TOTD: Error applying RemoteFX 3D Adapter changes

Hi, guys!

In this Tip Of The Day we are going to discuss strange issue in WS2012/2012R2 *

When you add RemoteFX Adapter to VM error pops up:

Error applying RemoteFX 3D Adapter changes

remotefx adapter error applying changes

You’ve checked requirements and figured out that your environment is completely applicable to RemoteFX:

  • Up-to-date graphical adapter driver’s version and GPU is also listed in Windows Server catalog
  • Host is up-to-date
  • SLAT-compatible CPU (systeminfo.exe, extended page tables or nested page tables are enabled in BIOS)
  • DirectX 11 and driver model WDDM 1.2 at least (dxdiag.exe shows the required versions)
  • Hyper-V is installed and RemoteFX adapter is enabled


You don’t have to rack your brain! It’s a bug of GUI that was originated in Windows Server 2012 RC (Release Candidate) and we don’t have any official patches or KBs yet. Just for reference, WS 2016 is coming and 2015 year now Улыбка


To solution use PowerShell instead of GUI

Add-VMRemoteFx3dVideoAdapter -VMName vmname
Set-VMRemoteFx3dVideoAdapter -VMName vmname -MonitorCount 1 -MaximumResolution 1920x1200
Get-VMRemoteFx3dVideoAdapter -VMName vmname

MaximumScreenResolution : 1920x1200
MaximumMonitors : 1
ComputerName : RDVH01
Name : RemoteFX 3D Adapter
Id : Microsoft:1C7D9096-ED62-4039-9285-FB88DB183C93\113560EA-48CD-4BD1-8828-FCEC44E2B5D5
IsDeleted : False
VMId : 1c7d9096-ed62-4039-9285-fb88db183c93
VMName : vmname
VMSnapshotId : 00000000-0000-0000-0000-000000000000
VMSnapshotName :
Key :

*pics are in Russian but they are easy to understand 🙂

TIP: after adding RemoteFX 3D Adapter to VM you can set it up (change monitor count or resolution)  in GUI without any issues.

Critical security update for Hyper-V (Win8.1, 2008 – 2012 R2)

This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability.

This security update is rated Critical for Windows Hyper-V on Windows Server 2008, Windows Server 2008 R2, Windows 8 and Windows Server 2012, and Windows 8.1 and Windows Server 2012 R2. For more information, see the Affected Software section.

The security update addresses the vulnerabilities by correcting how Hyper-V initializes system data structures in guest virtual machines. For more information about the vulnerabilities, see the Vulnerability Information section.

%d bloggers like this: