☁️
CTHFM: Azure
  • Welcome
  • Getting Started
    • Account Setup
      • Account Creation Instructions
  • Azure Fundamentals
    • Azure Fundamentals Overview
      • Azure Documentation
      • Azure Entra
      • Azure Hierarchy
      • Identities
      • Azure Entra Roles
      • Azure RBAC
      • Azure Licensing Overview
        • Azure Entra ID Premium Licenses Comparison
      • Azure Shared Responsibility Model
      • Azure Frameworks
      • Azure Security Services
      • Conditional Access Policies
        • How Conditional Access Policies Work
        • Benefits of Conditional Access
        • Best Practices for Conditional Access
        • Conditions for Conditional Access
        • Conditional Access Controls
        • Sign-In Risk and Identity Protection
        • Conditional Access Session Control
        • Name Locations IP Location
      • Azure Quotas
      • Azure Tokens
        • Access Tokens
        • ID Tokens
        • Refresh Tokens
          • Invalidate Refresh Tokens
        • Primary Refresh Tokens
        • Continuous Access Evaluation (CAE)
        • Token Protection: Conditional Access (Public Preview)
  • Azure CLI
    • Introduction to Azure CLI
    • Installing Azure CLI
    • CLI Commands
    • Resource Group Management
    • Creating and Managing Resources with Azure CLI
    • Managing IAM
    • Azure CLI Automation
    • Monitoring and Troubleshooting in Azure CLI
    • Azure CLI Overview
      • Azure CLI: Linux
      • Azure CLI: Windows
      • Azure CLI: MacOS
  • KQL
    • KQL Overview
      • KQL Introduction
      • Data Types
      • Quick Reference
      • Render
      • Basic Queries
  • Powershell
    • PowerShell for Azure
      • Powershell Documentation
      • Powershell Basics
      • Understanding Powershell Variables
      • Understanding Cmdlets
      • Powershell Console & ISE
      • Powershell: Entra Module
        • Module Reference & Getting Started
      • Powershell: Azure Module
        • Installation Instructions
        • Powershell Azure CLI: Windows
        • Powershell Azure CLI: Linux
        • Powershell Azure CLI: MacOS
        • Example Azure Cmdlets
  • Bicep
    • Bicep File Structure
    • Variable Types
  • Azure Logging References
    • Logging
      • Log Retention Strategies
      • Azure Log Types
      • Azure Activity Logs
        • Administrative Event Schema
        • Service Health Notification Schema
        • Resource Health
        • Alert Category
        • Autoscale
        • Security
        • Recommendation
        • Policy
      • Entra ID Logging
        • Identity Based Logs
          • Audit Logs
          • Sign-In Logs
            • AADNonInteractiveUserSignInLogs
            • AADManagedIdentitySignInLogs
            • AADServicePrincipalSignInLogs
            • First Party Sign-In Activity
          • Provisioning Logs (AADProvisioningLogs)
          • Microsoft Graph Activity
          • Identity Protection
            • Risk Detections
            • AADRiskyServicePrincipals
            • AADRiskyUsers
            • AADUserRiskEvents
            • AADServicePrincipalRiskEvents
        • Additional Entra ID Logs
      • Azure Key Vault
        • Azure Key Vault Logging Overview
      • Network Watcher
        • RBAC Permissions
        • Flow Log Types
          • NSG Flow Log Schema
          • VNET Flow Log Schema
        • Enabling Logs
          • NSG Flow Logs
          • VNET Flow Logs
        • Packet Capture
          • Packet Capture: VM
          • Packet Capture: Scale Sets
      • Compute Resources
        • Azure Monitor Agent
        • VM Insights
          • VM Insights Tables
      • Storage Accounts
        • Storage Account Logging
          • File
            • Enable StorageFileLogs
            • StorageFileLogs
          • Blob
            • Enable Blob Logging
            • StorageBlobLogs
          • Queue
            • Enable Queue Logging
            • StorageQueueLogs Table
          • Table
            • Enable Table Logging
            • StorageTableLogs Table
      • Azure App Service
        • Log Types
        • Enabling Logging
      • Azure Monitor
        • Resource Logs
          • Resource Log Top Level Documentation
        • Log Analytics Workspace
          • Setup
