileFromDisk: TenantId: 8be41fa8-7356-4412-aa22-4ed3cc38b18a
2018-02-07 14:22:37.877 UploadLogFileFromDisk: MachineId: 0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
2018-02-07 14:22:37.877 UploadLogFileFromDisk: reading file contents of C:\Users\admin_mc\AppData\Local\Temp\AdHealthAadSyncAgentConfiguration.2018-02-07_15-22-37.log
2018-02-07 14:22:37.893 UploadLogFileFromDisk: log length: 2104
2018-02-07 14:22:37.893 UploadFile: start, url: https://frontend.aadconnecthealth.microsoftazure.de/providers/Microsoft.ADHybridHealthService/diagnostics/logs/installer/product/Microsoft-Azure-AD-Connect-Health-agent-for-sync/version/3.0.129.0/machine/S4BEON01?result=started&type=registration&tenantId=8be41fa8-7356-4412-aa22-4ed3cc38b18a&machineId=0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
powershell.exe Information: 0 : AdHealthWebproxy settings: HttpsProxyAddress: No Proxy, initialization status: Succeeded; Registry value did not exist; Value was not a string, No Initialization Exception
2018-02-07 14:22:38.19 UploadFile: upload successful
2018-02-07 14:22:38.19 UploadLogFileFromDisk: response: Http response code: OK"log successfully uploaded"
2018-02-07 14:22:38.19 AHealthServiceApiVersion: 2014-01-01
2018-02-07 14:22:38.19 --> https://management.core.cloudapi.de/
powershell.exe Information: 0 : 02/07/2018 14:22:38:  - AuthenticationContext: ADAL .NET with assembly version '2.28.1.741', file version '2.28.30726.1426' and informational version '98c53b8a9386f556c4187786cece386358b1c8e7' is running...
powershell.exe Information: 0 : 02/07/2018 14:22:38: 869307c7-656d-4881-b266-c22a30d85a92 - AcquireTokenHandlerBase: === Token Acquisition started:
	Authority: https://login.microsoftonline.de/common/
	Resource: https://management.core.cloudapi.de/
	ClientId: cf6d7e68-f018-4e0a-a7b3-126e053fb88d
	CacheType: Microsoft.IdentityModel.Clients.ActiveDirectory.TokenCache (0 items)
	Authentication Target: User
powershell.exe Information: 0 : 02/07/2018 14:22:56: 869307c7-656d-4881-b266-c22a30d85a92 - AcquireTokenHandlerBase: === Token Acquisition finished successfully. An access token was retuned:
	Access Token Hash: 4rvp9WFeFr045qX3vTS7TX1vRqXUKnYcJwyHgBi8HB0=
	Refresh Token Hash: O8iC33VzTP7ULGB2jS/TQQNesQHTtgES2Hf8C0EW8co=
	Expiration Time: 02/07/2018 15:22:55 +00:00
	User Hash: p4aI82V/sCEhE03LDrpk+xYYmzZEGjb3140sFhwDEFE=
2018-02-07 14:22:56.178 Detecting AadSyncService roles...
2018-02-07 14:22:56.6 Detected the following role(s) for eschenbachoptik.onmicrosoft.de:
2018-02-07 14:22:56.6 	Microsoft Azure Active Directory Sync Services
2018-02-07 14:22:56.6 ServiceTypeName: AadSyncService , ServiceSignature: eschenbachoptik.onmicrosoft.de , ServiceDisplayName : eschenbachoptik.onmicrosoft.de 
2018-02-07 14:22:56.6 api Uri: https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/services?serviceType=AadSyncService&api-version=2014-01-01
2018-02-07 14:22:56.678 Registered Service AadSyncService-eschenbachoptik.onmicrosoft.de successfully
2018-02-07 14:22:56.678 ServiceName: AadSyncService-eschenbachoptik.onmicrosoft.de
2018-02-07 14:22:56.678 ServiceId: a7c27be0-6b12-4cdd-96cf-fd89c14f3224
2018-02-07 14:22:56.725 --> https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/services/AadSyncService-eschenbachoptik.onmicrosoft.de/servicemembers?api-version=2014-01-01 ...
2018-02-07 14:22:56.866 Registered ServiceMember successfully
2018-02-07 14:22:56.866 serviceMemberId: 08480508-2318-43a5-8b72-87405d04e00e
2018-02-07 14:22:56.866 serviceMemberRole: AadSync_AadConnectSync_1.0
2018-02-07 14:22:56.866 machineName: S4BEON01
2018-02-07 14:22:56.866 machineId: 0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
2018-02-07 14:22:56.866 osName: (null)
2018-02-07 14:22:56.866 osVersion: (null)
2018-02-07 14:22:56.866 Fetching and storing agent credentials...
