Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Connect to Azure file shares with Microsoft Entra Private Access
    Intune

    Connect to Azure file shares with Microsoft Entra Private Access

    Peter KlapwijkBy Peter KlapwijkMay 24, 2024Updated:December 13, 202428 Mins Read

    Some time ago, I wrote an article about replacing on-premises file shares with Azure file shares. A file share hosted on Azure storage that is available using Entra joined Windows devices.

    That solution comes with some limitations. Azure file share uses the SMB protocol. SMB uses firewall port 445 which is blocked by some ISPs. So, you might have people working from home who cannot reach the file shares.
    Besides that, the file share is by default reachable from every network location. Even though access to the file share is secured by a Conditional Access policy (for example only access is allowed from a compliant device).

    We can work around these two limitations by only allowing access to the Azure storage from a selected virtual network and using Microsoft Entra Private Access.

    In this case, the storage account firewall is configured to limit access to the storage account. We configure the firewall to only allow access from a virtual network as described in the Microsoft documentation Networking considerations for Azure Files | Microsoft Learn.

    The storage account firewall restricts access to the public endpoint for a storage account. Using the storage account firewall, you can restrict access to certain IP addresses/IP address ranges, to specific virtual networks, or disable the public endpoint entirely.

    But this means we must route SMB traffic from our Windows clients, through that ‘allowed’ virtual network to allow access. This is where Entra Private Access comes into play.

    Entra Private Access is a Zero Trust Network Access (ZTNA) solution from Microsoft, currently available in public preview.
    Copilot describes this solution in short:

    Microsoft Entra Private Access is a new identity-centric Zero Trust Network Access (ZTNA) solution that securely connects users to private applications from any device and any network. Built on Zero Trust principles, it removes risk while enhancing user productivity by allowing quick and secure access to private apps—whether they are on-premises or across any cloud.

    Private resources are made available via App Proxy Connectors that run on a Windows server on the same network as the resource you want to make available. You can compare it with how Azure Application Proxy uses such a connector to make web applications available. These solutions both make use of the same connector, Microsoft Entra private network connector.

    In our situation, this would mean we create an Azure virtual machine (actually two servers) and install the App Proxy Connector on the server. If we configure these servers and storage account in the same virtual network, traffic can be forwarded from the proxy to the storage without allowing access from the public network. And that’s it, in short.

    This is what this solution would look like in a scheme.

    As Entra Private Access is in preview and under development, I hope that in the future we can just spin up some instances of an App Proxy in an Azure virtual network without the need to create a VM. But running a VM in Azure doesn’t cost that much, as the connector doesn’t take a lot of resources. And maybe you already have some servers running in Azure that you can (miss) use for this.

    I assume you have already set up a file share on Azure storage, if not please first read this blog post.
    And I assume you already have a virtual network and Windows server running in Azure on which we can install the App Proxy connector. Setting up a virtual network and server in Azure is out of the scope of this post.

    Change Azure storage network settings

    If you have followed my previous post and set up an Azure file share, the Public network access, found on the Networking tab, is most likely configured to Enabled from all networks.

    We need to change Public network access to Disabled.

    To make the storage account reachable via the App Proxy connectors, we need to make sure the storage account gets an IP address in the same network as where the servers are located.

    To configure this, we assign the storage account its own (private) IP address. This is done by assigning a Private endpoint to the storage account.
    On the Private endpoint connections tab choose +Private endpoint.

    Create the private endpoint in the same virtual network where the VMs run (on which we will later install the proxy connector).

    On the next tab, we need to select the Target sub-resource, that is in our case file.

    We need to select a Subnet. And assign a static IP address.

    Make sure Integrate with private DNS is set to Yes.

    And hit the create button.

    We now have a network interface connected to our Azure storage account.
    Note down the IP address and both FQDNs, as we need that information later in our Entra Private Access configuration.

    Set up Entra Private Access

    Entra Private Access is part of Global Secure Access. A license can be purchased as part of the Entra Suite or an add-on license.