        • Workbooks
        • Dashboards
        • Alerts
        • Azure Monitor Documentation
      • Defender for Cloud
      • Intune
      • Sysmon
      • Purview Audit Log Schema
      • Kubernetes Audit Log (AKS)
  • Threat Hunting
    • Threat Hunting in Azure
      • Threat Hunting Introduction
      • Threat Hunting Process
        • Hypothesis Generation
        • Investigation
        • Identification
        • Resolution & Follow Up
      • Pyramid of Pain
      • Azure Threat Hunting Ideas
      • Hands On Threat Hunting Examples
      • OSINT Feeds
  • Sigma
    • Sigma Rule Structure
  • Microsoft Defender TI
    • Microsoft Defender Threat Intelligence
      • Data Sets
      • Reputational Scoring
      • Analyst Insights
      • Microsoft Defender TI: Copilot Integration
  • MITRE Att&ck
    • MITRE Att&ck
      • MITRE Att&ck Concepts
      • MITRE Data Sources
      • MITRE Att&ck Mitigations
      • MITRE Att&ck: Azure
        • MITRE Att&CK: Azure Security Control Mapping
  • Microsoft Resources
    • Microsoft Incident Response Ninja Hub
    • Microsoft Defender XDR Ninja Hub
  • Azure Threat Research Matrix (ATRM)
  • Security Research & Resources
    • Azure Goat
    • Azure Security Research
      • Azure Related CVEs
  • Defender XDR
    • Defender XDR Overview
    • Defender XDR Licensing
    • Defender XDR Default Retention
    • Defender XDR Advanced Hunting Table Schemas
    • Automated Response Requirements
    • Supported Response Actions
  • Azure Sentinel
    • Sentinel Overview
    • Azure Sentinel Deployments
    • Supported Data
    • Workbook, Playbook, Notebook Comparison
    • Sentinel Workbooks
    • Entities
    • User and Entity Behavior Analytics
    • Anomaly Detection
    • Mult-Stage Attack Detection
    • Sentinel: Az CLI
  • Microsoft Defender
    • Microsoft Defender for Cloud References
    • Defender for Cloud: Az CLI
  • Azure Policy
    • Azure Policy
    • Azure Policy Components
    • Azure Policy Rules
    • Scope Azure Policy
    • Policy Assignments
    • Policy Effect
    • Initiative Definition
    • Policy Parameters
    • Remediation Task Structure
    • Use Cases for Azure Policy
    • Azure Policy: Az CLI
  • Intune
    • Intune Overview
    • Intune Licensing
    • Intune API Permission Scopes
    • Intune Sample Script Resources
  • Intune Logging
    • Configure Logging
    • Logging Schema References
    • Intune Queries and Resources
  • Windows Host Security
    • Windows System Architecture and OS Fundamentals
    • SysInternals
    • Basic vs Advanced Security Auditing
    • Sysmon
  • Adversary Emulation
    • AzureHound
    • AADInternals
      • Install
    • RoadTools
      • Install
    • Oh365UserFinder
    • GraphRunner
  • Incident Response
    • Incident Response
      • Azure IR Program Development Cheat Sheet
      • Azure IR Playbooks (MS Guidance)
      • Ransomware (MS Guidance)
  • Automation
    • Automation Overview
    • Logic Apps
      • How Logic Apps Work
      • Logic App Types
      • Triggers
      • Connectors
      • Conditional Logic and Control Flow
      • APIs in Logic Apps
      • Handling Large Workflows with Stateful Logic Apps
      • External Service Integration
      • Securing, Managing, and Scaling Azure Logic Apps
      • Logic Apps: Az CLI
  • Packet Analysis
    • Wireshark Cheatsheet
    • TShark Cheatsheet
    • TCPDUMP Cheatsheet
    • Protocol Analysis Basics
    • HTTP Response Code Cheatsheet
    • RFC Protocol Mappings
    • PCAP Acquisition
  • Detection Lab
    • Detection Lab Introduction
    • Account Creation Instructions
    • Enable MFA Within Azure Tenant
    • Create an Azure Admin With Cloud Shell
    • Setup and Install Instructions
  • VSCode and Code Setup
  • Deploying Code
  • Enabling Logs for Log Analytics Workspace
  • Logging Into Windows VM
  • Verifying Logs in Log Analytics Workspace
  • Creating Detections: Azure Monitor
  • Cost Management: Billing Alarms
Powered by GitBook
On this page
  • File Overview:
  • 1. Key Features:
  • 2. Types of File Shares:
  • 3. Scalability:
  • 4. Use Cases:
  • 5. Networking and Security:
  • 6. Accessing Azure File Shares:
  1. Azure Logging References
  2. Logging
  3. Storage Accounts
  4. Storage Account Logging

