@Niteesh G S Firstly, apologies for the delay in responding here and any inconvenience this issue may have caused.
>Question 1) What are these values "key1(2C67174B5D20100031BCB3D57D683CBA39C698779027FF8346C32DF7F09A8358)" and "SasSignature(FFEB305868EFACB05700C7AA4D3D8F8B9FC2D1CB511B33214A6FE503DF33315B)"?
“key1” refers to SHA-256 hash of Storage Account’s Key1 (This is the key1 listed under “Access Keys” for the storage account).
“SasSignature” refers to SHA-256 hash of the signature part of the Shared Access Signature. Ex: the XXXXX part in the token here “?sv=2020-08-04&ss=bfqt&srt=o&sp=rwdlacupitfx&se=2022-06-02T12:45:45Z&st=2022-06-02T04:45:45Z&spr=https&sig=XXXXX”
>Question 2) Sometimes I get events with NTLMv2 as the authentication from bogus(Not real machines) IP addresses. What/Who is generating those events and why?
This is not a bogus request. It was a successful request made with an open handle on an authenticated session. While I can’t speak to any oddities associated with private VNETs, in general when the “callerIpAddress” is V4 it very rarely corresponds to what the actual client thinks their IP address is. There’s is lot mirror between client and server when IPv4 is used. If you have the timestamp (and timezone) of the entry below, or a more recent repro, I can look it up if not too long ago. I should be able to get the Workstation/machine name, which is often a very big clue.
> Question 3) Can real user authenticate using NTLMv2, If so how? And is it possible to have the user information during an NTLMv2 request? i.e. Something like the user SID similar to Kerberos.
The answer is No. Support for domain joined user to access Azure Files over SMB is only via Kerberos. We do not support NTLMV2 for domain joined users.
Please let us know if you have any further queries. I’m happy to assist you further.
Please do not forget to and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.