Skip to content

Commit 0345511

Browse files
Merge pull request #314248 from khdownie/kendownie040326-3
Learn Authoring Assistant pass
2 parents 34a3d94 + a4eaacd commit 0345511

1 file changed

Lines changed: 29 additions & 29 deletions

File tree

articles/storage/files/storage-how-to-use-files-windows.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to mount an SMB Azure file share on Windows and Windows S
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: how-to
7-
ms.date: 10/16/2025
7+
ms.date: 04/03/2026
88
ms.author: kendownie
99
ms.custom:
1010
- sfi-image-nochange
@@ -49,38 +49,38 @@ The following table shows Windows support for SMB version, SMB Multichannel<sup>
4949

5050
<sup>1</sup>Azure Files supports [SMB Multichannel](files-smb-protocol.md#smb-multichannel) on SSD file shares only.
5151

52-
<sup>2</sup>Regular Microsoft support for Windows Server 2012 and Windows Server 2012 R2 has ended. It's possible to purchase additional support for security updates only through the [Extended Security Update (ESU) program](https://support.microsoft.com/help/4497181/lifecycle-faq-extended-security-updates).
52+
<sup>2</sup>Regular Microsoft support for Windows Server 2012 and Windows Server 2012 R2 has ended. You can purchase additional support for security updates only through the [Extended Security Update (ESU) program](https://support.microsoft.com/help/4497181/lifecycle-faq-extended-security-updates).
5353

5454
<sup>3</sup>Microsoft support for Windows 7, Windows 8, and Windows Server 2008 R2 has ended. We strongly recommend migrating off of these operating systems.
5555

5656
## Ensure port 445 is open
5757

58-
The SMB protocol requires TCP port 445 to be open. Connections will fail if port 445 is blocked. You can check if your firewall or ISP is blocking port 445 by using the `Test-NetConnection` PowerShell cmdlet. For more information, see [Port 445 is blocked](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-connectivity?toc=/azure/storage/files/toc.json#cause-1-port-445-is-blocked).
58+
The SMB protocol requires TCP port 445 to be open. Connections fail if port 445 is blocked. To check if your firewall or ISP is blocking port 445, use the `Test-NetConnection` PowerShell cmdlet. For more information, see [Port 445 is blocked](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-connectivity?toc=/azure/storage/files/toc.json#cause-1-port-445-is-blocked).
5959

60-
If you want to mount your Azure file share over SMB from outside of Azure without opening up port 445, you can [use a point-to-site VPN](storage-files-configure-p2s-vpn-windows.md).
60+
If you want to mount your Azure file share over SMB from outside of Azure without opening port 445, you can [use a point-to-site VPN](storage-files-configure-p2s-vpn-windows.md).
6161

62-
In order to use an Azure file share via the public endpoint outside of the Azure region it's hosted in, such as on-premises or in a different Azure region, the OS must support SMB 3.x. Older versions of Windows that support only SMB 2.1 can't mount Azure file shares via the public endpoint.
62+
To use an Azure file share via the public endpoint outside of the Azure region it's hosted in, such as on-premises or in a different Azure region, the OS must support SMB 3.x. Older versions of Windows that support only SMB 2.1 can't mount Azure file shares via the public endpoint.
6363

6464
## Use identity-based authentication
6565

66-
To improve security and access control, configure [identity-based authentication](storage-files-active-directory-overview.md) and domain-join your clients. This allows you to use your Active Directory or Microsoft Entra identity to access the file share rather than using a storage account key.
66+
To improve security and access control, configure [identity-based authentication](storage-files-active-directory-overview.md) and domain-join your clients. This authentication method allows you to use your Active Directory or Microsoft Entra identity to access the file share rather than using a storage account key.
6767

68-
Before you can mount an Azure file share using identity-based authentication, you must complete the following:
68+
Before you can mount an Azure file share using identity-based authentication, complete the following steps:
6969