File

File Overview:

Azure File Storage is a service within Azure Storage Accounts that allows you to create fully managed file shares in the cloud, which are accessible via the standard Server Message Block (SMB) protocol. It’s a versatile solution that enables you to store and access files just like you would with a traditional file server, but with the scalability, security, and availability of Azure. Here's an overview of Azure File Storage:

1. Key Features:

  • SMB Access: Azure File Storage supports SMB 3.0 and SMB 2.1, which allows you to mount the file shares on Windows, Linux, and macOS, making it easy to access files from different platforms.

  • Fully Managed: Azure File Storage is a fully managed service, meaning that Microsoft handles all the underlying infrastructure, including hardware maintenance, updates, and scaling.

  • Secure Access: Files can be accessed securely via Azure Active Directory (Azure AD) authentication or Shared Access Signatures (SAS). Encryption is also provided both at rest and in transit.

  • Integration with Azure Services: Azure Files can be easily integrated with other Azure services, such as Azure Backup, Azure Kubernetes Service (AKS), and Azure Virtual Machines (VMs), making it a flexible storage option for various scenarios.

2. Types of File Shares:

  • Standard File Shares: Standard file shares are backed by standard HDDs, making them a cost-effective option for scenarios where high performance is not critical.

  • Premium File Shares: Premium file shares are backed by SSDs, providing high performance and low latency, which is ideal for IO-intensive workloads like databases and high-performance computing (HPC) scenarios.

3. Scalability:

  • Capacity: A single Azure File share can store up to 100 TiB (terabytes) of data.

  • File Size: Individual files within an Azure File share can be as large as 1 TiB.

  • Performance: Depending on the storage tier, file shares can support thousands of IOPS (Input/Output Operations Per Second) and high throughput, making them suitable for a wide range of applications.

4. Use Cases:

  • Lift-and-Shift Applications: Azure File Storage is ideal for migrating legacy applications that rely on file shares. Applications that use traditional file storage can be moved to Azure with minimal changes.

  • Centralized File Storage: Organizations can use Azure Files to centralize their file storage in the cloud, allowing access from multiple locations, which is particularly useful for remote teams or branch offices.

  • Container Storage: Azure Files can be used as persistent storage for containers in Azure Kubernetes Service (AKS) or other container orchestration platforms.

  • Backup and Disaster Recovery: Azure File Storage can be used to back up on-premises file shares to the cloud or as a disaster recovery option for critical data.

5. Networking and Security:

  • Private Endpoints: Azure Files supports private endpoints, allowing you to secure your file shares by restricting access to a specific virtual network.

  • Firewall Rules: You can configure firewall rules to limit access to your Azure File shares to specific IP address ranges.

  • Encryption: Azure File Storage provides encryption for data at rest using Azure Storage Service Encryption (SSE), and encryption in transit is enabled by default when using SMB 3.0.

6. Accessing Azure File Shares:

  • Mounting on Windows: You can mount an Azure File share on a Windows machine using the net use command or via the Windows File Explorer.

  • Mounting on Linux: Linux users can mount Azure File shares using the mount command with the CIFS (Common Internet File System) or SMB protocol.

  • Mounting on macOS: Similar to Linux, macOS users can mount Azure File shares using the mount_smbfs command.

  • REST API and SDKs: Azure Files can also be accessed programmatically through REST APIs or SDKs in various programming languages, including .NET, Java, Python, and more.

Last updated 9 months ago