Skip to content

Commit 03fe163

Browse files
Merge pull request #277572 from vhorne/fw-fqdn-tags
freshness review
2 parents 4909b35 + a08f8c5 commit 03fe163

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/firewall/fqdn-tags.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 06/30/2020
8+
ms.date: 06/07/2024
99
ms.author: victorh
1010
---
1111

@@ -35,7 +35,8 @@ The following table shows the current FQDN tags you can use. Microsoft maintains
3535
|AzureKubernetesService (AKS)|Allows outbound access to AKS. For more information, see [Use Azure Firewall to protect Azure Kubernetes Service (AKS) Deployments](protect-azure-kubernetes-service.md).|
3636
|Office365<br><br>For example: Office365.Skype.Optimize|Several Office 365 tags are available to allow outbound access by Office 365 product and category. For more information, see [Use Azure Firewall to protect Office 365](protect-office-365.md).|
3737
|Windows365|Allows outbound communication to Windows 365, excluding network endpoints for Microsoft Intune. To allow outbound communication to port 5671, create a separated network rule. For more information, see Windows 365 [Network requirements](/windows-365/enterprise/requirements-network).|
38-
|MicrosoftIntune|Allow access to [Microsoft Intune](/mem/intune/fundamentals/intune-endpoints) for managed devices.
38+
|MicrosoftIntune|Allow access to [Microsoft Intune](/mem/intune/fundamentals/intune-endpoints) for managed devices.|
39+
|citrixHdxPlusForWindows365|Required when using Citrix HDX Plus.|
3940

4041
> [!NOTE]
4142
> When you select **FQDN Tag** in an application rule, the protocol:port field must be set to **https**.

0 commit comments

Comments
 (0)