{
	"id": "8164850e-2c2c-4ce3-9322-cadfa5b4e24a",
	"created_at": "2026-04-06T00:19:32.915786Z",
	"updated_at": "2026-04-10T03:21:52.31651Z",
	"deleted_at": null,
	"sha1_hash": "ddf1bd55941eb34abb3082b2383ec883d42dd00f",
	"title": "Azure Serial Console - Virtual Machines",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 812986,
	"plain_text": "Azure Serial Console - Virtual Machines\r\nBy JarrettRenshaw\r\nArchived: 2026-04-05 15:38:44 UTC\r\nApplies to: ✔️ Linux VMs ✔️ Windows VMs\r\nNote\r\nWas this article helpful? Your input is important to us. Please use the Feedback button on this page to let us know\r\nhow well this article worked for you or how we can improve it.\r\nSerial Console in the Azure portal provides access to a text-based console for virtual machines (VMs) and virtual\r\nmachine scale set instances running either Linux or Windows. Serial Console connects to the ttyS0 or COM1\r\nserial port of the VM or virtual machine scale set instance, providing access independent of the network state. The\r\nserial console can be accessed by using the Azure portal or Azure CLI and is allowed only for those users who\r\nhave an access role of Contributor or higher to the VM or virtual machine scale set.\r\nSerial Console works in the same manner for VMs and virtual machine scale set instances. In this doc, all\r\nmentions to VMs will implicitly include virtual machine scale set instances unless otherwise stated.\r\nRegions\r\nSerial Console is available for virtual machines and virtual machine scale sets in the following regions:\r\nAustralia Central\r\nAustralia Central 2\r\nAustralia East\r\nAustralia Southeast\r\nAustria East\r\nBelgium Central\r\nBrazil South\r\nBrazil Southeast\r\nCanada Central\r\nCanada East\r\nCentral India\r\nCentral US\r\nCentral US EUAP\r\nChile Central\r\nChina East 2\r\nChina East 3\r\nChina North 2\r\nChina North 3\r\nhttps://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview\r\nPage 1 of 6\n\nDenmark East\r\nEast Asia\r\nEast US\r\nEast US 2 EUAP\r\nEast US 2\r\nFrance Central\r\nFrance South\r\nGermany North\r\nGermany West Central\r\nIndonesia Central\r\nIsrael Central\r\nIsrael Northwest\r\nItaly North\r\nJapan East\r\nJapan West\r\nKorea Central\r\nKorea South\r\nMalaysia West\r\nMexico Central\r\nNew Zealand North\r\nNorth Central US\r\nNorth Europe\r\nNorway East\r\nNorway West\r\nPoland Central\r\nQatar Central\r\nSouth Africa North\r\nSouth Africa West\r\nSouth Central US\r\nSoutheast Asia\r\nSouth India\r\nSpain Central\r\nSweden Central\r\nSweden South\r\nSwitzerland North\r\nSwitzerland West\r\nUAE Central\r\nUAE North\r\nUK South\r\nUK West\r\nWest Central US\r\nWest Europe\r\nhttps://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview\r\nPage 2 of 6\n\nWest India\r\nWest US\r\nWest US 2\r\nWest US 3\r\nUS Gov Arizona\r\nUS Gov Texas\r\nUS Gov Virginia\r\nPrerequisites to access the Azure Serial Console\r\nTo access the Serial Console on your VM or virtual machine scale set instance, you will need the following:\r\nBoot diagnostics must be enabled for the VM\r\nA user account that uses password authentication must exist within the VM. You can create a password-based user with the reset password function of the VM access extension. Select Reset password from the\r\nHelp section.\r\nThe Azure account accessing Serial Console must have Virtual Machine Contributor role for both the VM\r\nand the boot diagnostics storage account\r\nClassic deployments aren't supported. Your VM or virtual machine scale set instance must use the Azure\r\nResource Manager deployment model.\r\nSerial Console is not supported when the storage account has Allow storage account key access disabled.\r\nImportant\r\nBy the end of 2025, Azure Serial Console will no longer utilize boot diagnostics storage accounts for establishing\r\na connection. This change doesn't affect serial logs or screenshots.\r\nGet started with Serial Console\r\nSerial Console for VMs and virtual machine scale set is accessible through the Azure portal or Azure CLI.\r\nAccess Serial Console for Virtual Machines via Azure portal\r\nSerial Console for VMs is as straightforward as clicking on Serial console within the Help section in the Azure\r\nportal.\r\n1. Open the Azure portal.\r\n2. Navigate to All resources and select a Virtual Machine. The overview page for the VM opens.\r\n3. Scroll down to the Help section and select Serial console. A new pane with the serial console opens and\r\nstarts the connection.\r\nhttps://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview\r\nPage 3 of 6\n\nAccess Serial Console for Virtual Machine Scale Sets via Azure portal\r\nSerial Console is available for virtual machine scale sets, accessible on each instance within the scale set. You will\r\nhave to navigate to the individual instance of a virtual machine scale set before seeing the Serial console button.\r\nIf your virtual machine scale set does not have boot diagnostics enabled, ensure you update your virtual machine\r\nscale set model to enable boot diagnostics, and then upgrade all instances to the new model in order to access\r\nserial console.\r\n1. Open the Azure portal.\r\n2. Navigate to All resources and select a Virtual Machine Scale Set. The overview page for the virtual\r\nmachine scale set opens.\r\n3. Navigate to Instances.\r\n4. Select a virtual machine scale set instance.\r\n5. From the Help section, select Serial console. A new pane with the serial console opens and starts the\r\nconnection.\r\nhttps://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview\r\nPage 4 of 6\n\nAccess Serial Console via Azure CLI\r\nFor using Azure CLI to connect to the Serial Console of a virtual machine or virtual machine scale set instance\r\nthat runs Linux or Windows, see az serial-console.\r\nIf you don't have Azure CLI installed, install it by using the instructions in How to install the Azure CLI.\r\nNote\r\nThe serial-console extension will automatically install the first time you run an az serial-console command. If\r\nyou have already installed the serial-console extension, ensure that you have the latest version by running the az\r\nextension add --name serial-console --upgrade command.\r\nTLS 1.2 in Serial Console\r\nSerial Console uses TLS 1.2 end-to-end to secure all communication within the service. Serial Console has a\r\ndependency on a user-managed boot diagnostics storage account, and TLS 1.2 must be configured separately for\r\nthe storage account. Instructions to do so are located here.\r\nAdvanced uses for Serial Console\r\nAside from console access to your VM, you can also use the Azure Serial Console for the following:\r\nhttps://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview\r\nPage 5 of 6\n\nSending a system request command to your VM\r\nSending a non-maskable interrupt to your VM\r\nGracefully rebooting or forcefully power-cycling your VM\r\nNext steps\r\nAdditional Serial Console documentation is available in the sidebar.\r\nMore information is available for Serial Console for Linux VMs.\r\nMore information is available for Serial Console for Windows VMs.\r\nSource: https://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview\r\nhttps://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview\r\nPage 6 of 6",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/serial-console-overview"
	],
	"report_names": [
		"serial-console-overview"
	],
	"threat_actors": [],
	"ts_created_at": 1775434772,
	"ts_updated_at": 1775791312,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ddf1bd55941eb34abb3082b2383ec883d42dd00f.pdf",
		"text": "https://archive.orkl.eu/ddf1bd55941eb34abb3082b2383ec883d42dd00f.txt",
		"img": "https://archive.orkl.eu/ddf1bd55941eb34abb3082b2383ec883d42dd00f.jpg"
	}
}