Skip to content

Commit 28b0084

Browse files
committed
acrolinx
1 parent 2dd2304 commit 28b0084

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/azure-netapp-files/manage-file-access-logs.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,8 @@ File access logs provide file access logging for individual volumes, capturing f
2727

2828
* Once file access logs are enabled on a volume, they can take up to five minutes to become visible.
2929
* File access logs occasionally create duplicate logs that must be manually filtered.
30-
* If you delete any diagnostic settings configured for `ANFFileAccess`, it will cause file access logs for any volumes with that setting to be disabled.
31-
* Before enabling file access logs on a volume, either [ACLs](configure-access-control-lists.md) or Audit ACEs need to be set on a file or directory. ACLs or Audit ACEs must be set after mounting a volume.
30+
* If you delete any diagnostic settings configured for `ANFFileAccess`, it will disable file access logs for any volumes with that setting.
31+
* Before enabling file access logs on a volume, either [ACLs](configure-access-control-lists.md) or Audit ACEs need to be set on a file or directory. You must set ACLs or Audit ACEs after mounting a volume.
3232
* File access logs provide no explicit or implicit expectations or guarantees around logging for auditing and compliance purposes.
3333

3434
## Recognized events
@@ -40,7 +40,7 @@ The events capture in file access logs depend on the protocol your volume uses.
4040
* Create
4141
* Get attributes
4242
* Link
43-
* Nverify
43+
* `Nverify`
4444
* Open
4545
* Open attribute
4646
* Read
@@ -86,15 +86,15 @@ While in preview, file access logs is supported in:
8686

8787
You must set system access control lists (SACLs) for SMB shares or Audit ACEs (for NFSv4.1 shares) for auditing.
8888

89-
After mounting the volume, SACLs (in case of an SMB/CIFS share) or Audit ACEs (in case of an NFSv4 mount) needs to be set on files/directories for auditing of file operations to happen on the volume.
89+
After mounting the volume, SACLs (for an SMB/CIFS share) or Audit ACEs (for an NFSv4.1 mount) needs to be set on files/directories for auditing of file operations to happen on the volume.
9090

9191
### [Set SACLs for SMB shares](#tab/sacls-smb)
9292

9393
There are three ways to set SACLs for access logs.
9494

95-
If you are logging access events on all files and directories within a volume or qtree, set SACLs by applying Storage-Level Access Guard security.
95+
If you're logging access events on all files and directories within a volume, set SACLs by applying Storage-Level Access Guard security.
9696

97-
If you are logging access events on individual files and directories, setting of SACLs with:
97+
If you're logging access events on individual files and directories, setting of SACLs with:
9898
* The Windows Explorer GUI
9999
* The `fsecurity` command
100100

@@ -116,7 +116,7 @@ To enable logging access on individual files and directories, complete the follo
116116

117117
Configure logging for UNIX security style files and directories by adding audit ACEs to NFSv4.1 ACLs to monitoring of certain NFS file and directory access events for security purposes.
118118

119-
For NFSv4.1, both discretionary and system ACEs are stored in the same ACL. They are not stored in separate DACLs and SACLs. Exercise caution when adding audit ACEs to an existing ACL to avoid overwriting and losing an existing ACL. The order in which you add audit ACEs to an existing ACL doesn't matter.
119+
For NFSv4.1, both discretionary and system ACEs are stored in the same ACL, not separate DACLs and SACLs. Exercise caution when adding audit ACEs to an existing ACL to avoid overwriting and losing an existing ACL. The order in which you add audit ACEs to an existing ACL doesn't matter.
120120

121121
For steps, see [Configure access control lists on NFSv4.1 volumes](configure-access-control-lists.md).
122122

0 commit comments

Comments
 (0)