Skip to content

Commit 2d95954

Browse files
authored
Update files-smb-protocol.md
1 parent 98f99b3 commit 2d95954

File tree

1 file changed

+16
-10
lines changed

1 file changed

+16
-10
lines changed

articles/storage/files/files-smb-protocol.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about file shares hosted in Azure Files using the Server Mess
44
author: khdownie
55
ms.service: azure-file-storage
66
ms.topic: conceptual
7-
ms.date: 03/31/2023
7+
ms.date: 09/29/2023
88
ms.author: kendownie
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -158,7 +158,7 @@ Azure Files exposes the following settings:
158158
- **Kerberos ticket encryption**: Which encryption algorithms are allowed. Supported encryption algorithms are AES-256 (recommended) and RC4-HMAC.
159159
- **SMB channel encryption**: Which SMB channel encryption algorithms are allowed. Supported encryption algorithms are AES-256-GCM, AES-128-GCM, and AES-128-CCM.
160160

161-
The SMB security settings can be viewed and changed using the Azure portal, PowerShell, or CLI. Please select the desired tab to see the steps on how to get and set the SMB security settings.
161+
You can view and change the SMB security settings using the Azure portal, PowerShell, or CLI. Select the desired tab to see the steps on how to get and set the SMB security settings.
162162

163163
# [Portal](#tab/azure-portal)
164164
To view or change the SMB security settings using the Azure portal, follow these steps:
@@ -178,7 +178,7 @@ To view or change the SMB security settings using the Azure portal, follow these
178178
After you've entered the desired security settings, select **Save**.
179179

180180
# [PowerShell](#tab/azure-powershell)
181-
To get the SMB protocol settings, use the `Get-AzStorageFileServiceProperty` cmdlet. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment before running these PowerShell commands.
181+
To get the SMB protocol settings, use the `Get-AzStorageFileServiceProperty` cmdlet. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment. If you've deliberately set any of your SMB security settings to null, for example by disabling SMB channel encryption, see the instructions in the script about commenting out certain lines.
182182

183183
```PowerShell
184184
$resourceGroupName = "<resource-group>"
@@ -192,7 +192,10 @@ $storageAccount = Get-AzStorageAccount `
192192
# If you've never changed any SMB security settings, the values for the SMB security
193193
# settings returned by Azure Files will be null. Null returned values should be interpreted
194194
# as "default settings are in effect". To make this more user-friendly, the following
195-
# PowerShell commands replace null values with the human-readable default values.
195+
# PowerShell commands replace null values with the human-readable default values.
196+
# If you've deliberately set any of your SMB security settings to null, for example by
197+
# disabling SMB channel encryption, comment out the following four lines to avoid
198+
# changing the security settings back to defaults.
196199
$smbProtocolVersions = "SMB2.1", "SMB3.0", "SMB3.1.1"
197200
$smbAuthenticationMethods = "NTLMv2", "Kerberos"
198201
$smbKerberosTicketEncryption = "RC4-HMAC", "AES-256"
@@ -261,16 +264,19 @@ Update-AzStorageFileServiceProperty `
261264
```
262265

263266
# [Azure CLI](#tab/azure-cli)
264-
To get the status of the SMB security settings, use the `az storage account file-service-properties show` command. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment before running these Bash commands.
267+
To get the status of the SMB security settings, use the `az storage account file-service-properties show` command. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment before running these Bash commands. If you've deliberately set any of your SMB security settings to null, for example by disabling SMB channel encryption, see the instructions in the script about commenting out certain lines.
265268

266269
```bash
267270
RESOURCE_GROUP_NAME="<resource-group>"
268271
STORAGE_ACCOUNT_NAME="<storage-account>"
269272

270273
# If you've never changed any SMB security settings, the values for the SMB security
271274
# settings returned by Azure Files will be null. Null returned values should be interpreted
272-
# as "default settings are in effect". To make this more user-friendly, the following
273-
# PowerShell commands replace null values with the human-readable default values.
275+
# as "default settings are in effect". To make this more user-friendly, the commands in the
276+
# following two sections replace null values with the human-readable default values.
277+
# If you've deliberately set any of your SMB security settings to null, for example by
278+
# disabling SMB channel encryption, comment out the following two sections before
279+
# running the script to avoid changing the security settings back to defaults.
274280

275281
# Values to be replaced
276282
REPLACESMBPROTOCOLVERSION="\"smbProtocolVersions\": null"
@@ -310,10 +316,10 @@ PROTOCOLSETTINGS="${protocolSettings/$REPLACESMBKERBEROSTICKETENCRYPTION/$DEFAUL
310316
echo $PROTOCOLSETTINGS
311317
```
312318

313-
Depending on your organizations security, performance, and compatibility requirements, you may wish to modify the SMB protocol settings. The following Azure CLI command restricts your SMB file shares to only the most secure options.
319+
Depending on your organization's security, performance, and compatibility requirements, you might wish to modify the SMB protocol settings. The following Azure CLI command restricts your SMB file shares to only the most secure options.
314320

315321
> [!Important]
316-
> Restricting SMB Azure file shares to only the most secure options may result in some clients not being able to connect if they do not meet the requirements. For example, AES-256-GCM was introduced as an option for SMB channel encryption starting in Windows Server 2022 and Windows 11. This means that older clients that do not support AES-256-GCM will not be able to connect.
322+
> Restricting SMB Azure file shares to only the most secure options might result in some clients not being able to connect if they don't meet the requirements. For example, AES-256-GCM was introduced as an option for SMB channel encryption starting in Windows Server 2022 and Windows 11. This means that older clients that don't support AES-256-GCM won't be able to connect.
317323
318324
```azurecli
319325
az storage account file-service-properties update \
@@ -327,7 +333,7 @@ az storage account file-service-properties update \
327333
---
328334

329335
## Limitations
330-
SMB file shares in Azure Files support a subset of features supported by SMB protocol and the NTFS file system. Although most use cases and applications do not require these features, some applications may not work properly with Azure Files if they rely on unsupported features. The following features are not supported:
336+
SMB file shares in Azure Files support a subset of features supported by SMB protocol and the NTFS file system. Although most use cases and applications do not require these features, some applications might not work properly with Azure Files if they rely on unsupported features. The following features aren't supported:
331337

332338
- [SMB Direct](/windows-server/storage/file-server/smb-direct)
333339
- SMB directory leasing

0 commit comments

Comments
 (0)