Skip to content

Commit acc9b8d

Browse files
committed
acrolinx
1 parent d906b99 commit acc9b8d

File tree

3 files changed

+17
-17
lines changed

3 files changed

+17
-17
lines changed

articles/azure-netapp-files/backup-requirements-considerations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Azure NetApp Files backup in a region can only protect an Azure NetApp Files vol
4444

4545
* If you delete a volume, the backups remain. If you no longer need the backups, you should [manually delete the backups](backup-delete.md).
4646

47-
* If you need to delete a parent resource group or subscription that contains backups, you should delete any backups first. Deleting the resource group or subscription won't delete the backups.
47+
* If you need to delete a parent resource group or subscription that contains backups, you should delete any backups first. Deleting the resource group or subscription doesn't delete the backups.
4848

4949
## Next steps
5050

articles/azure-netapp-files/create-volumes-dual-protocol.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,8 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
4646
## Considerations
4747
4848
* Ensure that you meet the [Requirements for Active Directory connections](create-active-directory-connections.md#requirements-for-active-directory-connections).
49-
* Create a reverse lookup zone on the DNS server and then add a pointer (PTR) record of the AD host machine in that reverse lookup zone. Otherwise, the dual-protocol volume creation will fail.
50-
* The **Allow local NFS users with LDAP** option in Active Directory connections intends to provide occasional and temporary access to local users. When this option is enabled, user authentication and lookup from the LDAP server stop working, and the number of group memberships that Azure NetApp Files will support will be limited to 16. As such, you should keep this option *disabled* on Active Directory connections, except for the occasion when a local user needs to access LDAP-enabled volumes. In that case, you should disable this option as soon as local user access is no longer required for the volume. See [Allow local NFS users with LDAP to access a dual-protocol volume](#allow-local-nfs-users-with-ldap-to-access-a-dual-protocol-volume) about managing local user access.
49+
* Create a reverse lookup zone on the DNS server and then add a pointer (PTR) record of the AD host machine in that reverse lookup zone. Otherwise, the dual-protocol volume creation fails.
50+
* The **Allow local NFS users with LDAP** option in Active Directory connections intends to provide occasional and temporary access to local users. When this option is enabled, user authentication and lookup from the LDAP server stop working, and the number of group memberships that Azure NetApp Files supports is limited to 16. As such, you should keep this option *disabled* on Active Directory connections, except for the occasion when a local user needs to access LDAP-enabled volumes. In that case, you should disable this option as soon as local user access is no longer required for the volume. See [Allow local NFS users with LDAP to access a dual-protocol volume](#allow-local-nfs-users-with-ldap-to-access-a-dual-protocol-volume) about managing local user access.
5151
* Ensure that the NFS client is up to date and running the latest updates for the operating system.
5252
* Dual-protocol volumes support both Active Directory Domain Services (AD DS) and Microsoft Entra Domain Services.
5353
* Dual-protocol volumes do not support the use of LDAP over TLS with [Microsoft Entra Domain Services](../active-directory-domain-services/overview.md). LDAP over TLS is supported with Active Directory Domain Services (AD DS). See [LDAP over TLS considerations](configure-ldap-over-tls.md#considerations).
@@ -83,11 +83,11 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
8383
8484
## Create a dual-protocol volume
8585
86-
1. Click the **Volumes** blade from the Capacity Pools blade. Click **+ Add volume** to create a volume.
86+
1. Select the **Volumes** blade from the Capacity Pools blade. Select **+ Add volume** to create a volume.
8787
8888
![Navigate to Volumes](./media/shared/azure-netapp-files-navigate-to-volumes.png)
8989
90-
2. In the Create a Volume window, click **Create**, and provide information for the following fields under the Basics tab:
90+
2. In the Create a Volume window, select **Create**, and provide information for the following fields under the Basics tab:
9191
* **Volume name**
9292
Specify the name for the volume that you are creating.
9393
@@ -122,7 +122,7 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
122122
Specify the subnet that you want to use for the volume.
123123
The subnet you specify must be delegated to Azure NetApp Files.
124124
125-
If you have not delegated a subnet, you can click **Create new** on the Create a Volume page. Then in the Create Subnet page, specify the subnet information, and select **Microsoft.NetApp/volumes** to delegate the subnet for Azure NetApp Files. In each VNet, only one subnet can be delegated to Azure NetApp Files.
125+
If you haven't delegated a subnet, you can select **Create new** on the Create a Volume page. Then in the Create Subnet page, specify the subnet information, and select **Microsoft.NetApp/volumes** to delegate the subnet for Azure NetApp Files. In each VNet, only one subnet can be delegated to Azure NetApp Files.
126126
127127
![Create subnet](./media/shared/azure-netapp-files-create-subnet.png)
128128
@@ -135,7 +135,7 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
135135
* **Availability zone**
136136
This option lets you deploy the new volume in the logical availability zone that you specify. Select an availability zone where Azure NetApp Files resources are present. For details, see [Manage availability zone volume placement](manage-availability-zone-volume-placement.md).
137137
138-
* If you want to apply an existing snapshot policy to the volume, click **Show advanced section** to expand it, specify whether you want to hide the snapshot path, and select a snapshot policy in the pull-down menu.
138+
