Skip to content

Commit 18c6c11

Browse files
Merge pull request #313099 from khdownie/patch-7
Revise Azure Files SMB support documentation
2 parents 7b157d9 + 0b997d7 commit 18c6c11

1 file changed

Lines changed: 29 additions & 27 deletions

File tree

articles/storage/files/storage-how-to-use-files-windows.md

Lines changed: 29 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,11 @@ ms.custom:
1717

1818
[Azure Files](storage-files-introduction.md) is Microsoft's easy-to-use cloud file system. This article shows you how to mount an SMB Azure file share on Windows and Windows Server.
1919

20-
Azure Files supports [SMB Multichannel](files-smb-protocol.md#smb-multichannel) on SSD file shares only.
20+
## Windows SMB support and Azure Files features
2121

22-
| Windows version | SMB version | Azure Files SMB Multichannel | Maximum SMB channel encryption |
22+
The following table shows Windows support for SMB version, SMB Multichannel<sup>1</sup>, and SMB channel encryption when mounting Azure file shares. Use this table to determine feature support and security requirements for the client operating systems that access your Azure file share. We recommend taking the most recent KB for your version of Windows.
23+
24+
| Windows version | SMB version | SMB Multichannel (SSD only) | Maximum SMB channel encryption |
2325
|-|-|-|-|
2426
| Windows Server 2025 | SMB 3.1.1 | Yes | AES-256-GCM |
2527
| Windows 11, version 24H2 | SMB 3.1.1 | Yes | AES-256-GCM |
@@ -39,18 +41,17 @@ Azure Files supports [SMB Multichannel](files-smb-protocol.md#smb-multichannel)
3941
| Windows Server 2016 | SMB 3.1.1 | Yes, with KB5004238 or newer and [applied registry key](files-smb-protocol.md#windows-server-2016-and-windows-10-version-1607) | AES-128-GCM |
4042
| Windows 10, version 1607 | SMB 3.1.1 | Yes, with KB5004238 or newer and [applied registry key](files-smb-protocol.md#windows-server-2016-and-windows-10-version-1607) | AES-128-GCM |
4143
| Windows 10, version 1507 | SMB 3.1.1 | Yes, with KB5004249 or newer and [applied registry key](files-smb-protocol.md#windows-10-version-1507) | AES-128-GCM |
42-
| Windows Server 2012 R2<sup>1</sup> | SMB 3.0 | No | AES-128-CCM |
43-
| Windows Server 2012<sup>1</sup> | SMB 3.0 | No | AES-128-CCM |
44-
| Windows 8.1<sup>2</sup> | SMB 3.0 | No | AES-128-CCM |
45-
| Windows Server 2008 R2<sup>2</sup> | SMB 2.1 | No | Not supported |
46-
| Windows 7<sup>2</sup> | SMB 2.1 | No | Not supported |
44+
| Windows Server 2012 R2<sup>2</sup> | SMB 3.0 | No | AES-128-CCM |
45+
| Windows Server 2012<sup>2</sup> | SMB 3.0 | No | AES-128-CCM |
46+
| Windows 8.1<sup>3</sup> | SMB 3.0 | No | AES-128-CCM |
47+
| Windows Server 2008 R2<sup>3</sup> | SMB 2.1 | No | Not supported |
48+
| Windows 7<sup>3</sup> | SMB 2.1 | No | Not supported |
4749

48-
<sup>1</sup>Regular Microsoft support for Windows Server 2012 and Windows Server 2012 R2 has ended. It's possible to purchase additional support for security updates only through the [Extended Security Update (ESU) program](https://support.microsoft.com/help/4497181/lifecycle-faq-extended-security-updates).
50+
<sup>1</sup>Azure Files supports [SMB Multichannel](files-smb-protocol.md#smb-multichannel) on SSD file shares only.
4951

50-
<sup>2</sup>Microsoft support for Windows 7, Windows 8, and Windows Server 2008 R2 has ended. We strongly recommend migrating off of these operating systems.
52+
<sup>2</sup>Regular Microsoft support for Windows Server 2012 and Windows Server 2012 R2 has ended. It's possible to purchase additional support for security updates only through the [Extended Security Update (ESU) program](https://support.microsoft.com/help/4497181/lifecycle-faq-extended-security-updates).
5153

52-
> [!NOTE]
53-
> We recommend taking the most recent KB for your version of Windows.
54+
<sup>3</sup>Microsoft support for Windows 7, Windows 8, and Windows Server 2008 R2 has ended. We strongly recommend migrating off of these operating systems.
5455

5556
## Ensure port 445 is open
5657

@@ -62,13 +63,14 @@ In order to use an Azure file share via the public endpoint outside of the Azure
6263

6364
## Use identity-based authentication
6465

65-
To improve security and access control, you can configure [identity-based authentication](storage-files-active-directory-overview.md) and domain-join your clients. This allows you to use your Active Directory or Microsoft Entra identity to access the file share rather than using a storage account key.
66+
To improve security and access control, configure [identity-based authentication](storage-files-active-directory-overview.md) and domain-join your clients. This allows you to use your Active Directory or Microsoft Entra identity to access the file share rather than using a storage account key.
6667

