Skip to content

Commit 540d3ba

Browse files
committed
acrolinx pass on windows tsg
1 parent a86b7ea commit 540d3ba

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

articles/storage/files/storage-troubleshoot-windows-file-connection-problems.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ Windows 8, Windows Server 2012, and later versions of each system negotiate requ
3939
### Solution for cause 1
4040

4141
1. Connect from a client that supports SMB encryption (Windows 8/Windows Server 2012 or later).
42-
2. Connect from a virtual machine in the same datacenter as the Azure storage account that is used for the Azure file share.
43-
3. Verify the [Secure transfer required](../common/storage-require-secure-transfer.md) setting is disabled on the storage account if the client does not support SMB encryption.
42+
2. Connect from a virtual machine (VM) in the same datacenter as the Azure storage account that is used for the Azure file share.
43+
3. Verify the [Secure transfer required](../common/storage-require-secure-transfer.md) setting is disabled on the storage account if the client doesn't support SMB encryption.
4444

4545
### Cause 2: Virtual network or firewall rules are enabled on the storage account
4646
Network traffic is denied if virtual network (VNET) and firewall rules are configured on the storage account, unless the client IP address or virtual network is allow-listed.
@@ -51,15 +51,15 @@ Verify that virtual network and firewall rules are configured properly on the st
5151

5252
### Cause 3: Share-level permissions are incorrect when using identity-based authentication
5353

54-
If end-users are accessing the Azure file share using Active Directory (AD) or Azure Active Directory Domain Services (Azure AD DS) authentication, access to the file share fails with "Access is denied" error if share-level permissions are incorrect.
54+
If end users are accessing the Azure file share using Active Directory (AD) or Azure Active Directory Domain Services (Azure AD DS) authentication, access to the file share fails with "Access is denied" error if share-level permissions are incorrect.
5555

5656
### Solution for cause 3
5757

5858
Validate that permissions are configured correctly:
5959

6060
- **Active Directory (AD)** see [Assign share-level permissions to an identity](./storage-files-identity-ad-ds-assign-permissions.md).
6161

62-
Share-level permission assignments are supported for groups and users that have been synced from the Active Directory (AD) to Azure Active Directory (Azure AD) using Azure AD Connect. Confirm that groups and users being assigned share-level permissions are not unsupported "cloud-only" groups.
62+
Share-level permission assignments are supported for groups and users that have been synced from Active Directory Domain Services (AD DS) to Azure Active Directory (Azure AD) using Azure AD Connect. Confirm that groups and users being assigned share-level permissions are not unsupported "cloud-only" groups.
6363
- **Azure Active Directory Domain Services (Azure AD DS)** see [Assign access permissions to an identity](./storage-files-identity-auth-active-directory-domain-service-enable.md?tabs=azure-portal#assign-access-permissions-to-an-identity).
6464

6565
<a id="error53-67-87"></a>
@@ -109,12 +109,12 @@ TcpTestSucceeded : True
109109

110110

111111
> [!Note]
112-
> The above command returns the current IP address of the storage account. This IP address is not guaranteed to remain the same, and may change at any time. Do not hardcode this IP address into any scripts, or into a firewall configuration.
112+
> The above command returns the current IP address of the storage account. This IP address is not guaranteed to remain the same, and may change at any time. Don't hardcode this IP address into any scripts, or into a firewall configuration.
113113
114114
### Solution for cause 1
115115

116116
#### Solution 1 — Use Azure File Sync as a QUIC endpoint
117-
Azure File Sync can be used as a workaround to access Azure Files from clients that have port 445 blocked. Although Azure Files doesn't directly support SMB over QUIC, Windows Server 2022 Azure Edition does support the QUIC protocol. You can create a lightweight cache of your Azure file shares on a Windows Server 2022 Azure Edition VM using Azure File Sync. This uses port 443, which is widely open outbound to support HTTPS, instead of port 445. To learn more about this option, see [SMB over QUIC with Azure File Sync](storage-files-networking-overview.md#smb-over-quic).
117+
You can use Azure File Sync as a workaround to access Azure Files from clients that have port 445 blocked. Although Azure Files doesn't directly support SMB over QUIC, Windows Server 2022 Azure Edition does support the QUIC protocol. You can create a lightweight cache of your Azure file shares on a Windows Server 2022 Azure Edition VM using Azure File Sync. This uses port 443, which is widely open outbound to support HTTPS, instead of port 445. To learn more about this option, see [SMB over QUIC with Azure File Sync](storage-files-networking-overview.md#smb-over-quic).
118118