* If you want to apply an existing snapshot policy to the volume, select **Show advanced section** to expand it, specify whether you want to hide the snapshot path, and select a snapshot policy in the pull-down menu.
139139
140140
For information about creating a snapshot policy, see [Manage snapshot policies](snapshots-manage-policy.md).
141141
@@ -160,7 +160,7 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
160160
161161
* If you want to enable SMB3 protocol encryption for the dual-protocol volume, select **Enable SMB3 Protocol Encryption**.
162162
163-
This feature enables encryption for only in-flight SMB3 data. It does not encrypt NFSv3 in-flight data. SMB clients not using SMB3 encryption will not be able to access this volume. Data at rest is encrypted regardless of this setting. See [SMB encryption](azure-netapp-files-smb-performance.md#smb-encryption) for more information.
163+
This feature enables encryption for only in-flight SMB3 data. It does not encrypt NFSv3 in-flight data. SMB clients not using SMB3 encryption aren't able to access this volume. Data at rest is encrypted regardless of this setting. See [SMB encryption](azure-netapp-files-smb-performance.md#smb-encryption) for more information.
164164
165165
* If you selected NFSv4.1 and SMB for the dual-protocol volume versions, indicate whether you want to enable **Kerberos** encryption for the volume.
166166
@@ -169,7 +169,7 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
169169
170170
* <a name="access-based-enumeration"></a> If you want to enable access-based enumeration, select **Enable Access Based Enumeration**.
171171
172-
This feature will hide directories and files created under a share from users who do not have access permissions. Users will still be able to view the share. You can only enable access-based enumeration if the dual-protocol volume uses NTFS security style.
172+
This feature hides directories and files created under a share from users who do not have access permissions. You can still view the share. You can only enable access-based enumeration if the dual-protocol volume uses NTFS security style.
173173
174174
* <a name="non-browsable-share"></a> You can enable the **non-browsable-share feature.**
175175
@@ -185,7 +185,7 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
185185
186186
![Specify dual-protocol](./media/create-volumes-dual-protocol/create-volume-protocol-dual.png)
187187
188-
4. Click **Review + Create** to review the volume details. Then click **Create** to create the volume.
188+
4. Select **Review + Create** to review the volume details. Then select **Create** to create the volume.
189189
190190
The volume you created appears in the Volumes page.
191191
@@ -199,7 +199,7 @@ The **Allow local NFS users with LDAP** option in Active Directory connections e
199199
> Before enabling this option, you should understand the [considerations](#considerations).
200200
> The **Allow local NFS users with LDAP** option is part of the **LDAP with extended groups** feature and requires registration. See [Configure AD DS LDAP with extended groups for NFS volume access](configure-ldap-extended-groups.md) for details.
201201
202-
1. Select **Active Directory connections**. On an existing Active Directory connection, click the context menu (the three dots `…`), and select **Edit**.
202+
1. Select **Active Directory connections**. On an existing Active Directory connection, select the context menu (the three dots `…`) then **Edit**.
203203
204204
2. On the **Edit Active Directory settings** window that appears, select the **Allow local NFS users with LDAP** option.
205205
@@ -228,18 +228,18 @@ The values specified for `objectClass` are separate entries. For example, in Mul
228228
229229
Microsoft Entra Domain Services doesn’t allow you to modify the objectClass POSIX attribute on users and groups created in the organizational AADDC Users OU. As a workaround, you can create a custom OU and create users and groups in the custom OU.
230230
231-
If you are synchronizing the users and groups in your Microsoft Entra tenancy to users and groups in the AADDC Users OU, you cannot move users and groups into a custom OU. Users and groups created in the custom OU will not be synchronized to your AD tenancy. For more information, see the [Microsoft Entra Domain Services Custom OU considerations and limitations](../active-directory-domain-services/create-ou.md#custom-ou-considerations-and-limitations).
231+
If you are synchronizing the users and groups in your Microsoft Entra tenancy to users and groups in the AADDC Users OU, you can't move users and groups into a custom OU. Users and groups created in the custom OU aren't synchronized to your AD tenancy. For more information, see the [Microsoft Entra Domain Services Custom OU considerations and limitations](../active-directory-domain-services/create-ou.md#custom-ou-considerations-and-limitations).
232232
233233
### Access Active Directory Attribute Editor
234234
235235
On a Windows system, you can access the Active Directory Attribute Editor as follows:
236236
237-
1. Click **Start**, navigate to **Windows Administrative Tools**, and then click **Active Directory Users and Computers** to open the Active Directory Users and Computers window.
238-
2. Click the domain name that you want to view, and then expand the contents.
237+
1. Select **Start**, navigate to **Windows Administrative Tools**. Then select **Active Directory Users and Computers** to open the Active Directory Users and Computers window.
238+
2. Select the domain name that you want to view, and then expand the contents.
239239
3. To display the advanced Attribute Editor, enable the **Advanced Features** option in the Active Directory Users Computers **View** menu.
240240
![Screenshot that shows how to access the Attribute Editor Advanced Features menu.](./media/create-volumes-dual-protocol/attribute-editor-advanced-features.png)
241-
4. Double-click **Users** on the left pane to see the list of users.
242-
5. Double-click a particular user to see its **Attribute Editor** tab.
241+
4. Select **Users** on the left pane to see the list of users.
242+
5. Select a particular user to see its **Attribute Editor** tab.
243243
244244
## Configure the NFS client
245245