6768
Before you can mount an Azure file share using identity-based authentication, you must complete the following:
6869

70+
- Configure an identity source for your storage account: either Active Directory Domain Services (AD DS), Microsoft Entra Kerberos, or Microsoft Entra Domain Services.
6971
- [Assign share-level permissions](storage-files-identity-assign-share-level-permissions.md) and [configure directory and file-level permissions](storage-files-identity-configure-file-level-permissions.md). Remember that share-level role assignment can take some time to take effect.
70-
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you first unmount the share and remove the persistent credentials of the storage account key. For instructions on how to remove cached credentials and delete existing SMB connections before initializing a new connection with Active Directory Domain Services (AD DS) or Microsoft Entra credentials, follow the two-step process on the [FAQ](./storage-files-faq.md#identity-based-authentication).
71-
- If your AD source is AD DS or Microsoft Entra Kerberos, your client must have unimpeded network connectivity to your AD DS. If your machine or VM is outside of the network managed by your AD DS, you need to enable VPN to reach AD DS for authentication.
72+
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you first unmount the share and remove the persistent credentials of the storage account key. For instructions on how to remove cached credentials and delete existing SMB connections before initializing a new connection with AD DS or Microsoft Entra credentials, follow [this process](./storage-files-faq.md#identity-based-authentication).
73+
- If your AD source is AD DS or Microsoft Entra Kerberos, hybrid clients must have unimpeded network connectivity to your AD DS. If your machine or VM is outside of the network managed by your AD DS, you need to enable VPN to reach AD DS for authentication.
7274
- Sign in to the client using the credentials of the AD DS or Microsoft Entra identity that you granted permissions to.
7375

7476
If you run into issues, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#unable-to-mount-azure-file-shares-with-ad-credentials).
@@ -82,11 +84,11 @@ To use an Azure file share with Windows, you must either mount it, which means a
8284
8385
## Mount the Azure file share
8486

85-
You can mount an SMB Azure file share on Windows using the Azure portal or Azure PowerShell.
87+
You can mount an SMB Azure file share on Windows by using the Azure portal or Azure PowerShell.
8688

8789
# [Portal](#tab/azure-portal)
8890

89-
To mount an Azure file share using the Azure portal, follow these steps:
91+
To mount an Azure file share by using the Azure portal, follow these steps:
9092

9193
1. Sign in to the [Azure portal](https://portal.azure.com/).
9294
1. Navigate to the storage account that contains the file share you'd like to mount.
@@ -113,7 +115,7 @@ You have now mounted your Azure file share.
113115

114116
# [PowerShell](#tab/azure-powershell)
115117

116-
Run the following PowerShell script to persistently mount the Azure file share from a domain-joined VM and map it to drive `Z:` (or desired mount path) on Windows. The script checks to see if this storage account is accessible via TCP port 445, which is the port SMB uses. Remember to replace the placeholder values with your own values.
118+
Run the following PowerShell script to persistently mount the Azure file share from a domain-joined VM and map it to drive `Z:` (or desired mount path) on Windows. The script checks to see if this storage account is accessible via TCP port 445, which is the port SMB uses. Replace the placeholder values, including brackets, with your own values.
117119

118120
Unless you're using [custom domain names](#mount-file-shares-using-custom-domain-names), you should mount Azure file shares using the suffix `file.core.windows.net`, even if you set up a private endpoint for your share.
119121

@@ -137,17 +139,17 @@ You can also use the `net use` command from a Windows prompt to mount the file s
137139

138140
### Mount the file share from a domain-joined VM
139141

140-
To mount the file share from a domain-joined VM, run the following command from a Windows command prompt. Remember to replace `<YourStorageAccountName>` and `<FileShareName>` with your own values.
142+
To mount the file share from a domain-joined VM, run the following command from a Windows command prompt. Replace the placeholder values, including brackets, with your own values.
141143

142144
```
143145
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName>
144146
```
145147

146148
### Mount the file share from a non-domain-joined VM or a VM joined to a different AD domain
147149

148-
If your AD source is on-premises AD DS, then non-domain-joined VMs or VMs joined to a different AD domain than the storage account can access Azure file shares if they have unimpeded network connectivity to the AD domain controllers and provide explicit credentials. The user accessing the file share must have an identity and credentials in the AD domain that the storage account is joined to.
150+
If the identity source for your storage account is on-premises AD DS, then non-domain-joined VMs or VMs joined to a different AD domain than the storage account can access Azure file shares if they have unimpeded network connectivity to the AD domain controllers and provide explicit credentials. The user accessing the file share must have an identity and credentials in the AD domain that the storage account is joined to.
149151

150-
If your AD source is Microsoft Entra Domain Services, the client must have unimpeded network connectivity to the domain controllers for Microsoft Entra Domain Services, which requires setting up a site-to-site or point-to-site VPN. The user accessing the file share must have an identity (a Microsoft Entra identity synced from Microsoft Entra ID to Microsoft Entra Domain Services) in the Microsoft Entra Domain Services managed domain.
152+
If the identity source for your storage account is Microsoft Entra Domain Services, the client must have unimpeded network connectivity to the domain controllers for Microsoft Entra Domain Services, which requires setting up a site-to-site or point-to-site VPN. The user accessing the file share must have an identity (a Microsoft Entra identity synced from Microsoft Entra ID to Microsoft Entra Domain Services) in the Microsoft Entra Domain Services managed domain.
151153