2018-02-07 14:22:56.866 --> https://management.microsoftazure.de/providers/Microsoft.ADHybridHealthService/services/AadSyncService-eschenbachoptik.onmicrosoft.de/servicemembers/08480508-2318-43a5-8b72-87405d04e00e/credentials?api-version=2014-01-01
2018-02-07 14:22:56.928 Aquiring Monitoring Service certificate using tenant.cert
2018-02-07 14:22:56.928 Reading value from registry: path=SOFTWARE\Microsoft\ADHealthAgent\Sync; valueName=AadConnectVersion
2018-02-07 14:22:56.928 AadConnectVersion=1.1.654.0
2018-02-07 14:22:56.928 Configuring AadConnect version: 1.1.654.0
2018-02-07 14:22:56.928 Monitoring Agent Registration Attempt start
2018-02-07 14:22:56.928 Tenant Certificate successfully written to location: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert, byte[] length = 3509 bytes, written file length = 3509 bytes 
2018-02-07 14:22:56.928 Start Command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
2018-02-07 14:23:05.884 Monitoring Agent Registration Attempt process exited, ExitCode = 1
2018-02-07 14:23:05.884 Monitoring Agent Registration Attempt end, ExitCode = 1, Result = Fail
2018-02-07 14:23:05.899 Attempt Failed. Exception: System.InvalidOperationException: Failed configuring Monitoring Service using command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
   at Microsoft.Identity.Health.Common.Clients.PowerShell.ConfigurationModule.RegisterADHealthAgent.<>c__DisplayClass76_0.<StoreMonitoringServiceCertificateAndConfig>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.<>c__DisplayClass1.<ExecuteAction>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.ExecuteAction[TResult](Func`1 func)
2018-02-07 14:23:05.899 Monitoring Agent Registration Attempt start
2018-02-07 14:23:05.899 Tenant Certificate successfully written to location: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert, byte[] length = 3509 bytes, written file length = 3509 bytes 
2018-02-07 14:23:05.899 Start Command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
2018-02-07 14:23:14.542 Monitoring Agent Registration Attempt process exited, ExitCode = 1
2018-02-07 14:23:14.542 Monitoring Agent Registration Attempt end, ExitCode = 1, Result = Fail
2018-02-07 14:23:14.542 Attempt Failed. Exception: System.InvalidOperationException: Failed configuring Monitoring Service using command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
   at Microsoft.Identity.Health.Common.Clients.PowerShell.ConfigurationModule.RegisterADHealthAgent.<>c__DisplayClass76_0.<StoreMonitoringServiceCertificateAndConfig>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.<>c__DisplayClass1.<ExecuteAction>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.ExecuteAction[TResult](Func`1 func)
2018-02-07 14:23:16.558 Monitoring Agent Registration Attempt start
2018-02-07 14:23:16.558 Tenant Certificate successfully written to location: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert, byte[] length = 3509 bytes, written file length = 3509 bytes 
2018-02-07 14:23:16.558 Start Command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
2018-02-07 14:23:25.279 Monitoring Agent Registration Attempt process exited, ExitCode = 1
2018-02-07 14:23:25.279 Monitoring Agent Registration Attempt end, ExitCode = 1, Result = Fail
2018-02-07 14:23:25.279 Attempt Failed. Exception: System.InvalidOperationException: Failed configuring Monitoring Service using command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
   at Microsoft.Identity.Health.Common.Clients.PowerShell.ConfigurationModule.RegisterADHealthAgent.<>c__DisplayClass76_0.<StoreMonitoringServiceCertificateAndConfig>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.<>c__DisplayClass1.<ExecuteAction>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.ExecuteAction[TResult](Func`1 func)

