You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-how-to-use-files-windows.md
+29-29Lines changed: 29 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to mount an SMB Azure file share on Windows and Windows S
4
4
author: khdownie
5
5
ms.service: azure-file-storage
6
6
ms.topic: how-to
7
-
ms.date: 10/16/2025
7
+
ms.date: 04/03/2026
8
8
ms.author: kendownie
9
9
ms.custom:
10
10
- sfi-image-nochange
@@ -49,38 +49,38 @@ The following table shows Windows support for SMB version, SMB Multichannel<sup>
49
49
50
50
<sup>1</sup>Azure Files supports [SMB Multichannel](files-smb-protocol.md#smb-multichannel) on SSD file shares only.
51
51
52
-
<sup>2</sup>Regular Microsoft support for Windows Server 2012 and Windows Server 2012 R2 has ended. It's possible to purchase additional support for security updates only through the [Extended Security Update (ESU) program](https://support.microsoft.com/help/4497181/lifecycle-faq-extended-security-updates).
52
+
<sup>2</sup>Regular Microsoft support for Windows Server 2012 and Windows Server 2012 R2 has ended. You can purchase additional support for security updates only through the [Extended Security Update (ESU) program](https://support.microsoft.com/help/4497181/lifecycle-faq-extended-security-updates).
53
53
54
54
<sup>3</sup>Microsoft support for Windows 7, Windows 8, and Windows Server 2008 R2 has ended. We strongly recommend migrating off of these operating systems.
55
55
56
56
## Ensure port 445 is open
57
57
58
-
The SMB protocol requires TCP port 445 to be open. Connections will fail if port 445 is blocked. You can check if your firewall or ISP is blocking port 445 by using the `Test-NetConnection` PowerShell cmdlet. For more information, see [Port 445 is blocked](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-connectivity?toc=/azure/storage/files/toc.json#cause-1-port-445-is-blocked).
58
+
The SMB protocol requires TCP port 445 to be open. Connections fail if port 445 is blocked. To check if your firewall or ISP is blocking port 445, use the `Test-NetConnection` PowerShell cmdlet. For more information, see [Port 445 is blocked](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-connectivity?toc=/azure/storage/files/toc.json#cause-1-port-445-is-blocked).
59
59
60
-
If you want to mount your Azure file share over SMB from outside of Azure without opening up port 445, you can [use a point-to-site VPN](storage-files-configure-p2s-vpn-windows.md).
60
+
If you want to mount your Azure file share over SMB from outside of Azure without opening port 445, you can [use a point-to-site VPN](storage-files-configure-p2s-vpn-windows.md).
61
61
62
-
In order to use an Azure file share via the public endpoint outside of the Azure region it's hosted in, such as on-premises or in a different Azure region, the OS must support SMB 3.x. Older versions of Windows that support only SMB 2.1 can't mount Azure file shares via the public endpoint.
62
+
To use an Azure file share via the public endpoint outside of the Azure region it's hosted in, such as on-premises or in a different Azure region, the OS must support SMB 3.x. Older versions of Windows that support only SMB 2.1 can't mount Azure file shares via the public endpoint.
63
63
64
64
## Use identity-based authentication
65
65
66
-
To improve security and access control, configure [identity-based authentication](storage-files-active-directory-overview.md) and domain-join your clients. This allows you to use your Active Directory or Microsoft Entra identity to access the file share rather than using a storage account key.
66
+
To improve security and access control, configure [identity-based authentication](storage-files-active-directory-overview.md) and domain-join your clients. This authentication method allows you to use your Active Directory or Microsoft Entra identity to access the file share rather than using a storage account key.
67
67
68
-
Before you can mount an Azure file share using identity-based authentication, you must complete the following:
68
+
Before you can mount an Azure file share using identity-based authentication, complete the following steps:
69
69
70
70
- Configure an identity source for your storage account: either Active Directory Domain Services (AD DS), Microsoft Entra Kerberos, or Microsoft Entra Domain Services.
71
71
-[Assign share-level permissions](storage-files-identity-assign-share-level-permissions.md) and [configure directory and file-level permissions](storage-files-identity-configure-file-level-permissions.md). Remember that share-level role assignment can take some time to take effect.
