You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/storage-troubleshoot-windows-file-connection-problems.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,8 +39,8 @@ Windows 8, Windows Server 2012, and later versions of each system negotiate requ
39
39
### Solution for cause 1
40
40
41
41
1. Connect from a client that supports SMB encryption (Windows 8/Windows Server 2012 or later).
42
-
2. Connect from a virtual machine in the same datacenter as the Azure storage account that is used for the Azure file share.
43
-
3. Verify the [Secure transfer required](../common/storage-require-secure-transfer.md) setting is disabled on the storage account if the client does not support SMB encryption.
42
+
2. Connect from a virtual machine (VM) in the same datacenter as the Azure storage account that is used for the Azure file share.
43
+
3. Verify the [Secure transfer required](../common/storage-require-secure-transfer.md) setting is disabled on the storage account if the client doesn't support SMB encryption.
44
44
45
45
### Cause 2: Virtual network or firewall rules are enabled on the storage account
46
46
Network traffic is denied if virtual network (VNET) and firewall rules are configured on the storage account, unless the client IP address or virtual network is allow-listed.
@@ -51,15 +51,15 @@ Verify that virtual network and firewall rules are configured properly on the st
51
51
52
52
### Cause 3: Share-level permissions are incorrect when using identity-based authentication
53
53
54
-
If end-users are accessing the Azure file share using Active Directory (AD) or Azure Active Directory Domain Services (Azure AD DS) authentication, access to the file share fails with "Access is denied" error if share-level permissions are incorrect.
54
+
If endusers are accessing the Azure file share using Active Directory (AD) or Azure Active Directory Domain Services (Azure AD DS) authentication, access to the file share fails with "Access is denied" error if share-level permissions are incorrect.
55
55
56
56
### Solution for cause 3
57
57
58
58
Validate that permissions are configured correctly:
59
59
60
60
-**Active Directory (AD)** see [Assign share-level permissions to an identity](./storage-files-identity-ad-ds-assign-permissions.md).
61
61
62
-
Share-level permission assignments are supported for groups and users that have been synced from the Active Directory (AD) to Azure Active Directory (Azure AD) using Azure AD Connect. Confirm that groups and users being assigned share-level permissions are not unsupported "cloud-only" groups.
62
+
Share-level permission assignments are supported for groups and users that have been synced from Active Directory Domain Services (AD DS) to Azure Active Directory (Azure AD) using Azure AD Connect. Confirm that groups and users being assigned share-level permissions are not unsupported "cloud-only" groups.
63
63
-**Azure Active Directory Domain Services (Azure AD DS)** see [Assign access permissions to an identity](./storage-files-identity-auth-active-directory-domain-service-enable.md?tabs=azure-portal#assign-access-permissions-to-an-identity).
64
64
65
65
<aid="error53-67-87"></a>
@@ -109,12 +109,12 @@ TcpTestSucceeded : True
109
109
110
110
111
111
> [!Note]
112
-
> The above command returns the current IP address of the storage account. This IP address is not guaranteed to remain the same, and may change at any time. Do not hardcode this IP address into any scripts, or into a firewall configuration.
112
+
> The above command returns the current IP address of the storage account. This IP address is not guaranteed to remain the same, and may change at any time. Don't hardcode this IP address into any scripts, or into a firewall configuration.
113
113
114
114
### Solution for cause 1
115
115
116
116
#### Solution 1 — Use Azure File Sync as a QUIC endpoint
117
-
Azure File Sync can be used as a workaround to access Azure Files from clients that have port 445 blocked. Although Azure Files doesn't directly support SMB over QUIC, Windows Server 2022 Azure Edition does support the QUIC protocol. You can create a lightweight cache of your Azure file shares on a Windows Server 2022 Azure Edition VM using Azure File Sync. This uses port 443, which is widely open outbound to support HTTPS, instead of port 445. To learn more about this option, see [SMB over QUIC with Azure File Sync](storage-files-networking-overview.md#smb-over-quic).
117
+
You can use Azure File Sync as a workaround to access Azure Files from clients that have port 445 blocked. Although Azure Files doesn't directly support SMB over QUIC, Windows Server 2022 Azure Edition does support the QUIC protocol. You can create a lightweight cache of your Azure file shares on a Windows Server 2022 Azure Edition VM using Azure File Sync. This uses port 443, which is widely open outbound to support HTTPS, instead of port 445. To learn more about this option, see [SMB over QUIC with Azure File Sync](storage-files-networking-overview.md#smb-over-quic).
