My Azure marketplace VM image was removed suddenly by Microsoft due to WannaCry vulnerability.
I'm trying to run Certification Test Tool 1.2 for Azure Certified on a new VM created from the new patched image.
I am logged in as a local administrator and running the tool on the VM as per the documentation: "The certification tool runs on a running VM, provisioned from your user VM image, to ensure that the VM image is compatible with Microsoft Azure."
I've tried running the tool on default Classic (not Azure Resource Manager) Windows Server 2012 R2 Datacenter and Windows Server 2016 Datacenter VMs.
I've tried turning the Windows firewall and UAC off.
I have not tried changing the firewall rules on Azure for the VM because: "When you create a Windows virtual machine in the Azure classic portal, common endpoints like those for Remote Desktop and Windows PowerShell Remoting are typically created for you automatically."
Here is the log created from running the tool on a brand new Azure Classic VM (with WannaCry patches applied):
5/18/2017 6:23:22 AM
Log generated by Certification Test Tool for Azure Certified
Test name: ****** Test Date :5/18/2017 6:23:22 AM Tested on: ******.cloudapp.net Test for: Microsoft Azure Test in: Windows Server
5/18/2017 6:23:24 AM
Test case/Verification: TestConnection
Description: Instantiates connection to the specified VM.
Connection Attempt: 1 Connecting to the Azure VM.... ******.cloudapp.net Error in connecting to the VM. Reason for not connecting to the VM : System.Management.Automation.Remoting.PSRemotingTransportException: Connecting to remote server ******.cloudapp.net failed with the following error message : Access is denied. For more information, see the about_Remote_Troubleshooting Help topic. at System.Management.Automation.Runspaces.AsyncResult.EndInvoke() at System.Management.Automation.Runspaces.Internal.RunspacePoolInternal.EndOpen(IAsyncResult asyncResult) at System.Management.Automation.Runspaces.Internal.RemoteRunspacePoolInternal.Open() at System.Management.Automation.RemoteRunspace.Open() at WindowsAddin.PSConnection.OpenSession() ----------------------------------------------------------------->
EDIT: Add a couple links.