#####################################################
# BEGIN TRACE: eb7c6741-0c3b-4e86-9658-6d3161300941 #
#####################################################

EtwTraceWatcher.StartTracing processEventsThread started, Timestamp = 02/07/2018 15:22:56
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:22:58
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:22:58
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:22:59
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:22:59
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:01
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:01
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:05
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:05
Agent.Main;Client activation failed:The remote server returned an error: (403) Forbidden. 
System.Net.WebException: The remote server returned an error: (403) Forbidden.
   at System.Net.HttpWebRequest.GetResponse()
   at Microsoft.Online.Reporting.MonitoringAgent.PolicyAndKeyHelper.Deserialize[T](WebRequest webRequest)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.<>c__DisplayClass5.<RegisterClient>b__2()
   at Microsoft.Online.Reporting.MonitoringAgent.ExceptionUtility.RetryWithExceptions(Action action, Int32 maxRetries, Func`2 handledException)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.RegisterClient(String configurationFile, String companyName, Boolean force)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.NewClientRegistration(String installPath, String configurationFile, String version, String launcherServiceName)
   at Microsoft.Online.Reporting.MonitoringAgent.Startup.Program.Main(String[] args), Timestamp = 02/07/2018 15:23:05
Agent.InitializeTelemetry;ApplicationInsights connection string could not be loaded, hence telemetry will be disabled for agent., Timestamp = 02/07/2018 15:23:05
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:06
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:06
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:07
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:07
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:10
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:10
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:14
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:14
Agent.Main;Client activation failed:The remote server returned an error: (403) Forbidden. 
System.Net.WebException: The remote server returned an error: (403) Forbidden.
   at System.Net.HttpWebRequest.GetResponse()
   at Microsoft.Online.Reporting.MonitoringAgent.PolicyAndKeyHelper.Deserialize[T](WebRequest webRequest)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.<>c__DisplayClass5.<RegisterClient>b__2()
   at Microsoft.Online.Reporting.MonitoringAgent.ExceptionUtility.RetryWithExceptions(Action action, Int32 maxRetries, Func`2 handledException)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.RegisterClient(String configurationFile, String companyName, Boolean force)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.NewClientRegistration(String installPath, String configurationFile, String version, String launcherServiceName)
   at Microsoft.Online.Reporting.MonitoringAgent.Startup.Program.Main(String[] args), Timestamp = 02/07/2018 15:23:14
Agent.InitializeTelemetry;ApplicationInsights connection string could not be loaded, hence telemetry will be disabled for agent., Timestamp = 02/07/2018 15:23:14
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:17
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:17
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:18
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:18
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:21
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:21
ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive., Timestamp = 02/07/2018 15:23:25
CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0, Timestamp = 02/07/2018 15:23:25
Agent.Main;Client activation failed:The remote server returned an error: (403) Forbidden. 
System.Net.WebException: The remote server returned an error: (403) Forbidden.
   at System.Net.HttpWebRequest.GetResponse()
   at Microsoft.Online.Reporting.MonitoringAgent.PolicyAndKeyHelper.Deserialize[T](WebRequest webRequest)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.<>c__DisplayClass5.<RegisterClient>b__2()
   at Microsoft.Online.Reporting.MonitoringAgent.ExceptionUtility.RetryWithExceptions(Action action, Int32 maxRetries, Func`2 handledException)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.RegisterClient(String configurationFile, String companyName, Boolean force)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.NewClientRegistration(String installPath, String configurationFile, String version, String launcherServiceName)
   at Microsoft.Online.Reporting.MonitoringAgent.Startup.Program.Main(String[] args), Timestamp = 02/07/2018 15:23:25
Agent.InitializeTelemetry;ApplicationInsights connection string could not be loaded, hence telemetry will be disabled for agent., Timestamp = 02/07/2018 15:23:25
EtwTraceWatcher.StopTracing processEventsThread stopped, Timestamp = 02/07/2018 15:23:25

