You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/activitymonitor/9.0/requirements/activityagent/nas-device-configuration/azure-files/azurefiles-activity.md
+15-1Lines changed: 15 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,6 +67,15 @@ It may take up to 90 minutes for the changes to take effect.
67
67
Monitoring of Azure Files requires an application to be registered in the Azure portal, assigning it permissions to access the Graph API and
68
68
RBAC roles to access storage accounts.
69
69
70
+
:::note
71
+
A user account with the **Global Administrator** role is required to register an app and grant admin consent in Microsoft Azure.
72
+
:::
73
+
74
+
Before you begin, make sure you have:
75
+
- Access to the Azure portal
76
+
- Permissions to create app registrations
77
+
- Permissions to grant admin consent for your tenant
78
+
70
79
If you already have an application registered for Activity Monitor for Entra ID, SharePoint Online, or Exchange Online, you can reuse that
71
80
registration for Azure Files by assigning additional RBAC roles.
72
81
@@ -102,6 +111,10 @@ On the **Overview** page, copy the **Application (client) ID** and **Directory (
102
111
3. Specify a description and an expiration period.
103
112
4. On the **Certificates & secrets** page, copy the **Value** of the created secret and save it for later.
104
113
114
+
:::note
115
+
Be aware of the client secret's expiration date. You'll need to generate a new one before it expires to ensure uninterrupted monitoring.
116
+
:::
117
+
105
118
:::warning
106
119
Make sure you copy the **Value**, not the **Secret ID**.
107
120
:::
@@ -115,7 +128,8 @@ Activity Monitor requires the `User.Read.All` permission to resolve user SIDs in
115
128
**Microsoft Graph**
116
129
Type: **Application permissions**
117
130
Permission: `User.Read.All`
118
-
3. Click **Grant admin consent for Your Company**.
131
+
3. Click **Grant admin consent for [tenant name]**, then confirm when prompted.
0 commit comments