119119
#### Solution 2 — Use VPN or ExpressRoute
120120
By setting up a VPN or ExpressRoute from on-premises to your Azure storage account, with Azure Files exposed on your internal network using private endpoints, the traffic will go through a secure tunnel as opposed to over the internet. Follow the [instructions to setup VPN](storage-files-configure-p2s-vpn-windows.md) to access Azure Files from Windows.
@@ -129,7 +129,7 @@ Azure Files also supports REST in addition to SMB. REST access works over port 4
129129

130130
System error 53 or system error 87 can occur if NTLMv1 communication is enabled on the client. Azure Files supports only NTLMv2 authentication. Having NTLMv1 enabled creates a less-secure client. Therefore, communication is blocked for Azure Files.
131131

132-
To determine whether this is the cause of the error, verify that the following registry subkey is not set to a value less than 3:
132+
To determine whether this is the cause of the error, verify that the following registry subkey isn't set to a value less than 3:
133133

134134
**HKLM\SYSTEM\CurrentControlSet\Control\Lsa > LmCompatibilityLevel**
135135

@@ -233,7 +233,7 @@ When you open a file from a mounted Azure file share over SMB, your application/
233233
- `ReadWrite`: a combination of both the `Read` and `Write` sharing modes.
234234
- `Delete`: others may delete the file while you have it open.
235235

236-
Although as a stateless protocol, the FileREST protocol does not have a concept of file handles, it does provide a similar mechanism to mediate access to files and folders that your script, application, or service may use: file leases. When a file is leased, it is treated as equivalent to a file handle with a file sharing mode of `None`.
236+
Although as a stateless protocol, the FileREST protocol doesn't have a concept of file handles, it does provide a similar mechanism to mediate access to files and folders that your script, application, or service may use: file leases. When a file is leased, it's treated as equivalent to a file handle with a file sharing mode of `None`.
237237

238238
Although file handles and leases serve an important purpose, sometimes file handles and leases might be orphaned. When this happens, this can cause problems modifying or deleting files. You may see error messages like:
239239

@@ -333,7 +333,7 @@ If you map an Azure file share as an administrator by using net use, the share a
333333

334334
### Cause
335335

336-
By default, Windows File Explorer does not run as an administrator. If you run net use from an administrative command prompt, you map the network drive as an administrator. Because mapped drives are user-centric, the user account that is logged in does not display the drives if they are mounted under a different user account.
336+
By default, Windows File Explorer doesn't run as an administrator. If you run net use from an administrative command prompt, you map the network drive as an administrator. Because mapped drives are user-centric, the user account that is logged in doesn't display the drives if they're mounted under a different user account.
337337

338338
### Solution
339339
Mount the share from a non-administrator command line. Alternatively, you can follow [this TechNet topic](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee844140(v=ws.10)) to configure the **EnableLinkedConnections** registry value.
@@ -405,11 +405,11 @@ Be aware that setting the registry key affects all copy operations that are made
405405

406406
### Cause
407407

408-
This problem can occur if there is no enough cache on client machine for large directories.
408+
This problem can occur if there isn't enough cache on the client machine for large directories.
409409

410410
### Solution
411411

412-
To resolve this problem, adjusting the **DirectoryCacheEntrySizeMax** registry value to allow caching of larger directory listings in the client machine:
412+
To resolve this problem, adjust the **DirectoryCacheEntrySizeMax** registry value to allow caching of larger directory listings in the client machine:
413413

414414
- Location: `HKLM\System\CCS\Services\Lanmanworkstation\Parameters`
415415
- Value name: `DirectoryCacheEntrySizeMax`
@@ -421,7 +421,7 @@ For example, you can set it to `0x100000` and see if the performance improves.
421421

422422
### Cause
423423

424-
Error AadDsTenantNotFound happens when you try to [enable Azure Active Directory Domain Services (Azure AD DS) authentication on Azure Files](storage-files-identity-auth-active-directory-domain-service-enable.md) on a storage account where [Azure AD Domain Service(Azure AD DS)](../../active-directory-domain-services/overview.md) is not created on the Azure AD tenant of the associated subscription.
424+
Error AadDsTenantNotFound happens when you try to [enable Azure Active Directory Domain Services (Azure AD DS) authentication on Azure Files](storage-files-identity-auth-active-directory-domain-service-enable.md) on a storage account where [Azure AD Domain Service(Azure AD DS)](../../active-directory-domain-services/overview.md) isn't created on the Azure AD tenant of the associated subscription.
425425

