Activating a virtual machine running Windows Server 2025 Datacenter Azure Edition or Windows Server 2022 Datacenter Azure Edition on Azure Local requires the virtual machine to satisfy two criteria.
- Product Key installation
- Instance Metadata Service (IMDS) attestation to verify the virtual machine is running on Azure Local
If Automatic Virtual Machine Activation keys are accepted, this completes #1. To check #2, run this command from within the guest VM.
Get-CimInstance -ClassName SoftwareLicensingService | Select AzureMetadataResponse
- A successful response is
1. This confirms the VM can communicate with the host's IMDS service. If1is returned, this validates #2 above. - Any other result (e.g.,
4294967295,0or an error) indicates a failure in the Guest Service Interface transport or the certificate validation.
The most likely cause for a non-1 result is a lack of internet access to internet URLs from the guest VM to validate the host's IMDS attestation certificate.
The virtual machine will need access to the internet to validate the IMDS attestation certificate. If this is not possible due to an air-gapped or highly restricted environment, it will require manually downloading and installing all required certificates and configuring a local CRL/CTL source. See Configure trusted roots and disallowed certificates in Windows | Microsoft Learn for more information on this.
⚠️ Important: For internet connected environments you must ensure the Azure Edition VM has outbound HTTP access to all required endpoints for certificate validation.
1. Windows Certificate Trust Lists (CTLs)
- The Windows OS must contact Windows Update to download the latest lists of trusted and untrusted root certificates. If this is blocked, chain validation can fail even if the intermediate CA URLs are accessible.
- Primary Document: Certificate trust in Windows
- Required Endpoints:
- `http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab` - `http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab`
2. Azure PKI & CRL/AIA URLs
- Once the root is trusted, the OS must download the intermediate certificates (via AIA) and check revocation status (via CRL/OCSP).
- Primary Document: Azure Certificate Authority Details
- Direct link to endpoint list: Certificate downloads and revocation lists