###################################################
# END TRACE: eb7c6741-0c3b-4e86-9658-6d3161300941 #
###################################################


#####################################################
# BEGIN TRACE: A8E0E1F6-D2AB-4E9E-B0A5-31CBC758BF53 #
#####################################################

EtwTraceWatcher.StartTracing processEventsThread started, Timestamp = 02/07/2018 15:22:56
TraceEntry.Start
Timestamp = 02/07/2018 14:22:57
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:22:57
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:22:58
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:22:58
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:00
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:00
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:04
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:04
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:04
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = Agent.Main;Client activation failed:The remote server returned an error: (403) Forbidden. 
System.Net.WebException: The remote server returned an error: (403) Forbidden.
   at System.Net.HttpWebRequest.GetResponse()
   at Microsoft.Online.Reporting.MonitoringAgent.PolicyAndKeyHelper.Deserialize[T](WebRequest webRequest)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.<>c__DisplayClass5.<RegisterClient>b__2()
   at Microsoft.Online.Reporting.MonitoringAgent.ExceptionUtility.RetryWithExceptions(Action action, Int32 maxRetries, Func`2 handledException)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.RegisterClient(String configurationFile, String companyName, Boolean force)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.NewClientRegistration(String installPath, String configurationFile, String version, String launcherServiceName)
   at Microsoft.Online.Reporting.MonitoringAgent.Startup.Program.Main(String[] args)
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:04
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = df61dc34-a6dd-4634-93c6-3b115925820d
CorrelationId = df61dc34-a6dd-4634-93c6-3b115925820d
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = Agent.InitializeTelemetry;ApplicationInsights connection string could not be loaded, hence telemetry will be disabled for agent.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:06
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:06
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:07
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:07
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:09
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:09
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:13
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:13
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:13
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = Agent.Main;Client activation failed:The remote server returned an error: (403) Forbidden. 
System.Net.WebException: The remote server returned an error: (403) Forbidden.
   at System.Net.HttpWebRequest.GetResponse()
   at Microsoft.Online.Reporting.MonitoringAgent.PolicyAndKeyHelper.Deserialize[T](WebRequest webRequest)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.<>c__DisplayClass5.<RegisterClient>b__2()
   at Microsoft.Online.Reporting.MonitoringAgent.ExceptionUtility.RetryWithExceptions(Action action, Int32 maxRetries, Func`2 handledException)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.RegisterClient(String configurationFile, String companyName, Boolean force)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.NewClientRegistration(String installPath, String configurationFile, String version, String launcherServiceName)
   at Microsoft.Online.Reporting.MonitoringAgent.Startup.Program.Main(String[] args)
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:13
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = ddec48ab-2708-4052-93b4-f2679d9c998f
CorrelationId = ddec48ab-2708-4052-93b4-f2679d9c998f
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = Agent.InitializeTelemetry;ApplicationInsights connection string could not be loaded, hence telemetry will be disabled for agent.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:16
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:16
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:17
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:17
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:19
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:20
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:24
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Information
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = ClientRegistrationServiceClient.CreateObjectDelegate;Certificate pinning is Passive.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:24
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = CertificatePinning.Validate;Error validating Subject Public Key Info hash against certificate pinning list: B307680271046337A6705AA1C325B134A0B5455BE028B626F8DD0428B68FDCC0
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:24
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = Agent.Main;Client activation failed:The remote server returned an error: (403) Forbidden. 
System.Net.WebException: The remote server returned an error: (403) Forbidden.
   at System.Net.HttpWebRequest.GetResponse()
   at Microsoft.Online.Reporting.MonitoringAgent.PolicyAndKeyHelper.Deserialize[T](WebRequest webRequest)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.<>c__DisplayClass5.<RegisterClient>b__2()
   at Microsoft.Online.Reporting.MonitoringAgent.ExceptionUtility.RetryWithExceptions(Action action, Int32 maxRetries, Func`2 handledException)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.RegisterClient(String configurationFile, String companyName, Boolean force)
   at Microsoft.Online.Reporting.MonitoringAgent.ClientRegistration.NewClientRegistration(String installPath, String configurationFile, String version, String launcherServiceName)
   at Microsoft.Online.Reporting.MonitoringAgent.Startup.Program.Main(String[] args)
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