426426
### Solution
427427

@@ -432,7 +432,7 @@ Enable Azure AD DS on the Azure AD tenant of the subscription that your storage
432432
## Unable to mount Azure Files with AD credentials
433433

434434
### Self diagnostics steps
435-
First, make sure that you have followed through all four steps to [enable Azure Files AD Authentication](./storage-files-identity-auth-active-directory-enable.md).
435+
First, make sure that you've followed through all four steps to [enable Azure Files AD Authentication](./storage-files-identity-auth-active-directory-enable.md).
436436

437437
Second, try [mounting Azure file share with storage account key](./storage-how-to-use-files-windows.md). If the share fails to mount, download [`AzFileDiagnostics`](https://github.com/Azure-Samples/azure-files-samples/tree/master/AzFileDiagnostics/Windows) to help you validate the client running environment, detect the incompatible client configuration which would cause access failure for Azure Files, give prescriptive guidance on self-fix, and collect the diagnostics traces.
438438

@@ -459,8 +459,8 @@ The cmdlet performs these checks below in sequence and provides guidance for fai
459459
### Symptom
460460

461461
You may experience either symptoms described below when trying to configure Windows ACLs with File Explorer on a mounted file share:
462-
- After you click on Edit permission under the Security tab, the Permission wizard does not load.
463-
- When you try to select a new user or group, the domain location does not display the right AD DS domain.
462+
- After you click on Edit permission under the Security tab, the Permission wizard doesn't load.
463+
- When you try to select a new user or group, the domain location doesn't display the right AD DS domain.
464464

465465
### Solution
466466

@@ -474,11 +474,11 @@ This error may occur if a domain controller that holds the RID Master FSMO role
474474

475475
### Error: "Cannot bind positional parameters because no names were given"
476476

477-
This error is most likely triggered by a syntax error in the Join-AzStorageAccountforAuth command. Check the command for misspellings or syntax errors and verify that the latest version of the AzFilesHybrid module (https://github.com/Azure-Samples/azure-files-samples/releases) is installed.
477+
This error is most likely triggered by a syntax error in the `Join-AzStorageAccountforAuth` command. Check the command for misspellings or syntax errors and verify that the latest version of the AzFilesHybrid module (https://github.com/Azure-Samples/azure-files-samples/releases) is installed.
478478

479479
## Azure Files on-premises AD DS Authentication support for AES-256 Kerberos encryption
480480

481-
Azure Files supports AES-256 Kerberos encryption for AD DS authentication beginning with the AzFilesHybrid module v0.2.2. AES-256 is the recommended authentication method. If you've enabled AD DS authentication with a module version lower than v0.2.2, you'll need to [download the latest AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases) and run the PowerShell below. If you have not enabled AD DS authentication on your storage account yet, follow this [guidance](./storage-files-identity-ad-ds-enable.md#option-one-recommended-use-azfileshybrid-powershell-module) for enablement.
481+
Azure Files supports AES-256 Kerberos encryption for AD DS authentication beginning with the AzFilesHybrid module v0.2.2. AES-256 is the recommended authentication method. If you've enabled AD DS authentication with a module version lower than v0.2.2, you'll need to [download the latest AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases) and run the PowerShell below. If you haven't enabled AD DS authentication on your storage account yet, follow this [guidance](./storage-files-identity-ad-ds-enable.md#option-one-recommended-use-azfileshybrid-powershell-module) for enablement.
482482

483483
```PowerShell
484484
$ResourceGroupName = "<resource-group-name-here>"
@@ -501,7 +501,7 @@ Navigate to the desired storage account in the Azure portal. In the table of con
501501
![A screenshot of the access key pane](./media/storage-troubleshoot-windows-file-connection-problems/access-keys-1.png)
502502

503503
# [PowerShell](#tab/azure-powershell)
504-
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you will need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
504+
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you'll need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
505505

506506
```PowerShell
507507
$resourceGroupName = "<resource-group>"
@@ -521,7 +521,7 @@ New-AzStorageAccountKey `
521521
```
522522

523523
# [Azure CLI](#tab/azure-cli)
524-
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you will need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
524+
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you'll need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
525525

526526
```bash
527527
resourceGroupName="<resource-group>"

0 commit comments

Comments
 (0)