Skip to content

Commit 51af396

Browse files
committed
Activity Monitor. Clarified Azure Files configuration - that the app registration requires a Global Administrator role.
1 parent 2067d9d commit 51af396

File tree

1 file changed

+15
-1
lines changed
  • docs/activitymonitor/9.0/requirements/activityagent/nas-device-configuration/azure-files

1 file changed

+15
-1
lines changed

docs/activitymonitor/9.0/requirements/activityagent/nas-device-configuration/azure-files/azurefiles-activity.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,15 @@ It may take up to 90 minutes for the changes to take effect.
6767
Monitoring of Azure Files requires an application to be registered in the Azure portal, assigning it permissions to access the Graph API and
6868
RBAC roles to access storage accounts.
6969

70+
:::note
71+
A user account with the **Global Administrator** role is required to register an app and grant admin consent in Microsoft Azure.
72+
:::
73+
74+
Before you begin, make sure you have:
75+
- Access to the Azure portal
76+
- Permissions to create app registrations
77+
- Permissions to grant admin consent for your tenant
78+
7079
If you already have an application registered for Activity Monitor for Entra ID, SharePoint Online, or Exchange Online, you can reuse that
7180
registration for Azure Files by assigning additional RBAC roles.
7281

@@ -102,6 +111,10 @@ On the **Overview** page, copy the **Application (client) ID** and **Directory (
102111
3. Specify a description and an expiration period.
103112
4. On the **Certificates & secrets** page, copy the **Value** of the created secret and save it for later.
104113

114+
:::note
115+
Be aware of the client secret's expiration date. You'll need to generate a new one before it expires to ensure uninterrupted monitoring.
116+
:::
117+
105118
:::warning
106119
Make sure you copy the **Value**, not the **Secret ID**.
107120
:::
@@ -115,7 +128,8 @@ Activity Monitor requires the `User.Read.All` permission to resolve user SIDs in
115128
**Microsoft Graph**
116129
Type: **Application permissions**
117130
Permission: `User.Read.All`
118-
3. Click **Grant admin consent for Your Company**.
131+
3. Click **Grant admin consent for [tenant name]**, then confirm when prompted.
132+
This action requires a Global Administrator.
119133

120134
## Assign Azure RBAC roles for storage accounts
121135

0 commit comments

Comments
 (0)