articles/azure-netapp-files/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
2222

2323
* [Volume enhancement: Azure NetApp Files now supports 50 GiB minimum volume sizes](azure-netapp-files-resource-limits.md) (preview)
2424

25-
You can now create an Azure NetApp Files volume as small as 50 GiB--a reduction from the initial minimum size of 100 GiB. 50 GiB volumes save costs for workloads that require volumes smaller than 100 GiB, allowing you to appropriately size storage volumes. 50 GiB volumes are supported for all protocols with Azure NetApp Files: [NFS](azure-netapp-files-create-volume.md#50-gib), [SMB](azure-netapp-files-create-volume-smb.md#50-gib), and [dual-protocol](create-volumes-dual-protocol.md#50-gb). You must register for the feature before creating a volume smaller than 100 GiB.
25+
You can now create an Azure NetApp Files volume as small as 50 GiB--a reduction from the initial minimum size of 100 GiB. 50 GiB volumes save costs for workloads that require volumes smaller than 100 GiB, allowing you to appropriately size storage volumes. 50 GiB volumes are supported for all protocols with Azure NetApp Files: [NFS](azure-netapp-files-create-volumes.md#50-gib), [SMB](azure-netapp-files-create-volumes-smb.md#50-gib), and [dual-protocol](create-volumes-dual-protocol.md#50-gib). You must register for the feature before creating a volume smaller than 100 GiB.
2626

2727
* [Azure NetApp Files double encryption at rest](double-encryption-at-rest.md) is now generally available (GA).
2828

0 commit comments

Comments
 (0)