Azure Files Configuration Overview
Configure Azure Files monitoring with Netwrix Auditor by setting up Azure AD application registration, permissions, and diagnostic settings.
Prerequisites
- Azure Files License - Azure Files is a paid data source requiring specific licensing
- Azure Subscription with Azure Files storage accounts (Standard and Premium supported)
- Global Administrator or Security Administrator role in Azure AD
- Storage Account Contributor role on target storage accounts
- Separate Storage Accounts - Requires separate storage accounts for data and audit logs
Configuration Steps Overview
- Azure Application Registration - Create Azure AD application
- Permissions Setup - Assign required permissions
- Diagnostic Settings - Configure audit logging
Azure Application Registration
Create an application in Microsoft Entra ID (Azure AD):
- Navigate to Azure Active Directory > App registrations
- Click New registration
- Configure:
- Name:
Netwrix-Auditor-AzureFiles-Monitor
- Supported account types: Accounts in this organizational directory only
- Name:
- Click Register
- Go to Certificates & secrets > New client secret
- Record these values for Netwrix Auditor:
- Tenant ID (use ID, not tenant name)
- Application (Client) ID
- Client Secret
Diagnostic Settings
Configure diagnostic settings for each storage account containing file shares:
- Navigate to Storage Account > Monitoring > Diagnostic settings
- Click Add diagnostic setting
- Configure:
- Name:
Netwrix-AzureFiles-Audit
- Log Categories: Select all file service categories:
- StorageRead
- StorageWrite
- StorageDelete
- Destination: Archive to storage account (separate audit logs storage account)
- Name:
Permissions Setup
Required Permissions
Assign these permissions to your Azure application:
Microsoft Graph API:
- User.Read
- User.Read.All
Storage Account Roles:
- Reader (Resource Group level)
- Storage File Data Privileged Reader
- Storage Blob Data Reader (for audit logs)
Assign Permissions
- Graph API: In Azure AD application > API permissions > Add permission > Microsoft Graph > Select permissions > Grant admin consent
- Storage: In Storage Account > Access control (IAM) > Add role assignment > Assign required roles
Next Steps
After completing the Azure Files configuration:
- Test Connectivity: Verify authentication and access to storage accounts
- Create Monitoring Plan: Configure Azure Files monitoring in Netwrix Auditor
- Validate Data Collection: Confirm audit events are being collected
For detailed instructions on creating the monitoring plan, see the Azure Files Monitoring Plan documentation.