7070
- Configure an identity source for your storage account: either Active Directory Domain Services (AD DS), Microsoft Entra Kerberos, or Microsoft Entra Domain Services.
7171
- [Assign share-level permissions](storage-files-identity-assign-share-level-permissions.md) and [configure directory and file-level permissions](storage-files-identity-configure-file-level-permissions.md). Remember that share-level role assignment can take some time to take effect.
72-
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you first unmount the share and remove the persistent credentials of the storage account key. For instructions on how to remove cached credentials and delete existing SMB connections before initializing a new connection with AD DS or Microsoft Entra credentials, follow [this process](./storage-files-faq.md#identity-based-authentication).
73-
- If your AD source is AD DS or Microsoft Entra Kerberos, hybrid clients must have unimpeded network connectivity to your AD DS. If your machine or VM is outside of the network managed by your AD DS, you need to enable VPN to reach AD DS for authentication.
74-
- Sign in to the client using the credentials of the AD DS or Microsoft Entra identity that you granted permissions to.
72+
- If you're mounting the file share from a client that previously connected to the file share by using your storage account key, make sure that you first unmount the share and remove the persistent credentials of the storage account key. For instructions on how to remove cached credentials and delete existing SMB connections before initializing a new connection with AD DS or Microsoft Entra credentials, see [this process](./storage-files-faq.md#identity-based-authentication).
73+
- If your identity source is AD DS or Microsoft Entra Kerberos, hybrid clients must have unimpeded network connectivity to your Active Directory. If your machine or VM is outside of the network managed by your Active Directory, you need to enable VPN to reach Active Directory for authentication.
74+
- Sign in to the client by using the credentials of the Active Directory or Entra identity that you granted permissions to.
7575

76-
If you run into issues, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#unable-to-mount-azure-file-shares-with-ad-credentials).
76+
If you run into problems, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#unable-to-mount-azure-file-shares-with-ad-credentials).
7777

7878
## Use an Azure file share with Windows
7979

8080
To use an Azure file share with Windows, you must either mount it, which means assigning it a drive letter or mount point path, or [access it via its UNC path](#access-an-azure-file-share-via-its-unc-path). Shared access signature (SAS) tokens aren't currently supported for mounting Azure file shares.
8181

8282
> [!NOTE]
83-
> A common pattern for lifting and shifting line-of-business (LOB) applications that expect an SMB file share to Azure is to use an Azure file share as an alternative for running a dedicated Windows file server in an Azure virtual machine (VM). One important consideration for successfully migrating an LOB application to use an Azure file share is that many applications run under the context of a dedicated service account with limited system permissions rather than the VM's administrative account. Therefore, you must ensure that you mount/save the credentials for the Azure file share from the context of the service account rather than your administrative account.
83+
> A common pattern for lifting and shifting line-of-business (LOB) applications that expect an SMB file share to Azure is to use an Azure file share as an alternative for running a dedicated Windows file server in an Azure virtual machine (VM). One important consideration for successfully migrating an LOB application to use an Azure file share is that many applications run under the context of a dedicated service account with limited system permissions rather than the VM's administrative account. Therefore, you must ensure that you mount and save the credentials for the Azure file share from the context of the service account rather than your administrative account.
8484
8585
## Mount the Azure file share
8686

@@ -91,9 +91,9 @@ You can mount an SMB Azure file share on Windows by using the Azure portal or Az
9191
To mount an Azure file share by using the Azure portal, follow these steps:
9292

9393
1. Sign in to the [Azure portal](https://portal.azure.com/).
94-
1. Navigate to the storage account that contains the file share you'd like to mount.
94+
1. Go to the storage account that contains the file share you want to mount.
9595
1. Select **File shares**.
96-
1. Select the file share you'd like to mount.
96+
1. Select the file share you want to mount.
9797

9898
:::image type="content" source="media/storage-how-to-use-files-windows/select-file-shares.png" alt-text="Screenshot of file shares blade, file share is highlighted." lightbox="media/storage-how-to-use-files-windows/select-file-shares.png":::
9999

@@ -103,21 +103,21 @@ To mount an Azure file share by using the Azure portal, follow these steps:
103103

104104
1. Select the drive letter to mount the share to.
105105

106-
1. Under **Authentication method**, select *Active Directory or Microsoft Entra*. If you see a message that identity-based authentication isn't configured for your storage account, then configure it based on one of the methods described in [identity-based authentication overview](storage-files-active-directory-overview.md), and try mounting the share again.
106+
1. Under **Authentication method**, select *Active Directory or Microsoft Entra*. If you see a message that identity-based authentication isn't configured for your storage account, configure it by using one of the methods described in [identity-based authentication overview](storage-files-active-directory-overview.md), and try mounting the share again.
107107

