Skip to content

Commit bec60ac

Browse files
authored
[Activity Monitor] Clarified Azure Files configuration (#367)
* Activity Monitor. Clarified Azure Files configuration - that the app registration requires a Global Administrator role.
1 parent 2067d9d commit bec60ac

File tree

1 file changed

+10
-1
lines changed
  • docs/activitymonitor/9.0/requirements/activityagent/nas-device-configuration/azure-files

1 file changed

+10
-1
lines changed

docs/activitymonitor/9.0/requirements/activityagent/nas-device-configuration/azure-files/azurefiles-activity.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,10 @@ It may take up to 90 minutes for the changes to take effect.
6767
Monitoring of Azure Files requires an application to be registered in the Azure portal, assigning it permissions to access the Graph API and
6868
RBAC roles to access storage accounts.
6969

70+
:::note
71+
A user account with the **Global Administrator** role is required to register an app and grant admin consent in Microsoft Azure.
72+
:::
73+
7074
If you already have an application registered for Activity Monitor for Entra ID, SharePoint Online, or Exchange Online, you can reuse that
7175
registration for Azure Files by assigning additional RBAC roles.
7276

@@ -102,6 +106,10 @@ On the **Overview** page, copy the **Application (client) ID** and **Directory (
102106
3. Specify a description and an expiration period.
103107
4. On the **Certificates & secrets** page, copy the **Value** of the created secret and save it for later.
104108

109+
:::note
110+
Be aware of the client secret's expiration date. You'll need to generate a new one before it expires to ensure uninterrupted monitoring.
111+
:::
112+
105113
:::warning
106114
Make sure you copy the **Value**, not the **Secret ID**.
107115
:::
@@ -115,7 +123,8 @@ Activity Monitor requires the `User.Read.All` permission to resolve user SIDs in
115123
**Microsoft Graph**
116124
Type: **Application permissions**
117125
Permission: `User.Read.All`
118-
3. Click **Grant admin consent for Your Company**.
126+
3. Click **Grant admin consent for [tenant name]**, then confirm when prompted.
127+
This action requires a Global Administrator.
119128

120129
## Assign Azure RBAC roles for storage accounts
121130

0 commit comments

Comments
 (0)