You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/files-smb-protocol.md
+16-10Lines changed: 16 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about file shares hosted in Azure Files using the Server Mess
4
4
author: khdownie
5
5
ms.service: azure-file-storage
6
6
ms.topic: conceptual
7
-
ms.date: 03/31/2023
7
+
ms.date: 09/29/2023
8
8
ms.author: kendownie
9
9
ms.custom: devx-track-azurepowershell
10
10
---
@@ -158,7 +158,7 @@ Azure Files exposes the following settings:
158
158
-**Kerberos ticket encryption**: Which encryption algorithms are allowed. Supported encryption algorithms are AES-256 (recommended) and RC4-HMAC.
159
159
-**SMB channel encryption**: Which SMB channel encryption algorithms are allowed. Supported encryption algorithms are AES-256-GCM, AES-128-GCM, and AES-128-CCM.
160
160
161
-
The SMB security settings can be viewed and changed using the Azure portal, PowerShell, or CLI. Please select the desired tab to see the steps on how to get and set the SMB security settings.
161
+
You can view and change the SMB security settings using the Azure portal, PowerShell, or CLI. Select the desired tab to see the steps on how to get and set the SMB security settings.
162
162
163
163
# [Portal](#tab/azure-portal)
164
164
To view or change the SMB security settings using the Azure portal, follow these steps:
@@ -178,7 +178,7 @@ To view or change the SMB security settings using the Azure portal, follow these
178
178
After you've entered the desired security settings, select **Save**.
179
179
180
180
# [PowerShell](#tab/azure-powershell)
181
-
To get the SMB protocol settings, use the `Get-AzStorageFileServiceProperty` cmdlet. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment before running these PowerShell commands.
181
+
To get the SMB protocol settings, use the `Get-AzStorageFileServiceProperty` cmdlet. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment. If you've deliberately set any of your SMB security settings to null, for example by disabling SMB channel encryption, see the instructions in the script about commenting out certain lines.
To get the status of the SMB security settings, use the `az storage account file-service-properties show` command. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment before running these Bash commands.
267
+
To get the status of the SMB security settings, use the `az storage account file-service-properties show` command. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment before running these Bash commands. If you've deliberately set any of your SMB security settings to null, for example by disabling SMB channel encryption, see the instructions in the script about commenting out certain lines.
265
268
266
269
```bash
267
270
RESOURCE_GROUP_NAME="<resource-group>"
268
271
STORAGE_ACCOUNT_NAME="<storage-account>"
269
272
270
273
# If you've never changed any SMB security settings, the values for the SMB security
271
274
# settings returned by Azure Files will be null. Null returned values should be interpreted
272
-
# as "default settings are in effect". To make this more user-friendly, the following
273
-
# PowerShell commands replace null values with the human-readable default values.
275
+
# as "default settings are in effect". To make this more user-friendly, the commands in the
276
+
# following two sections replace null values with the human-readable default values.
277
+
# If you've deliberately set any of your SMB security settings to null, for example by
278
+
# disabling SMB channel encryption, comment out the following two sections before
279
+
# running the script to avoid changing the security settings back to defaults.
Depending on your organizations security, performance, and compatibility requirements, you may wish to modify the SMB protocol settings. The following Azure CLI command restricts your SMB file shares to only the most secure options.
319
+
Depending on your organization's security, performance, and compatibility requirements, you might wish to modify the SMB protocol settings. The following Azure CLI command restricts your SMB file shares to only the most secure options.
314
320
315
321
> [!Important]
316
-
> Restricting SMB Azure file shares to only the most secure options may result in some clients not being able to connect if they do not meet the requirements. For example, AES-256-GCM was introduced as an option for SMB channel encryption starting in Windows Server 2022 and Windows 11. This means that older clients that do not support AES-256-GCM will not be able to connect.
322
+
> Restricting SMB Azure file shares to only the most secure options might result in some clients not being able to connect if they don't meet the requirements. For example, AES-256-GCM was introduced as an option for SMB channel encryption starting in Windows Server 2022 and Windows 11. This means that older clients that don't support AES-256-GCM won't be able to connect.
317
323
318
324
```azurecli
319
325
az storage account file-service-properties update \
@@ -327,7 +333,7 @@ az storage account file-service-properties update \
327
333
---
328
334
329
335
## Limitations
330
-
SMB file shares in Azure Files support a subset of features supported by SMB protocol and the NTFS file system. Although most use cases and applications do not require these features, some applications may not work properly with Azure Files if they rely on unsupported features. The following features are not supported:
336
+
SMB file shares in Azure Files support a subset of features supported by SMB protocol and the NTFS file system. Although most use cases and applications do not require these features, some applications might not work properly with Azure Files if they rely on unsupported features. The following features aren't supported:
0 commit comments