You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-create-volumes-smb.md
+14-5Lines changed: 14 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: storage
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: conceptual
16
-
ms.date: 04/30/2020
16
+
ms.date: 05/19/2020
17
17
ms.author: b-juche
18
18
---
19
19
# Create an SMB volume for Azure NetApp Files
@@ -53,7 +53,7 @@ A subnet must be delegated to Azure NetApp Files.
53
53
| SAM/LSA | 445 | UDP |
54
54
| w32time | 123 | UDP |
55
55
56
-
* The site topology for the targeted Active Directory Domain Services must adhere to best practices, in particular the Azure VNet where Azure NetApp Files is deployed.
56
+
* The site topology for the targeted Active Directory Domain Services must adhere to the guidelines, in particular the Azure VNet where Azure NetApp Files is deployed.
57
57
58
58
The address space for the virtual network where Azure NetApp Files is deployed must be added to a new or existing Active Directory site (where a domain controller reachable by Azure NetApp Files is).
59
59
@@ -74,7 +74,7 @@ A subnet must be delegated to Azure NetApp Files.
74
74
75
75
For example, if your Active Directory has only the AES-128 capability, you must enable the AES-128 account option for the user credentials. If your Active Directory has the AES-256 capability, you must enable the AES-256 account option (which also supports AES-128). If your Active Directory does not have any Kerberos encryption capability, Azure NetApp Files uses DES by default.
76
76
77
-
You can enable the account options in the properties of the Active Directory Users and Computers MMC console:
77
+
You can enable the account options in the properties of the Active Directory Users and Computers Microsoft Management Console (MMC):
78
78
79
79

80
80
-->
@@ -93,7 +93,7 @@ You can use your preferred [Active Directory Sites and Services](https://docs.mi
93
93
94
94
To find your site name when you use ADDS, you can contact the administrative group in your organization that is responsible for Active Directory Domain Services. The example below shows the Active Directory Sites and Services plugin where the site name is displayed:
95
95
96
-

96
+

97
97
98
98
When you configure an AD connection for Azure NetApp Files, you specify the site name in scope for the **AD Site Name** field.
99
99
@@ -147,11 +147,20 @@ This setting is configured in the **Active Directory Connections** under **NetAp
147
147
148
148
The service will create additional machine accounts in Active Directory as needed.
149
149
150
+
> [!IMPORTANT]
151
+
> Renaming the SMB server prefix after you create the Active Directory connection is disruptive. You will need to re-mount existing SMB shares after renaming the SMB server prefix.
152
+
150
153
***Organizational unit path**
151
154
This is the LDAP path for the organizational unit (OU) where SMB server machine accounts will be created. That is, OU=second level, OU=first level.
152
155
153
156
If you are using Azure NetApp Files with Azure Active Directory Domain Services, the organizational unit path is `OU=AADDC Computers` when you configure Active Directory for your NetApp account.
154
-
157
+
158
+
***Backup policy users**
159
+
You can include additional accounts that require elevated privileges to the computer account created for use with Azure NetApp Files. The specified accounts will be allowed to change the NTFS permissions at the file or folder level. For example, you can specify a non-privileged service account used for migrating data to an SMB file share in Azure NetApp Files.
160
+
161
+
> [!IMPORTANT]
162
+
> Using the backup policy user feature requires whitelisting. Email [email protected] with your subscription ID to request this feature.
163
+
155
164
* Credentials, including your **username** and **password**
156
165
157
166

0 commit comments