72
-
- If you're mounting the file share from a client that has previously connected to the file share using your storage account key, make sure that you first unmount the share and remove the persistent credentials of the storage account key. For instructions on how to remove cached credentials and delete existing SMB connections before initializing a new connection with AD DS or Microsoft Entra credentials, follow[this process](./storage-files-faq.md#identity-based-authentication).
73
-
- If your AD source is AD DS or Microsoft Entra Kerberos, hybrid clients must have unimpeded network connectivity to your AD DS. If your machine or VM is outside of the network managed by your AD DS, you need to enable VPN to reach AD DS for authentication.
74
-
- Sign in to the client using the credentials of the AD DS or Microsoft Entra identity that you granted permissions to.
72
+
- If you're mounting the file share from a client that previously connected to the file share by using your storage account key, make sure that you first unmount the share and remove the persistent credentials of the storage account key. For instructions on how to remove cached credentials and delete existing SMB connections before initializing a new connection with AD DS or Microsoft Entra credentials, see[this process](./storage-files-faq.md#identity-based-authentication).
73
+
- If your identity source is AD DS or Microsoft Entra Kerberos, hybrid clients must have unimpeded network connectivity to your Active Directory. If your machine or VM is outside of the network managed by your Active Directory, you need to enable VPN to reach Active Directory for authentication.
74
+
- Sign in to the client by using the credentials of the Active Directory or Entra identity that you granted permissions to.
75
75
76
-
If you run into issues, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#unable-to-mount-azure-file-shares-with-ad-credentials).
76
+
If you run into problems, see [Unable to mount Azure file shares with AD credentials](/troubleshoot/azure/azure-storage/files-troubleshoot-smb-authentication?toc=/azure/storage/files/toc.json#unable-to-mount-azure-file-shares-with-ad-credentials).
77
77
78
78
## Use an Azure file share with Windows
79
79
80
80
To use an Azure file share with Windows, you must either mount it, which means assigning it a drive letter or mount point path, or [access it via its UNC path](#access-an-azure-file-share-via-its-unc-path). Shared access signature (SAS) tokens aren't currently supported for mounting Azure file shares.
81
81
82
82
> [!NOTE]
83
-
> A common pattern for lifting and shifting line-of-business (LOB) applications that expect an SMB file share to Azure is to use an Azure file share as an alternative for running a dedicated Windows file server in an Azure virtual machine (VM). One important consideration for successfully migrating an LOB application to use an Azure file share is that many applications run under the context of a dedicated service account with limited system permissions rather than the VM's administrative account. Therefore, you must ensure that you mount/save the credentials for the Azure file share from the context of the service account rather than your administrative account.
83
+
> A common pattern for lifting and shifting line-of-business (LOB) applications that expect an SMB file share to Azure is to use an Azure file share as an alternative for running a dedicated Windows file server in an Azure virtual machine (VM). One important consideration for successfully migrating an LOB application to use an Azure file share is that many applications run under the context of a dedicated service account with limited system permissions rather than the VM's administrative account. Therefore, you must ensure that you mount and save the credentials for the Azure file share from the context of the service account rather than your administrative account.
84
84
85
85
## Mount the Azure file share
86
86
@@ -91,9 +91,9 @@ You can mount an SMB Azure file share on Windows by using the Azure portal or Az
91
91
To mount an Azure file share by using the Azure portal, follow these steps:
92
92
93
93
1. Sign in to the [Azure portal](https://portal.azure.com/).
94
-
1.Navigate to the storage account that contains the file share you'd like to mount.
94
+
1.Go to the storage account that contains the file share you want to mount.
95
95
1. Select **File shares**.
96
-
1. Select the file share you'd like to mount.
96
+
1. Select the file share you want to mount.
97
97
98
98
:::image type="content" source="media/storage-how-to-use-files-windows/select-file-shares.png" alt-text="Screenshot of file shares blade, file share is highlighted." lightbox="media/storage-how-to-use-files-windows/select-file-shares.png":::
99
99
@@ -103,21 +103,21 @@ To mount an Azure file share by using the Azure portal, follow these steps:
103
103
104
104
1. Select the drive letter to mount the share to.
105
105
106
-
1. Under **Authentication method**, select *Active Directory or Microsoft Entra*. If you see a message that identity-based authentication isn't configured for your storage account, then configure it based on one of the methods described in [identity-based authentication overview](storage-files-active-directory-overview.md), and try mounting the share again.
