You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Successful** - Use this option to track changes to your data. It helps to find out who made changes to your files, including their creation and deletion
48
+
-**Failed** - Use this option to detect suspicious activity on Azure Files. It helps to identify potential intruders who tried to modify or delete files, etc., but failed to do it
-**Successful** - Show successful attempts to read files
52
+
-**Failed** - Use this option to track suspicious activity. Helps find out who was trying to access your private data without proper justification.Enabling this option on public shares will result in a high number of events generated on Azure Files and the amount of data written to the Long-Term Archive
36
53
37
-
### Step 3: Configure Storage Accounts
54
+
**Note:** Enabling read access auditing on public shares may generate high event volume
38
55
39
-
Configure storage account settings (requires separate accounts):
40
-
-**File Share Storage Account** - Contains the file shares to monitor
41
-
-**Audit Log Storage Account** - Stores diagnostic logs (must be separate account)
42
-
-**Resource Group** - Resource group containing the storage accounts
56
+
**Tip:** Only enable read auditing where compliance requires it (e.g., HR, Finance)
43
57
44
-
### Step 4: Configure Monitoring Options
58
+
4. Add exclusions → e.g., service accounts that produce excessive logs
0 commit comments