118
118
119
119
#### Solution 2 — Use VPN or ExpressRoute
120
120
By setting up a VPN or ExpressRoute from on-premises to your Azure storage account, with Azure Files exposed on your internal network using private endpoints, the traffic will go through a secure tunnel as opposed to over the internet. Follow the [instructions to setup VPN](storage-files-configure-p2s-vpn-windows.md) to access Azure Files from Windows.
@@ -129,7 +129,7 @@ Azure Files also supports REST in addition to SMB. REST access works over port 4
129
129
130
130
System error 53 or system error 87 can occur if NTLMv1 communication is enabled on the client. Azure Files supports only NTLMv2 authentication. Having NTLMv1 enabled creates a less-secure client. Therefore, communication is blocked for Azure Files.
131
131
132
-
To determine whether this is the cause of the error, verify that the following registry subkey is not set to a value less than 3:
132
+
To determine whether this is the cause of the error, verify that the following registry subkey isn't set to a value less than 3:
@@ -233,7 +233,7 @@ When you open a file from a mounted Azure file share over SMB, your application/
233
233
-`ReadWrite`: a combination of both the `Read` and `Write` sharing modes.
234
234
-`Delete`: others may delete the file while you have it open.
235
235
236
-
Although as a stateless protocol, the FileREST protocol does not have a concept of file handles, it does provide a similar mechanism to mediate access to files and folders that your script, application, or service may use: file leases. When a file is leased, it is treated as equivalent to a file handle with a file sharing mode of `None`.
236
+
Although as a stateless protocol, the FileREST protocol doesn't have a concept of file handles, it does provide a similar mechanism to mediate access to files and folders that your script, application, or service may use: file leases. When a file is leased, it's treated as equivalent to a file handle with a file sharing mode of `None`.
237
237
238
238
Although file handles and leases serve an important purpose, sometimes file handles and leases might be orphaned. When this happens, this can cause problems modifying or deleting files. You may see error messages like:
239
239
@@ -333,7 +333,7 @@ If you map an Azure file share as an administrator by using net use, the share a
333
333
334
334
### Cause
335
335
336
-
By default, Windows File Explorer does not run as an administrator. If you run net use from an administrative command prompt, you map the network drive as an administrator. Because mapped drives are user-centric, the user account that is logged in does not display the drives if they are mounted under a different user account.
336
+
By default, Windows File Explorer doesn't run as an administrator. If you run net use from an administrative command prompt, you map the network drive as an administrator. Because mapped drives are user-centric, the user account that is logged in doesn't display the drives if they're mounted under a different user account.
337
337
338
338
### Solution
339
339
Mount the share from a non-administrator command line. Alternatively, you can follow [this TechNet topic](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ee844140(v=ws.10)) to configure the **EnableLinkedConnections** registry value.
@@ -405,11 +405,11 @@ Be aware that setting the registry key affects all copy operations that are made
405
405
406
406
### Cause
407
407
408
-
This problem can occur if there is no enough cache on client machine for large directories.
408
+
This problem can occur if there isn't enough cache on the client machine for large directories.
409
409
410
410
### Solution
411
411
412
-
To resolve this problem, adjusting the **DirectoryCacheEntrySizeMax** registry value to allow caching of larger directory listings in the client machine:
412
+
To resolve this problem, adjust the **DirectoryCacheEntrySizeMax** registry value to allow caching of larger directory listings in the client machine:
@@ -421,7 +421,7 @@ For example, you can set it to `0x100000` and see if the performance improves.
421
421
422
422
### Cause
423
423
424
-
Error AadDsTenantNotFound happens when you try to [enable Azure Active Directory Domain Services (Azure AD DS) authentication on Azure Files](storage-files-identity-auth-active-directory-domain-service-enable.md) on a storage account where [Azure AD Domain Service(Azure AD DS)](../../active-directory-domain-services/overview.md)is not created on the Azure AD tenant of the associated subscription.
424
+
Error AadDsTenantNotFound happens when you try to [enable Azure Active Directory Domain Services (Azure AD DS) authentication on Azure Files](storage-files-identity-auth-active-directory-domain-service-enable.md) on a storage account where [Azure AD Domain Service(Azure AD DS)](../../active-directory-domain-services/overview.md)isn't created on the Azure AD tenant of the associated subscription.
