Azure Migrate Hyper-V guest discovery fails (Error 60001 / WinRM Negotiate 0x8009030d “Failed to open runspace”) even though manual remoting works

Michael S 0 Reputation points
2025-12-02T20:34:19.7966667+00:00

I’m evaluating whether migrating to Azure makes sense and I’m using Azure Migrate to assess our Hyper-V environment. I created a Migrate project, deployed/connected the Hyper-V appliance, and hosts/VMs are discovered. However, software/performance discovery for guest VMs fails.

Symptoms

  • Azure Migrate shows Error ID 60001 for one or more discovered guest VMs.

Error details include:

Failed to open runspace (state: Broken)

  “WinRM cannot process the request… using **Negotiate** authentication… **0x8009030d** (A specified logon session does not exist…)”
  
  The failure is reported across multiple addresses for the same VM (hostname/FQDN/IP), depending on what the appliance tries.
  

What I’ve verified (high level)

On the Hyper-V hosts and guest VMs:

WinRM service running, WSMan listener present, TCP 5985 listening, Windows Firewall rules allow WinRM

  Basic WMI/CIM queries succeed locally
  
  Time is in sync across systems (to avoid Kerberos/NTLM issues).
  
  The credential I configured in the appliance is a **domain account** and is in the **Remote Management Users** group (and I also tested with elevated permissions).
  
  From the **appliance VM itself**, I can successfully remote to the same target systems with the same credential, for example:
  
     `Invoke-Command -ComputerName <host-or-vm> -Authentication Negotiate -Credential <domaincred> -ScriptBlock { hostname; whoami }`
     
        This succeeds against my Hyper-V hosts (and I can also reach target VMs manually).
        

What I’ve tried

Removed/re-added the credentials in the appliance.

Refreshed/revalidated in the portal multiple times.

Rebuilt the appliance / created a brand new Migrate project and repeated setup.

Disabled IPv6 on the appliance to rule out v6 selection issues (no change).

Question Given that manual WinRM / PowerShell remoting from the appliance to the target works, what specific Azure Migrate guest discovery dependency or authentication requirement commonly causes 0x8009030d / “Failed to open runspace” errors?

In particular:

Are there known cases where Azure Migrate uses a different authentication path than a normal Invoke-Command test (e.g., SPN/hostname requirements, constrained delegation, UAC remote token behavior, WinRM auth settings such as CredSSP/Basic/AllowUnencrypted, etc.)?

What logs on the appliance or target should I look at to pinpoint why Azure Migrate fails to create the runspace despite WinRM being reachable?

Sanitized error excerpt Error ID: 60001 Error details: Unable to connect… Failed to open runspace (state: Broken)… WinRM Negotiate… 0x8009030d “A specified logon session does not exist…”I’m evaluating whether migrating to Azure makes sense and I’m using Azure Migrate to assess our Hyper-V environment. I created a Migrate project, deployed/connected the Hyper-V appliance, and hosts/VMs are discovered. However, software/performance discovery for guest VMs fails.

Symptoms

Azure Migrate shows Error ID 60001 for one or more discovered guest VMs.

Error details include:

Failed to open runspace (state: Broken)

  “WinRM cannot process the request… using **Negotiate** authentication… **0x8009030d** (A specified logon session does not exist…)”
  
  The failure is reported across multiple addresses for the same VM (hostname/FQDN/IP), depending on what the appliance tries.
  

What I’ve verified (high level)

On the Hyper-V hosts and guest VMs:

WinRM service running, WSMan listener present, TCP 5985 listening, Windows Firewall rules allow WinRM

  Basic WMI/CIM queries succeed locally
  
  Time is in sync across systems (to avoid Kerberos/NTLM issues).
  
  The credential I configured in the appliance is a **domain account** and is in the **Remote Management Users** group (and I also tested with elevated permissions).
  
  From the **appliance VM itself**, I can successfully remote to the same target systems with the same credential, for example:
  
     `Invoke-Command -ComputerName <host-or-vm> -Authentication Negotiate -Credential <domaincred> -ScriptBlock { hostname; whoami }`
     
        This succeeds against my Hyper-V hosts (and I can also reach target VMs manually).
        

What I’ve tried

Removed/re-added the credentials in the appliance.

Refreshed/revalidated in the portal multiple times.

Rebuilt the appliance / created a brand new Migrate project and repeated setup.

Disabled IPv6 on the appliance to rule out v6 selection issues (no change).

Question
Given that manual WinRM / PowerShell remoting from the appliance to the target works, what specific Azure Migrate guest discovery dependency or authentication requirement commonly causes 0x8009030d / “Failed to open runspace” errors?

In particular:

Are there known cases where Azure Migrate uses a different authentication path than a normal Invoke-Command test (e.g., SPN/hostname requirements, constrained delegation, UAC remote token behavior, WinRM auth settings such as CredSSP/Basic/AllowUnencrypted, etc.)?

What logs on the appliance or target should I look at to pinpoint why Azure Migrate fails to create the runspace despite WinRM being reachable?

Sanitized error excerpt
Error ID: 60001
Error details: Unable to connect… Failed to open runspace (state: Broken)… WinRM Negotiate… 0x8009030d “A specified logon session does not exist…”

Azure Migrate
Azure Migrate
A central hub of Azure cloud migration services and tools to discover, assess, and migrate workloads to the cloud.
{count} votes

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.