108108
1. Select **Show script** and then copy the provided script.
109109

110110
:::image type="content" source="media/storage-how-to-use-files-windows/files-portal-mount-script.png" alt-text="Screenshot of connect blade, copy button on script is highlighted.":::
111111

112-
1. Paste the script into a shell on the host you'd like to mount the file share to, and run it.
112+
1. Paste the script into a shell on the host where you want to mount the file share, and run it.
113113

114114
You have now mounted your Azure file share.
115115

116116
# [PowerShell](#tab/azure-powershell)
117117

118118
Run the following PowerShell script to persistently mount the Azure file share from a domain-joined VM and map it to drive `Z:` (or desired mount path) on Windows. The script checks to see if this storage account is accessible via TCP port 445, which is the port SMB uses. Replace the placeholder values, including brackets, with your own values.
119119

120-
Unless you're using [custom domain names](#mount-file-shares-using-custom-domain-names), you should mount Azure file shares using the suffix `file.core.windows.net`, even if you set up a private endpoint for your share.
120+
Unless you're using [custom domain names](#mount-file-shares-using-custom-domain-names), mount Azure file shares by using the suffix `file.core.windows.net`, even if you set up a private endpoint for your share.
121121

122122
```powershell
123123
$connectTestResult = Test-NetConnection -ComputerName <storage-account-name>.file.core.windows.net -Port 445
@@ -167,15 +167,15 @@ net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /use
167167

168168
## Mount the Azure file share using the storage account key (not recommended)
169169

170-
The Azure portal provides a PowerShell script that you can use to mount your file share directly to a host using the storage account key. However, we recommend using identity-based authentication instead of the storage account key for security reasons. If you must use the storage account key, follow the [mount instructions](#mount-the-azure-file-share), but under **Authentication method**, select *Storage account key*.
170+
The Azure portal provides a PowerShell script that you can use to mount your file share directly to a host using the storage account key. However, use identity-based authentication instead of the storage account key for security reasons. If you must use the storage account key, follow the [mount instructions](#mount-the-azure-file-share), but under **Authentication method**, select *Storage account key*.
171171

172172
A storage account key is an administrator key for a storage account, including administrator permissions to all files and folders within the file share you're accessing, and for all file shares and other storage resources (blobs, queues, tables, etc.) contained within your storage account. You can find your storage account key in the [Azure portal](https://portal.azure.com/) by navigating to the storage account and selecting **Security + networking** > **Access keys**, or you can use the `Get-AzStorageAccountKey` PowerShell cmdlet.
173173

174174
### Mount the Azure file share with File Explorer
175175

176176
1. Open File Explorer by opening it from the Start Menu, or by pressing the Win+E shortcut.
177177

178-
1. Navigate to **This PC** on the left-hand side of the window. This will change the menus available in the ribbon. Under the Computer menu, select **Map network drive**.
178+
1. Go to **This PC** on the left side of the window. This action changes the menus available in the ribbon. Under the **Computer** menu, select **Map network drive**.
179179

180180
:::image type="content" source="media/storage-how-to-use-files-windows/1_MountOnWindows10.png" alt-text="Screenshot of the Map network drive drop-down menu.":::
181181

@@ -198,15 +198,15 @@ A storage account key is an administrator key for a storage account, including a
198198
199199
### Access an Azure file share via its UNC path
200200

201-
You don't need to mount the Azure file share to a drive letter to use it. You can directly access your Azure file share using the [UNC path](/windows/win32/fileio/naming-a-file) by entering the following into File Explorer. Be sure to replace *storageaccountname* with your storage account name and *myfileshare* with your file share name:
201+
You don't need to mount the Azure file share to a drive letter to use it. You can directly access your Azure file share by using the [UNC path](/windows/win32/fileio/naming-a-file). Enter the following path into File Explorer, and be sure to replace *storageaccountname* with your storage account name and *myfileshare* with your file share name:
