Share via

AVD – Mailto File Association Not Persisting After Reboot

Cleon Russell 45 Reputation points
2026-03-30T09:47:15.7433333+00:00

Hello Microsoft Support,

We are experiencing an issue within our Azure Virtual Desktop (AVD) environment where the MAILTO file association is not persisting as expected.

Our customer,reports that the mailto protocol is manually set to Outlook, but the default reverts after an AVD reboot. This behaviour is repeatable across their session hosts.

We have checked the servers referenced by the customer and so far cannot see any obvious misconfiguration; however, this issue appears to align with known behaviour where MAILTO associations revert following restarts due to how Windows handles hashed default app associations. This has also been reported by other users in Microsoft Q&A where MAILTO defaults revert after a restart, despite being set correctly beforehand.

  1. Is Microsoft aware of any current or ongoing issues affecting default app associations (specifically MAILTO) within AVD or FSLogix-managed profiles?
  2. Could recent Windows or Microsoft 365 updates be overriding GPO‑based default app settings within non-persistent AVD environments?
  3. Are there known limitations or required configuration changes for enforcing MAILTO defaults reliably in AVD?
  4. Is there recommended guidance (Microsoft best practice) for enforcing default protocol handlers within multi-session AVD environments?
Windows for business | Windows Client for IT Pros | User experience | Configure Azure Virtual Desktop
0 comments No comments

1 answer

Sort by: Most helpful
  1. VPHAN 30,935 Reputation points Independent Advisor
    2026-03-30T10:20:42.8166667+00:00

    Hi Cleon Russell,

    The issue your customer is encountering stems from a built-in Windows security feature designed to prevent unauthorized programs from hijacking file associations. Windows generates a unique cryptographic hash for protocol handlers like MAILTO, which is stored in the registry at HKCU\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\mailto\UserChoice. Because this hash is partially tied to the specific hardware or OS instance, an FSLogix profile roaming that registry key to a different AVD session host will fail the hash validation. When Windows detects this mismatch, it automatically reverts the MAILTO association to the system default to protect the user environment.

    To resolve this reliably in a multi-session environment, you must move away from roaming user-level associations and instead enforce them at the computer level. This is achieved by creating a default association configuration file. You can generate this XML by manually setting Outlook as the default on a reference host and running the DISM /Online /Export-DefaultAppAssociations command. Once generated, place this XML file on a central network share where all AVD hosts have read access.

    Finally, you must apply this configuration using the Group Policy setting located at Computer Configuration > Administrative Templates > Windows Components > File Explorer > Set a default associations configuration file. Enter the UNC path to your XML file in the policy setting. This approach ensures that every time a user logs into any AVD host, the MAILTO protocol is mapped to Outlook before the UserChoice hash check can trigger a reset. This method is the Microsoft-recommended standard for non-persistent environments and effectively bypasses the profile-roaming conflicts inherent in FSLogix.

    Hope this answer brought you some useful information. If it did, please hit “accept answer”. Should you have any questions, feel free to leave a comment.

    VP


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.