106
+
1. Under **Authentication method**, select *Active Directory or Microsoft Entra*. If you see a message that identity-based authentication isn't configured for your storage account, configure it by using one of the methods described in [identity-based authentication overview](storage-files-active-directory-overview.md), and try mounting the share again.
107
107
108
108
1. Select **Show script** and then copy the provided script.
109
109
110
110
:::image type="content" source="media/storage-how-to-use-files-windows/files-portal-mount-script.png" alt-text="Screenshot of connect blade, copy button on script is highlighted.":::
111
111
112
-
1. Paste the script into a shell on the host you'd like to mount the file share to, and run it.
112
+
1. Paste the script into a shell on the host where you want to mount the file share, and run it.
113
113
114
114
You have now mounted your Azure file share.
115
115
116
116
# [PowerShell](#tab/azure-powershell)
117
117
118
118
Run the following PowerShell script to persistently mount the Azure file share from a domain-joined VM and map it to drive `Z:` (or desired mount path) on Windows. The script checks to see if this storage account is accessible via TCP port 445, which is the port SMB uses. Replace the placeholder values, including brackets, with your own values.
119
119
120
-
Unless you're using [custom domain names](#mount-file-shares-using-custom-domain-names), you should mount Azure file shares using the suffix `file.core.windows.net`, even if you set up a private endpoint for your share.
120
+
Unless you're using [custom domain names](#mount-file-shares-using-custom-domain-names), mount Azure file shares by using the suffix `file.core.windows.net`, even if you set up a private endpoint for your share.
@@ -167,15 +167,15 @@ net use Z: \\<YourStorageAccountName>.file.core.windows.net\<FileShareName> /use
167
167
168
168
## Mount the Azure file share using the storage account key (not recommended)
169
169
170
-
The Azure portal provides a PowerShell script that you can use to mount your file share directly to a host using the storage account key. However, we recommend using identity-based authentication instead of the storage account key for security reasons. If you must use the storage account key, follow the [mount instructions](#mount-the-azure-file-share), but under **Authentication method**, select *Storage account key*.
170
+
The Azure portal provides a PowerShell script that you can use to mount your file share directly to a host using the storage account key. However, use identity-based authentication instead of the storage account key for security reasons. If you must use the storage account key, follow the [mount instructions](#mount-the-azure-file-share), but under **Authentication method**, select *Storage account key*.
171
171
172
172
A storage account key is an administrator key for a storage account, including administrator permissions to all files and folders within the file share you're accessing, and for all file shares and other storage resources (blobs, queues, tables, etc.) contained within your storage account. You can find your storage account key in the [Azure portal](https://portal.azure.com/) by navigating to the storage account and selecting **Security + networking** > **Access keys**, or you can use the `Get-AzStorageAccountKey` PowerShell cmdlet.
173
173
174
174
### Mount the Azure file share with File Explorer
175
175
176
176
1. Open File Explorer by opening it from the Start Menu, or by pressing the Win+E shortcut.
177
177
178
-
1.Navigate to **This PC** on the left-hand side of the window. This will change the menus available in the ribbon. Under the Computer menu, select **Map network drive**.
178
+
1.Go to **This PC** on the left side of the window. This action changes the menus available in the ribbon. Under the **Computer** menu, select **Map network drive**.
