Azure Files Cool tier setup

Introduction: Why Azure Files Cool Tier Requires Careful Design

Azure Files Cool tier is often marketed as “cheap file storage in the cloud,” but in practice it behaves much closer to a distributed file server platform than traditional object storage.

When you introduce Active Directory authentication, NTFS permissions, and SMB drive mapping, you are effectively extending your on-premises file server into Azure. That power comes with complexity — and most failed deployments fail not because Azure Files is unreliable, but because the design assumptions were wrong.

This guide walks through the entire lifecycle of deploying Azure Files Cool tier in a hybrid Active Directory environment, based on real-world implementations across engineering, legal, and enterprise IT environments.


High-Level Architecture Overview

Before touching the Azure portal, it’s critical to understand the moving parts:

  • Azure Storage Account (General Purpose v2)
  • Azure Files share using Cool tier
  • On-premises Active Directory Domain Services
  • Kerberos authentication over SMB
  • NTFS permissions enforced at the file system level
  • Optional VPN or ExpressRoute for private access

This solution allows users to access Azure Files exactly like a traditional Windows file share, while data physically resides in Azure.


Prerequisites and Design Considerations

Active Directory Requirements

Your on-premises Active Directory must meet the following:

  • Windows Server 2012 R2 or newer
  • Domain functional level 2012 R2 or higher (recommended)
  • Reliable time synchronization (Kerberos is unforgiving)
  • Permission to create computer accounts in a chosen OU

Real-world advice:
Always dedicate a specific OU for Azure Files computer objects. This avoids accidental deletion and simplifies auditing.


Network Connectivity Requirements

Azure Files uses SMB over TCP port 445. This must be reachable from client devices.

Check connectivity before proceeding:

Test-NetConnection -ComputerName <storageaccount>.file.core.windows.net -Port 445

If this fails:

  • Many ISPs block outbound 445
  • Public Wi-Fi almost always blocks it
  • Some corporate firewalls silently drop it

Solutions include:

  • Site-to-site VPN
  • Point-to-site VPN
  • ExpressRoute (best for scale)

Step 1: Create the Azure Storage Account

Storage Account Configuration

In the Azure Portal:

  1. Create a Storage Account
  2. Select General Purpose v2
  3. Choose a region close to your users
  4. Performance: Standard
  5. Redundancy:
    • LRS for lowest cost
    • ZRS if availability is critical

Naming rule (critical):
The storage account name must be 15 characters or fewer if you plan to integrate with Active Directory. This is due to NetBIOS naming limits — a common and costly oversight.


Networking Settings

For security-conscious environments:

  • Disable public access
  • Use private endpoints
  • Restrict access to trusted networks

For simpler deployments:

  • Allow public network access initially
  • Harden later once functionality is confirmed

Step 2: Create the Azure File Share (Cool Tier)

Once the storage account is created:

  1. Navigate to File shares
  2. Create a new file share
  3. Select Cool access tier
  4. Specify quota (can be adjusted later)

Tiering Reality Check

Cool tier is designed for infrequent access. Expect:

  • Slightly higher latency
  • Higher transaction costs than Hot
  • Massive savings on storage capacity

This tier works best for:

  • Archive data
  • Completed projects
  • Regulatory or compliance storage

Step 3: Enable Active Directory Authentication for Azure Files

This is the most complex — and most important — step.

Choose Authentication Method

For hybrid environments, select:

  • Active Directory Domain Services (AD DS)

This allows:

  • Kerberos authentication
  • NTFS permissions
  • Group-based access control

Join Azure Files to the Domain

Microsoft provides PowerShell tooling to handle the domain join process.

At a high level, this process:

  • Creates a computer account in AD
  • Configures SPNs
  • Enables Kerberos authentication

You’ll need:

  • Domain admin or delegated permissions
  • The target OU distinguished name
  • Storage account details

Expert tip:
Perform this step from a domain-joined management workstation, not a random VM.


Step 4: Configure Role-Based Access Control (RBAC)

Azure RBAC controls who can access the file share at all.

At minimum:

  • Assign Storage File Data SMB Share Reader/Contributor
  • Apply permissions at the file share level
  • Use security groups, not users

RBAC is not a replacement for NTFS — it is an additional gate.


Step 5: Configure NTFS Permissions (The Right Way)

Mount the File Share as an Administrator

From a domain-joined machine:

net use Z: \\<storageaccount>.file.core.windows.net\<share>

Once mapped:

  • Right-click → Properties → Security
  • Apply NTFS permissions exactly like a file server

Recommended Permission Model

Based on real-world operations:

  • Root folder:
    • Read-only for authenticated users
  • Subfolders:
    • Write access via AD security groups
  • No individual user permissions
  • No inheritance breaks unless justified

Rule of thumb:
If permissions require a spreadsheet to explain, they’re too complex.


Step 6: Mapping the Drive for End Users

Manual Mapping (Testing)

net use Z: \\<storageaccount>.file.core.windows.net\<share> /persistent:yes

Authentication uses the user’s Kerberos ticket, not storage keys.


Group Policy Drive Mapping (Recommended)

  1. Create a GPO
  2. Use Drive Maps
  3. Action: Update
  4. Location: Azure Files UNC path
  5. Security filtering via AD groups

This provides:

  • Automatic reconnect
  • Centralised control
  • Seamless user experience

Step 7: Validation and Testing

Before production rollout, test:

  • Authentication from multiple users
  • Access from offsite locations
  • NTFS permission enforcement
  • Performance expectations
  • Backup and restore (if enabled)

Never skip restore testing.
A backup that hasn’t been restored is an assumption, not a strategy.


Operational Best Practices (Hard-Won Lessons)

Logging and Monitoring

  • Enable Azure Storage diagnostics
  • Monitor failed authentications
  • Track access patterns over time

Backup Strategy

  • Azure Backup for file shares
  • Separate retention from production data lifecycle
  • Test restores quarterly

Cost Monitoring

  • Monitor transaction charges
  • Watch for unexpected Hot-tier rehydration
  • Review access logs before tier changes

Common Pitfalls to Avoid

  • ❌ Storage account name too long
  • ❌ Port 445 blocked
  • ❌ Overly complex NTFS permissions
  • ❌ Treating Cool tier like Hot storage
  • ❌ No documented restore process

Conclusion: Treat Azure Files Like a Real File Server

Azure Files Cool tier is not “cheap blob storage with SMB.” It is a fully fledged, domain-integrated file platform that rewards thoughtful design and punishes shortcuts.

When deployed correctly, it delivers:

  • Predictable costs
  • Familiar user experience
  • Enterprise-grade security
  • Minimal operational overhead

For organisations with large volumes of cold data, it is one of the most cost-effective and elegant hybrid storage solutions available in Azure today.

Leave a Reply

Your email address will not be published. Required fields are marked *