Skip to content

Commit 66441dc

Browse files
committed
Corrected auditor configuration desription
1 parent edded5d commit 66441dc

File tree

1 file changed

+3
-12
lines changed

1 file changed

+3
-12
lines changed

docs/auditor/10.8/admin/monitoringplans/azurefiles.md

Lines changed: 3 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -28,25 +28,15 @@ Create monitoring plans for Azure Files to track file and folder changes across
2828
- Select **Add item now**
2929

3030

31-
### Step 2: Add Azure Files Data Source
31+
### Step 2: Add Item for Monitoring
3232

33-
1. Click **Add Data Source**
34-
2. Select **Azure Files**
35-
3. Select Item for Monitoring:
3633
- Option A – Storage Account → Enter **Storage Account Name, Subscription ID, Tenant Name, Application ID, Application Secret**
3734
- Option B – Subscription → Enter **Subscription Name, Subscription ID, Tenant Name, Application ID, Application Secret**
3835

3936
**Tip:** If you have multiple storage accounts, use the subscription option for easier management
4037

4138

42-
### Step 3: Configure Storage Accounts
43-
44-
Configure storage account settings (requires separate accounts):
45-
- **File Share Storage Account** - Contains the file shares to monitor
46-
- **Audit Log Storage Account** - Stores diagnostic logs (must be separate account)
47-
- **Resource Group** - Resource group containing the storage accounts
48-
49-
### Step 4: Configure Monitoring Scope and Actions
39+
### Step 3: Configure Monitoring Scope and Actions
5040

5141
1. In the **Netwrix Auditor**, double-click your **Azure Files plan**
5242
2. Enable **Monitor this data source and collect activity data**
@@ -62,6 +52,7 @@ Configure storage account settings (requires separate accounts):
6252
- **Failed** - Use this option to track suspicious activity. Helps find out who was trying to access your private data without proper justification.Enabling this option on public shares will result in a high number of events generated on Azure Files and the amount of data written to the Long-Term Archive
6353

6454
**Note:** Enabling read access auditing on public shares may generate high event volume
55+
6556
**Tip:** Only enable read auditing where compliance requires it (e.g., HR, Finance)
6657

6758
4. Add exclusions → e.g., service accounts that produce excessive logs

0 commit comments

Comments
 (0)