179
179
180
180
:::image type="content" source="media/storage-how-to-use-files-windows/1_MountOnWindows10.png" alt-text="Screenshot of the Map network drive drop-down menu.":::
181
181
@@ -198,15 +198,15 @@ A storage account key is an administrator key for a storage account, including a
198
198
199
199
### Access an Azure file share via its UNC path
200
200
201
-
You don't need to mount the Azure file share to a drive letter to use it. You can directly access your Azure file share using the [UNC path](/windows/win32/fileio/naming-a-file) by entering the following into File Explorer. Be sure to replace *storageaccountname* with your storage account name and *myfileshare* with your file share name:
201
+
You don't need to mount the Azure file share to a drive letter to use it. You can directly access your Azure file share by using the [UNC path](/windows/win32/fileio/naming-a-file). Enter the following path into File Explorer, and be sure to replace *storageaccountname* with your storage account name and *myfileshare* with your file share name:
You'll be asked to sign in with your network credentials. Sign in with the Azure subscription under which you've created the storage account and file share. If you aren't prompted for credentials, you can add the credentials using the following command:
205
+
You're prompted to sign in by using your network credentials. Sign in by using the Azure subscription under which you created the storage account and file share. If you're not prompted for credentials, add the credentials by using the following command:
@@ -218,23 +218,23 @@ If you don't want to mount Azure file shares using the suffix `file.core.windows
218
218
> If you use custom domain names with Active Directory Domain Services (AD DS), be sure to [upgrade the Kerberos encryption type](storage-files-identity-ad-ds-enable.md#enable-aes-256-encryption-recommended) for your storage account to AES-256.
219
219
220
220
> [!NOTE]
221
-
> Azure Files only supports configuring CNAMES using the storage account name as a domain prefix. If you don't want to use the storage account name as a prefix, consider using [DFS namespaces](files-manage-namespaces.md).
221
+
> Azure Files only supports configuring CNAMEs by using the storage account name as a domain prefix. If you don't want to use the storage account name as a prefix, consider using [DFS namespaces](files-manage-namespaces.md).
222
222
223
-
In this example, we have the Active Directory domain *onpremad1.com*, and we have a storage account called *mystorageaccount* which contains SMB Azure file shares. First, modify the SPN suffix of the storage account to map *mystorageaccount.onpremad1.com* to *mystorageaccount.file.core.windows.net*.
223
+
In this example, you have the Active Directory domain *onpremad1.com*, and you have a storage account called *mystorageaccount* which contains SMB Azure file shares. First, modify the SPN suffix of the storage account to map *mystorageaccount.onpremad1.com* to *mystorageaccount.file.core.windows.net*.
224
224
225
-
You can mount the file share with`net use \\mystorageaccount.onpremad1.com` because clients in *onpremad1* know to search *onpremad1.com* to find the proper resource for that storage account.
225
+
You can mount the file share by using`net use \\mystorageaccount.onpremad1.com` because clients in *onpremad1* know to search *onpremad1.com* to find the proper resource for that storage account.
226
226
227
227
To use this method, complete the following steps:
228
228
229
229
1. Configure identity-based authentication for your storage account. If you're authenticating hybrid identities, you must sync your AD user accounts to Microsoft Entra ID.
230
230
231
-
2. Modify the SPN of the storage account using the `setspn` tool. You can find `<DomainDnsRoot>` by running the following Active Directory PowerShell command: `(Get-AdDomain).DnsRoot`
231
+
1. Modify the SPN of the storage account by using the `setspn` tool. You can find `<DomainDnsRoot>` by running the following Active Directory PowerShell command: `(Get-AdDomain).DnsRoot`
3. Add a CNAME entry using Active Directory DNS Manager. If you're using a private endpoint, add the CNAME entry to map to the private endpoint name.
237
+
1. Add a CNAME entry by using Active Directory DNS Manager. If you're using a private endpoint, add the CNAME entry to map to the private endpoint name.
238
238
239
239
1. Open Active Directory DNS Manager.
240
240
1. Go to your domain (for example, **onpremad1.com**).
@@ -245,11 +245,11 @@ To use this method, complete the following steps:
245
245
1. For the target host FQDN, enter **`<storage-account-name>`.file.core.windows.net**
246
246
1. Select **OK**.
247
247
248
-
You can now mount the file share using *storageaccount.domainname.com*.
248
+
You can now mount the file share by using *storageaccount.domainname.com*.
249
249
250
250
## Next steps
251
251
252
-
See the following articles for more information:
252
+
For more information, see the following articles:
253
253
254
254
-[Planning for an Azure Files deployment](storage-files-planning.md)
0 commit comments