    Global Secure Access is managed via the Entra portal.

    Signed in to the Entra portal, browse to the Global Secure Access section. We first need to enable Global Secure Access for our tenant by selecting Activate.

    To provide access from our (Windows) clients to our Azure storage account, we need to have online App Proxy connectors. The client to install the connector can be downloaded from the Connectors tab.

    The server on which the connector runs needs to have access to the backend application, in this case, our server needs to have access to our Azure storage. By taking the previous steps, we have already made sure this requirement is in place.

    The installation itself is straightforward.

    When the installation of the connector is finished, we need to sign in.
    This requires authentication with a Global Admin account as described in the documentation.

    Soon after the connector is installed and you have finished the configuration, the first connector shows up in the Entra portal in the default connector group.
    For redundancy, it is best practice to have at least two connectors per connector group. We can create multiple connector groups. For example, an additional connector group to provide access to on-premises resources.

    Open the Traffic forwarding tab and switch on Private access profile to enable traffic forwarding to Global Secure Access.

    Click OK to confirm.

    Configure Global Secure Access Enterprise application

    Now that we have enabled Entra Private Access and connectors are online in the virtual network that allows access to our Azure storage account, it’s time to create a forwarding profile. Such a forwarding profile is a Global Secure Access application, created in Azure. In such a profile we specify which traffic (FQDN or ip address and firewall port) is forwarded via Global Secure access and who is allowed to use this profile/ application.

    On the tab Enterprise Applications click +New application.

    Enter a name for the new application (1) and click +Add application segment (2).

    If you have multiple connector Groups, select the correct group.

    We need to add multiple application segments.
    We need to add the (private) IP address of the private endpoint of the storage account. And we need to add the firewall port, in this case, 445 (SMB).

    We repeat this for the fully qualified domain names of the Azure storage account, both the ‘default’ and private link DNS name.

    Next, we add a group with users that is allowed access to the Azure files share and thus allowed to use this forwarding profile.

    You can’t choose any other role as the default User role.

    As you can see, we can secure this application with a Conditional Access policy.
    Configure this to your needs, for example, allow access from compliant devices.

    We now have everything set up, to allow access to the Azure file share only from the virtual network using Entra Private access.

    End-user experience

    I have made the Global Secure Access client available with Microsoft Intune. The client can be downloaded from the Entra portal.

    When the Global Secure Access client is installed, a tray icon is shown. As an (local) administrator, you have access to Advanced Diagnostics.

    The active forwarding profile details are listed on the Profile forwarding tab. We see a few default rules, and the rules we just added to the new Enterprise application. It shows the destination, protocol, and port.

    As this user is allowed to access the Azure file share and use the application, the user can open the Azure file share in Explorer.

    If we switch back to the advanced diagnostics (and we start collecting data), we can see the hostname acquisition. We can see the FQDN resolves to an IP address in the 6.6.0.0 range which is the GSA IP range.

    On the traffic tab, we can see an active connection to the mentioned FQDN, over the specified SMB port 445. Which shows the data is running through the GSA tunnel as expected.

    That’s it for this blog post. We made our Azure file share implementation more secure and available for users whose ISP blocks SMB traffic.
    We configured the Azure storage account to only allow access from one virtual network.
    In that network, we installed an App Proxy connector and configured Entra Private Access to forward data through this connector.

    Thank you for reading!

    Modern Workplace Security Windows Windows 10 Windows 11
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Azure AD Connect setup error

    January 4, 2024

    Map network drives on cloud-managed Windows devices

    November 2, 2023

    Hide settings pages in Windows 10 with Microsoft Intune

    May 8, 2019
    View 2 Comments

    2 Comments

    1. Pete Mitchell on October 9, 2024 13:53

      *sigh* Another Microsoft ‘cloud’ solution that requires Windows Server(s). They just need to implement SMB over QUIC on Azure Files and be done with it.

      Reply
    2. Christoffer Jakobsen on May 6, 2025 16:44

      I like your article! Very easy to understand and follow.

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}