Personal Virtual Desktop Availability

UIGeneratedMonitorb77cee8bdf324965b06c16de6ec6a15e (UnitMonitor)

This object monitors availability of personal virtual desktops.

Knowledge Base article:

Summary

Personal virtual desktop assignments are stored in Active Directory Domain Services (AD DS). AD DS must be available in order for the RemoteApp and Desktop Connection Management service to display a user's personal virtual desktop by using RemoteApp and Desktop Connection or RD Web Access.

Resolutions

To resolve this issue, do the following:

To perform these procedures, you must have membership in the local Administrators group, or you must have been delegated the appropriate authority.

Identify and fix network connectivity issues

The following are some additional troubleshooting steps that you can perform to help identify the root cause of the problem:

Check the Active Directory Domain Services functional level

To use personal virtual desktops in your environment, your functional level must be at least Windows Server 2008. To use the Personal Virtual Desktop tab in the User Account dialog box within Active Directory Users and Computers, your functional level must be at least Windows Server 2008 R2.

To check the Active Directory Domain Services functional level:

1. On the domain controller, open Active Directory Domains and Trusts. To open Active Directory Domains and Trusts, click Start, point to Administrative Tools, and then click Active Directory Domains and Trusts.

2. Right-click Active Directory Domains and Trusts, and then click Raise Forest Functional Level.

3. Ensure that Current forest functional level displays Windows Server 2008 or newer.

4. Click OK to close the Raise Forest Functional Level dialog box.

Check that a personal virtual desktop is assigned to the user account

You can check if a personal virtual desktop is assigned to the user account on a domain running at the Windows Server 2008 R2 functional level, or newer, by using Active Directory Users and Computers.

To check that a personal virtual desktop is assigned to the user account:

1. On the domain controller, open Active Directory Users and Computers. To open Active Directory Users and Computers, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

2. Navigate to the user account object and then click Properties.

3. Click the Personal Virtual Desktop tab.

4. Ensure that the Assign a personal virtual desktop to this user check box is selected and the FQDN of the personal virtual desktop is displayed in the Computer Name box.

5. Click OK to close the user account dialog box.

Ensure that you can log on to the RD Web Access server by using domain credentials

The RD Web Access server that is configured to use the RD Connection Broker server must be available to communicate with the RD Connection Broker server.

To log on to the RD Web Access server that is configured to use the RD Connection Broker server:

1. On the RD Web Access server, open Remote Desktop Web Access Configuration. To open Remote Desktop Web Access Configuration, click Start, point to Administrative Tools, point to Remote Desktop Services, and then click Remote Desktop Web Access Configuration.

2. In the Domain\user name box, type a valid domain and user account name.

3. In the Password box, type the password for the user account.

4. Verify that you can successfully log on to the RD Web Access server by using Remote Desktop Web Access Configuration.

Ensure that the domain credentials are formatted correctly in a non-Microsoft application

The RemoteApp and Connection Management service queries RemoteApp programs, session-based desktops, and virtual desktops that are available to a specific user. This error can occur in a non-Microsoft application if the domain credentials are not properly formatted. For more information about the RemoteApp and Connection Management service API reference, see http://msdn.microsoft.com/en-us/library/dd401668(VS.85).aspx.

Add the RD Connection Broker computer account to the Windows Authorization Access Group

The Windows Authorization Access Group is a security group included in the Active Directory Domain Services domain.

To add the RD Connection Broker computer account to the Windows Authorization Access Group:

1. On the domain controller, open Active Directory Users and Computers. To open Active Directory Users and Computer, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.

2. Click Builtin, and then double-click Windows Authorization Access Group.

3. Click the Members tab, and then click Add.

4. In the Enter the object names to select box, type the name of the RD Connection Broker computer account, and then click OK.

5. Click OK to close the Windows Authorization Access Group dialog box.

Element properties:

TargetMicrosoft.Windows.Server.10.0.RemoteDesktopServicesRole.Service.RDConnectionBroker
Parent MonitorSystem.Health.AvailabilityState
CategoryCustom
EnabledTrue
Alert GenerateTrue
Alert SeverityMatchMonitorHealth
Alert PriorityHigh
Alert Auto ResolveTrue
Monitor TypeMicrosoft.Windows.SingleEventLogManualReset2StateMonitorType
RemotableTrue
AccessibilityPublic
Alert Message
Personal Virtual Desktop Availability Alert
Event ID: {0} -- Description: {1}
RunAsDefault

Source Code:

<UnitMonitor ID="UIGeneratedMonitorb77cee8bdf324965b06c16de6ec6a15e" Accessibility="Public" Enabled="true" Target="Microsoft.Windows.Server.10.0.RemoteDesktopServicesRole.Service.RDConnectionBroker" ParentMonitorID="SystemHealth!System.Health.AvailabilityState" Remotable="true" Priority="Normal" TypeID="Windows!Microsoft.Windows.SingleEventLogManualReset2StateMonitorType" ConfirmDelivery="true">
<Category>Custom</Category>
<AlertSettings AlertMessage="UIGeneratedMonitorb77cee8bdf324965b06c16de6ec6a15e_AlertMessageResourceID">
<AlertOnState>Error</AlertOnState>
<AutoResolve>true</AutoResolve>
<AlertPriority>High</AlertPriority>
<AlertSeverity>MatchMonitorHealth</AlertSeverity>
<AlertParameters>
<AlertParameter1>$Data/Context/EventDisplayNumber$</AlertParameter1>
<AlertParameter2>$Data/Context/EventDescription$</AlertParameter2>
</AlertParameters>
</AlertSettings>
<OperationalStates>
<OperationalState ID="UIGeneratedOpStateIdcb67f953d71a406296c2a7e531e3608a" MonitorTypeStateID="ManualResetEventRaised" HealthState="Success"/>
<OperationalState ID="UIGeneratedOpStateId29a7d02cf444454a984d29e64951d5af" MonitorTypeStateID="EventRaised" HealthState="Error"/>
</OperationalStates>
<Configuration>
<ComputerName>$Target/Host/Host/Property[Type="Windows!Microsoft.Windows.Computer"]/NetworkName$</ComputerName>
<LogName>Microsoft-Windows-RemoteApp and Desktop Connection Management/Operational</LogName>
<Expression>
<And>
<Expression>
<SimpleExpression>
<ValueExpression>
<XPathQuery Type="UnsignedInteger">EventDisplayNumber</XPathQuery>
</ValueExpression>
<Operator>Equal</Operator>
<ValueExpression>
<Value Type="UnsignedInteger">1011</Value>
</ValueExpression>
</SimpleExpression>
</Expression>
<Expression>
<SimpleExpression>
<ValueExpression>
<XPathQuery Type="String">Channel</XPathQuery>
</ValueExpression>
<Operator>Equal</Operator>
<ValueExpression>
<Value Type="String">Microsoft-Windows-RemoteApp and Desktop Connection Management/Operational</Value>
</ValueExpression>
</SimpleExpression>
</Expression>
</And>
</Expression>
</Configuration>
</UnitMonitor>