TraceEntry.Start
Timestamp = 02/07/2018 14:23:24
TenantId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a
AgentId = 8be41fa8-7356-4412-aa22-4ed3cc38b18a_0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
ActivityId = 3cbf7576-9e82-4abe-92e4-46baccd20888
CorrelationId = 3cbf7576-9e82-4abe-92e4-46baccd20888
TraceType = Error
CallerName = Monitoring Agent
CallerSourceInfo = Monitoring Agent#1
Message = Agent.InitializeTelemetry;ApplicationInsights connection string could not be loaded, hence telemetry will be disabled for agent.
Exception = 
TraceEventType = Agent
AgentType = Monitoring
ServiceType = 
Version = 3.0.129.0
TraceEntry.End

EtwTraceWatcher.StopTracing processEventsThread stopped, Timestamp = 02/07/2018 15:23:25

###################################################
# END TRACE: A8E0E1F6-D2AB-4E9E-B0A5-31CBC758BF53 #
###################################################

2018-02-07 14:23:25.279 System.InvalidOperationException: Failed configuring Monitoring Service using command: C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\Monitor\Microsoft.Identity.Health.AadSync.MonitoringAgent.Startup.exe sourcePath="C:\Program Files\Microsoft Azure AD Connect Health Sync Agent\tenant.cert" version="1.1.654.0"
   at Microsoft.Identity.Health.Common.Clients.PowerShell.ConfigurationModule.RegisterADHealthAgent.<>c__DisplayClass76_0.<StoreMonitoringServiceCertificateAndConfig>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.<>c__DisplayClass1.<ExecuteAction>b__0()
   at Microsoft.Practices.EnterpriseLibrary.TransientFaultHandling.RetryPolicy.ExecuteAction[TResult](Func`1 func)
   at Microsoft.Identity.Health.Common.Clients.PowerShell.ConfigurationModule.RegisterADHealthAgent.FetchAndStoreAgentCredentials(String tenantId, String serviceName, String serviceMemberId, String serviceId)
   at Microsoft.Identity.Health.Common.Clients.PowerShell.ConfigurationModule.RegisterADHealthAgent.ProcessRecord()
2018-02-07 14:23:25.279 UploadLogFileFromDisk: arguments LogFileLocation=C:\Users\admin_mc\AppData\Local\Temp\AdHealthAadSyncAgentConfiguration.2018-02-07_15-22-37.log;ProductName=Microsoft Azure AD Connect Health agent for sync;ProductVersion=3.0.129.0;MachineName=S4BEON01;ServiceUri=https://frontend.aadconnecthealth.microsoftazure.de/;Result=failed;type=registration,activityId=11549c77-e911-4562-85c0-285f969501f3
2018-02-07 14:23:25.279 UploadLogFileFromDisk: TenantId: 8be41fa8-7356-4412-aa22-4ed3cc38b18a
2018-02-07 14:23:25.279 UploadLogFileFromDisk: MachineId: 0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
2018-02-07 14:23:25.279 UploadLogFileFromDisk: reading file contents of C:\Users\admin_mc\AppData\Local\Temp\AdHealthAadSyncAgentConfiguration.2018-02-07_15-22-37.log
2018-02-07 14:23:25.279 UploadLogFileFromDisk: log length: 42946
2018-02-07 14:23:25.279 UploadFile: start, url: https://frontend.aadconnecthealth.microsoftazure.de/providers/Microsoft.ADHybridHealthService/diagnostics/logs/installer/product/Microsoft-Azure-AD-Connect-Health-agent-for-sync/version/3.0.129.0/machine/S4BEON01?result=failed&type=registration&tenantId=8be41fa8-7356-4412-aa22-4ed3cc38b18a&machineId=0dfbb3dc-7aa7-452e-91db-de6b79cc29d6
2018-02-07 14:23:25.388 UploadFile: upload successful
2018-02-07 14:23:25.388 UploadLogFileFromDisk: response: Http response code: OK"log successfully uploaded"

Viewing all 16000 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>