In Azure, we can't use ping to test Azure VM status, by default Azure will block the public ICMP traffic. To test it, we can use telnet to test it, like this:
C:\Users>telnet xxx.xx.xx.xx 22
By the way, if we shutdown Azure VM by VM command, the Azure portal still show VM is running, only shutdown Azure VM by Azure portal, portal will change Azure vm status to stopped. So we should use telnet to test it.
If we can't telnet this VM, maybe we can restart this VM via Azure portal, then test it again. ( redeploy this VM via Azure portal is a good idea, Azure will use your old config to deploy a new VM, same as your original VM, and new VM will deploy to another host)
We can restart this VM here:
More information about redeploy Azure VM, please refer to this link.
If you face difficulties troubleshooting SSH or application access to
a Linux virtual machine (VM) in Azure, redeploying the VM may help.
When you redeploy a VM, it moves the VM to a new node within the Azure
infrastructure and then powers it back on. All your configuration
options and associated resources are retained. This article shows you
how to redeploy a VM using Azure CLI or the Azure portal.
If restart or redeploy this VM still can't telnet this VM, maybe we should deploy another VM in the same VNet, then we can ping internal IP address to test it running or not.
If we can ping this VM internal IP address, we should reset VM's SSH configure via Azure portal.
More information about reset SSh configuration, please refer to this article.
In short, we can restart(or redeploy) this VM and test it. if it does not work, we can reset VM ssh configure. After that, if vm still can't ssh to it, please post your boot diagnostics here.
When I start the day, I need to logon separately in all applications
and accept the MFA request for each. It looks like the "remember 1
day" setting does not work.
Do you mean after remember, when you login still require to use phone to authenticate it?
Remembering Multi-Factor Authentication works by setting a persistent cookie on the browser when a user checks the "Don't ask again for X days" box at sign-in. The user won't be prompted for MFA again from that browser until the cookie expires(still need password).
Also, if we want to use this feature, we should use the same browser and same device, or we should clear their cookies, they are prompted to verity again.
MFA request are sent unattended in the weekend. It looks like Office
applications are trying to logon without user interaction even if the
computer is locked.
Maybe your office applications refresh by itself, or someone try to login your account, please connect your Azure AD admin, check the logs.
We can find logs here:
Best Answer
The filter in the Az CLI will not allow that kind of search, so you would have to do that sort of filtering yourself in your own bash/PowerShell code once you retrieve a list of resources.