202202

203203
`\\storageaccountname.file.core.windows.net\myfileshare`
204204

205-
You'll be asked to sign in with your network credentials. Sign in with the Azure subscription under which you've created the storage account and file share. If you aren't prompted for credentials, you can add the credentials using the following command:
205+
You're prompted to sign in by using your network credentials. Sign in by using the Azure subscription under which you created the storage account and file share. If you're not prompted for credentials, add the credentials by using the following command:
206206

207207
`cmdkey /add:StorageAccountName.file.core.windows.net /user:localhost\StorageAccountName /pass:StorageAccountKey`
208208

209-
For Azure Government Cloud, change the servername to:
209+
For Azure Government Cloud, change the server name to:
210210

211211
`\\storageaccountname.file.core.usgovcloudapi.net\myfileshare`
212212

@@ -218,23 +218,23 @@ If you don't want to mount Azure file shares using the suffix `file.core.windows
218218
> If you use custom domain names with Active Directory Domain Services (AD DS), be sure to [upgrade the Kerberos encryption type](storage-files-identity-ad-ds-enable.md#enable-aes-256-encryption-recommended) for your storage account to AES-256.
219219
220220
> [!NOTE]
221-
> Azure Files only supports configuring CNAMES using the storage account name as a domain prefix. If you don't want to use the storage account name as a prefix, consider using [DFS namespaces](files-manage-namespaces.md).
221+
> Azure Files only supports configuring CNAMEs by using the storage account name as a domain prefix. If you don't want to use the storage account name as a prefix, consider using [DFS namespaces](files-manage-namespaces.md).
222222
223-
In this example, we have the Active Directory domain *onpremad1.com*, and we have a storage account called *mystorageaccount* which contains SMB Azure file shares. First, modify the SPN suffix of the storage account to map *mystorageaccount.onpremad1.com* to *mystorageaccount.file.core.windows.net*.
223+
In this example, you have the Active Directory domain *onpremad1.com*, and you have a storage account called *mystorageaccount* which contains SMB Azure file shares. First, modify the SPN suffix of the storage account to map *mystorageaccount.onpremad1.com* to *mystorageaccount.file.core.windows.net*.
224224

225-
You can mount the file share with `net use \\mystorageaccount.onpremad1.com` because clients in *onpremad1* know to search *onpremad1.com* to find the proper resource for that storage account.
225+
You can mount the file share by using `net use \\mystorageaccount.onpremad1.com` because clients in *onpremad1* know to search *onpremad1.com* to find the proper resource for that storage account.
226226

227227
To use this method, complete the following steps:
228228

229229
1. Configure identity-based authentication for your storage account. If you're authenticating hybrid identities, you must sync your AD user accounts to Microsoft Entra ID.
230230

231-
2. Modify the SPN of the storage account using the `setspn` tool. You can find `<DomainDnsRoot>` by running the following Active Directory PowerShell command: `(Get-AdDomain).DnsRoot`
231+
1. Modify the SPN of the storage account by using the `setspn` tool. You can find `<DomainDnsRoot>` by running the following Active Directory PowerShell command: `(Get-AdDomain).DnsRoot`
232232

233233
```
234234
setspn -s cifs/<storage-account-name>.<DomainDnsRoot> <storage-account-name>
235235
```
236236

237-
3. Add a CNAME entry using Active Directory DNS Manager. If you're using a private endpoint, add the CNAME entry to map to the private endpoint name.
237+
1. Add a CNAME entry by using Active Directory DNS Manager. If you're using a private endpoint, add the CNAME entry to map to the private endpoint name.
238238

239239
1. Open Active Directory DNS Manager.
240240
1. Go to your domain (for example, **onpremad1.com**).
@@ -245,11 +245,11 @@ To use this method, complete the following steps:
245245
1. For the target host FQDN, enter **`<storage-account-name>`.file.core.windows.net**
246246
1. Select **OK**.
247247

248-
You can now mount the file share using *storageaccount.domainname.com*.
248+
You can now mount the file share by using *storageaccount.domainname.com*.
249249

250250
## Next steps
251251

252-
See the following articles for more information:
252+
For more information, see the following articles:
253253

254254
- [Planning for an Azure Files deployment](storage-files-planning.md)
255255
- [FAQ](storage-files-faq.md)

0 commit comments

Comments
 (0)