Mount SMB Azure File Share on Windows
Here’s a concise summary of the article “Mount SMB Azure file share on Windows,” with key requirements and the main mounting methods (portal, PowerShell/cmd, File Explorer) presented as steppers for clarity.
Overview
Applies to: SMB Azure file shares.
Azure Files supports SMB Multichannel on SSD file shares. Modern Windows (SMB 3.1.1) supports AES-256-GCM on latest releases; older Windows may require specific KBs or registry changes and may be limited to AES-128-GCM or AES-128-CCM. Very old OSes (SMB 2.1 or earlier) can't use the public endpoint.
Recommendation: use the most recent relevant Windows update (KB) for your OS.
Prerequisites and important notes
Port 445 (TCP) must be open for SMB; use Test-NetConnection to check. If blocked by ISP/firewall, use a VPN (P2S/S2S) or ExpressRoute to tunnel SMB.
To mount across regions or from on-premises via the public endpoint, client OS must support SMB 3.x.
Identity-based authentication (AD DS or Microsoft Entra) is recommended over storage account keys. If using identity-based auth:
Assign share-level and file/directory-level permissions.
Remove any previously cached storage-account-key credentials before switching to AD credentials.
Ensure the client has network connectivity to the AD domain controllers (use VPN if needed).
Sign in with the AD/Microsoft Entra identity that has access.
Storage account key mount is supported but not recommended: it grants admin-level access to the storage account.
Mounting methods (high-level)
Stepper: Mount via Azure portal
Portal: get the mount script
In the Azure portal, go to the storage account > File shares > select the file share.
Select Connect, pick a drive letter and choose Authentication method: Active Directory or Microsoft Entra (or Storage account key if needed).
Select Show script, copy it, and run it on the host you want to mount from.
Portal: run script (PowerShell example)
The portal script typically tests port 445 and creates persistent credentials and a PSDrive (example in article for mapping drive Z:).
Use the storage account FQDN suffix file.core.windows.net (or file.core.chinacloudapi.cn as shown) unless using custom domain instructions.
Stepper: Mount using Windows command line / PowerShell
Non-domain-joined VM or different AD domain
Provide explicit credentials. Use username@domainFQDN to obtain Kerberos tickets: net use Z: \.file.core.chinacloudapi.cn<FileShareName> /user:username@domainFQDN
For Microsoft Entra Domain Services you can also use DOMAINNAME\username as the user format.
Stepper: Mount with File Explorer
Access via UNC path (no drive letter)
You can access the share by entering: \storageaccountname.file.core.chinacloudapi.cn\myfileshare in File Explorer.
If credential prompt doesn’t appear, use: cmdkey /add:StorageAccountName.file.core.chinacloudapi.cn /user:localhost\StorageAccountName /pass:StorageAccountKey
Custom domain (CNAME) for mounts — condensed steps
Troubleshooting and additional resources
If port 445 is blocked, troubleshooting guidance linked: Port 445 is blocked article and SMB connectivity troubleshooting.
If using AD credentials and you hit issues, see “Unable to mount Azure file shares with AD credentials” troubleshooting link.
Next steps links in article: planning, FAQ, troubleshoot pages.
Last updated: 11/14/2025
If you’d like, I can:
Produce the exact PowerShell and net use command snippets ready to copy (with placeholders),
Extract and format the portal-provided script shown in the article into a ready-to-run code block,
Or produce a shorter checklist for administrators to follow. Which would you prefer?
Was this helpful?