Hello beqa beridze,
Greetings! Welcome to Microsoft Q&A Platform.
I understand that you are facing issues in users unblocking the files from file properties on the new file server is due to a "security feature in Windows" that shows files as "blocked" when they are downloaded from an untrusted source like Internet.
The risk of removing the restriction from GPO: Removing the restrictions from GPO leads to Security Vulnerabilities like a file from untrusted sources will no longer be marked as blocked it leads to risk and many contain malicious code or viruses, and anyone has easy to access the malicious files and it leads to data corruption.
Recommendation to solve removing the restriction from GPO problem:
Use only trusted location network where files are not blocked. Make sure that files migrated are coming from a trusted source. If the files are transferred internally, they are trusted files, you can pre-process these files to remove the "blocked" attribute before users access them.
Modify the GPO settings to be more confident about what from an "untrusted source". This can reduce the number of files that are blocked without entirely removing the protection. Use a script to unblock files in a bulk amount, PowerShell can be used to remove the "blocked" attribute from all files in a directory"Get-ChildItem "path_to_your_files" -Recurse | Unblock-File" To fine whether the files are trusted or not go to 'User Configuration' > 'Administrative Templates' > 'Windows Components' > 'Attachment Manager'.
Locations exist in the Azure portal under Azure Active Directory > Security > Conditional Access > Named locations. These named network locations may include locations like an organization's headquarters network ranges, VPN network ranges, or ranges that you wish to block. Named locations are defined by IPv4 and IPv6 address ranges or by countries/regions. Learn more here
If you enable Entra authentication for Azure file share, it supports identity-based authentication: https://learn.microsoft.com/en-us/azure/storage/files/storage-files-identity-auth-domain-services-enable?tabs=azure-portal
Here is the doc for your reference: https://learn.microsoft.com/en-us/windows-server/identity/software-restriction-policies/work-with-software-restriction-policies-rules
Similar thread for reference - https://learn.microsoft.com/en-us/answers/questions/1321876/we-wanted-to-add-azure-file-share-to-trusted-locat.
Hope this answer helps! please let us know if you have any further queries. I’m happy to assist you further.
Please "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.