152154
To mount a file share from a non-domain-joined VM, use the notation **username@domainFQDN**, where **domainFQDN** is the fully qualified domain name, to allow the client to contact the domain controller to request and receive Kerberos tickets. You can get the value of **domainFQDN** by running `(Get-ADDomain).Dnsroot` in Active Directory PowerShell.
153155

@@ -157,7 +159,7 @@ For example:
157159
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<username@domainFQDN>
158160
```
159161

160-
If your AD source is Microsoft Entra Domain services, you can also provide credentials such as **DOMAINNAME\username** where **DOMAINNAME** is the Microsoft Entra Domain Services domain and **username** is the identity's user name in Microsoft Entra Domain Services:
162+
If the identity source for your storage account is Microsoft Entra Domain services, you can also provide credentials such as **DOMAINNAME\username** where **DOMAINNAME** is the Microsoft Entra Domain Services domain and **username** is the identity's user name in Microsoft Entra Domain Services:
161163

162164
```
163165
net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /user:<DOMAINNAME\username>
@@ -200,7 +202,7 @@ You don't need to mount the Azure file share to a drive letter to use it. You ca
200202

201203
`\\storageaccountname.file.core.windows.net\myfileshare`
202204

203-
You'll be asked to sign in with your network credentials. Sign in with the Azure subscription under which you've created the storage account and file share. If you don't get prompted for credentials, you can add the credentials using the following command:
205+
You'll be asked to sign in with your network credentials. Sign in with the Azure subscription under which you've created the storage account and file share. If you aren't prompted for credentials, you can add the credentials using the following command:
204206

205207
`cmdkey /add:StorageAccountName.file.core.windows.net /user:localhost\StorageAccountName /pass:StorageAccountKey`
206208

@@ -210,18 +212,18 @@ For Azure Government Cloud, change the servername to:
210212

211213
## Mount file shares using custom domain names
212214

213-
If you don't want to mount Azure file shares using the suffix `file.core.windows.net`, you can modify the suffix of the storage account name associated with the Azure file share, and then add a canonical name (CNAME) record to route the new suffix to the endpoint of the storage account. The following instructions are for single-forest environments only. To learn how to configure environments that have two or more forests, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
215+
If you don't want to mount Azure file shares using the suffix `file.core.windows.net`, you can modify the suffix of the storage account name associated with the Azure file share, and then add a canonical name (CNAME) record to route the new suffix to the endpoint of the storage account. The following instructions are for single-forest AD environments only. To learn how to configure AD environments that have two or more forests, see [Use Azure Files with multiple Active Directory forests](storage-files-identity-multiple-forests.md).
214216

215217
> [!NOTE]
216218
> Azure Files only supports configuring CNAMES using the storage account name as a domain prefix. If you don't want to use the storage account name as a prefix, consider using [DFS namespaces](files-manage-namespaces.md).
217219
218-
In this example, we have the Active Directory domain *onpremad1.com*, and we have a storage account called *mystorageaccount* which contains SMB Azure file shares. First, we need to modify the SPN suffix of the storage account to map *mystorageaccount.onpremad1.com* to *mystorageaccount.file.core.windows.net*.
220+
In this example, we have the Active Directory domain *onpremad1.com*, and we have a storage account called *mystorageaccount* which contains SMB Azure file shares. First, modify the SPN suffix of the storage account to map *mystorageaccount.onpremad1.com* to *mystorageaccount.file.core.windows.net*.
219221

220222
You can mount the file share with `net use \\mystorageaccount.onpremad1.com` because clients in *onpremad1* know to search *onpremad1.com* to find the proper resource for that storage account.
221223

222224
To use this method, complete the following steps:
223225

224-
1. Make sure you set up identity-based authentication. If your AD source is AD DS or Microsoft Entra Kerberos, make sure you synced your AD user accounts to Microsoft Entra ID.
226+
1. Configure identity-based authentication for your storage account. If you're authenticating hybrid identities, you must sync your AD user accounts to Microsoft Entra ID.
225227

226228
2. Modify the SPN of the storage account using the `setspn` tool. You can find `<DomainDnsRoot>` by running the following Active Directory PowerShell command: `(Get-AdDomain).DnsRoot`
227229

@@ -240,11 +242,11 @@ To use this method, complete the following steps:
240242
1. For the target host FQDN, enter **`<storage-account-name>`.file.core.windows.net**
241243
1. Select **OK**.
242244

243-
You should now be able to mount the file share using *storageaccount.domainname.com*.
245+
You can now mount the file share using *storageaccount.domainname.com*.
244246

245247
## Next steps
246248

247-
See these links for more information about Azure Files:
249+
See the following articles for more information:
248250

249251
- [Planning for an Azure Files deployment](storage-files-planning.md)
250252
- [FAQ](storage-files-faq.md)

0 commit comments

Comments
 (0)