425
425
426
426
### Solution
427
427
@@ -432,7 +432,7 @@ Enable Azure AD DS on the Azure AD tenant of the subscription that your storage
432
432
## Unable to mount Azure Files with AD credentials
433
433
434
434
### Self diagnostics steps
435
-
First, make sure that you have followed through all four steps to [enable Azure Files AD Authentication](./storage-files-identity-auth-active-directory-enable.md).
435
+
First, make sure that you've followed through all four steps to [enable Azure Files AD Authentication](./storage-files-identity-auth-active-directory-enable.md).
436
436
437
437
Second, try [mounting Azure file share with storage account key](./storage-how-to-use-files-windows.md). If the share fails to mount, download [`AzFileDiagnostics`](https://github.com/Azure-Samples/azure-files-samples/tree/master/AzFileDiagnostics/Windows) to help you validate the client running environment, detect the incompatible client configuration which would cause access failure for Azure Files, give prescriptive guidance on self-fix, and collect the diagnostics traces.
438
438
@@ -459,8 +459,8 @@ The cmdlet performs these checks below in sequence and provides guidance for fai
459
459
### Symptom
460
460
461
461
You may experience either symptoms described below when trying to configure Windows ACLs with File Explorer on a mounted file share:
462
-
- After you click on Edit permission under the Security tab, the Permission wizard does not load.
463
-
- When you try to select a new user or group, the domain location does not display the right AD DS domain.
462
+
- After you click on Edit permission under the Security tab, the Permission wizard doesn't load.
463
+
- When you try to select a new user or group, the domain location doesn't display the right AD DS domain.
464
464
465
465
### Solution
466
466
@@ -474,11 +474,11 @@ This error may occur if a domain controller that holds the RID Master FSMO role
474
474
475
475
### Error: "Cannot bind positional parameters because no names were given"
476
476
477
-
This error is most likely triggered by a syntax error in the Join-AzStorageAccountforAuth command. Check the command for misspellings or syntax errors and verify that the latest version of the AzFilesHybrid module (https://github.com/Azure-Samples/azure-files-samples/releases) is installed.
477
+
This error is most likely triggered by a syntax error in the `Join-AzStorageAccountforAuth` command. Check the command for misspellings or syntax errors and verify that the latest version of the AzFilesHybrid module (https://github.com/Azure-Samples/azure-files-samples/releases) is installed.
478
478
479
479
## Azure Files on-premises AD DS Authentication support for AES-256 Kerberos encryption
480
480
481
-
Azure Files supports AES-256 Kerberos encryption for AD DS authentication beginning with the AzFilesHybrid module v0.2.2. AES-256 is the recommended authentication method. If you've enabled AD DS authentication with a module version lower than v0.2.2, you'll need to [download the latest AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases) and run the PowerShell below. If you have not enabled AD DS authentication on your storage account yet, follow this [guidance](./storage-files-identity-ad-ds-enable.md#option-one-recommended-use-azfileshybrid-powershell-module) for enablement.
481
+
Azure Files supports AES-256 Kerberos encryption for AD DS authentication beginning with the AzFilesHybrid module v0.2.2. AES-256 is the recommended authentication method. If you've enabled AD DS authentication with a module version lower than v0.2.2, you'll need to [download the latest AzFilesHybrid module](https://github.com/Azure-Samples/azure-files-samples/releases) and run the PowerShell below. If you haven't enabled AD DS authentication on your storage account yet, follow this [guidance](./storage-files-identity-ad-ds-enable.md#option-one-recommended-use-azfileshybrid-powershell-module) for enablement.
482
482
483
483
```PowerShell
484
484
$ResourceGroupName = "<resource-group-name-here>"
@@ -501,7 +501,7 @@ Navigate to the desired storage account in the Azure portal. In the table of con
501
501

502
502
503
503
# [PowerShell](#tab/azure-powershell)
504
-
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you will need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
504
+
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you'll need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
505
505
506
506
```PowerShell
507
507
$resourceGroupName = "<resource-group>"
@@ -521,7 +521,7 @@ New-AzStorageAccountKey `
521
521
```
522
522
523
523
# [Azure CLI](#tab/azure-cli)
524
-
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you will need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
524
+
The following script will rotate both keys for the storage account. If you desire to swap out keys during rotation, you'll need to provide additional logic in your script to handle this scenario. Remember to replace `<resource-group>` and `<storage-account>` with the appropriate values for your environment.
0 commit comments