Skip to content

Commit 0ab3034

Browse files
author
RoseHJM
committed
Removed details and added links to source content
1 parent 61e43f1 commit 0ab3034

File tree

1 file changed

+30
-62
lines changed

1 file changed

+30
-62
lines changed

articles/dev-box/concept-dev-box-network-requirements.md

Lines changed: 30 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,22 @@ You can check that your dev boxes can connect to these FQDNs and endpoints by fo
5353
> [!IMPORTANT]
5454
> Microsoft doesn't support dev box deployments where the FQDNs and endpoints listed in this article are blocked.
5555
56+
### Use FQDN tags and service tags for endpoints through Azure Firewall
57+
58+
Managing network security controls for dev boxes can be complex. To simplify configuration, use fully qualified domain name (FQDN) tags and service tags to allow network traffic.
59+
60+
- **FQDN tags**
61+
62+
An [FQDN tag](/azure/firewall/fqdn-tags) is a predefined tag in Azure Firewall that represents a group of fully qualified domain names. By using FQDN tags, you can easily create and maintain egress rules for specific services like Windows 365 without manually specifying each domain name.
63+
64+
The groupings defined by FQDN tags can overlap. For example, the Windows365 FQDN tag includes AVD endpoints for standard ports, see [reference](/windows-365/enterprise/azure-firewall-windows-365#windows365-tag).
65+
66+
Non-Microsoft firewalls don't usually support FQDN tags or service tags. There might be a different term for the same functionality; check your firewall documentation.
67+
68+
- **Service tags**
69+
70+
A [service tag](/azure/firewall/service-tags) represents a group of IP address prefixes from a given Azure service. Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent updates to network security rules. Service tags can be used in both [Network Security Group (NSG)](/azure/virtual-network/network-security-groups-overview) and [Azure Firewall](/azure/firewall/service-tags) rules to restrict outbound network access, and in [User Defined Route (UDR)](/azure/virtual-network/virtual-networks-udr-overview#user-defined) to customize traffic routing behavior.
71+
5672
## Physical device network connectivity
5773
Although most of the configuration is for the cloud-based dev box network, end user connectivity occurs from a physical device. Therefore, you must also follow the connectivity guidelines on the physical device network.
5874

@@ -67,70 +83,21 @@ Although most of the configuration is for the cloud-based dev box network, end u
6783

6884
The following URLs and ports are required for the provisioning of dev boxes and the Azure Network Connection (ANC) health checks. All endpoints connect over port 443 unless otherwise specified.
6985

70-
| Category | Endpoints | How to apply | More information |
86+
| Category | Endpoints | FQDN tag or Service tag | More information |
7187
|---------------------------------|--------------------------------|-------------------------------------|------------------------------|
72-
| **Dev box communication endpoints** | - *.agentmanagement.dc.azure.com<br>- *.cmdagent.trafficmanager.net | Line by line in your firewall rules. | N/A |
73-
| **Windows 365 service endpoints** | - *.infra.windows365.microsoft.com<br>- *.cmdagent.trafficmanager.net<br>- UDP connectivity via TURN<br>- TURN connectivity | FQDN tag: *Windows365*<br> or <br>Line by line in your firewall rules. | [Windows 365 network requirements](/windows-365/enterprise/requirements-network?tabs=enterprise%2Cent#windows-365-service). |
74-
| **Windows 365 Registration endpoints** | - login.microsoftonline.com<br>- login.live.com<br>- enterpriseregistration.windows.net<br>- global.azure-devices-provisioning.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prap01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prau01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-preu01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prna01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-prod-prna02.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-2-prod-preu01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-2-prod-prna01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-3-prod-preu01.azure-devices.net (443 & 5671 outbound)<br>- hm-iot-in-3-prod-prna01.azure-devices.net (443 & 5671 outbound) |
75-
| **Azure Virtual Desktop service endpoints** | - login.microsoftonline.com<br> - *.wvd.microsoft.com<br> - *.prod.warm.ingest.monitor.core.windows.net<br> - catalogartifact.azureedge.net<br> - gcs.prod.monitoring.core.windows.net<br> - azkms.core.windows.net<br> - mrsglobalsteus2prod.blob.core.windows.net<br> - wvdportalstorageblob.blob.core.windows.net<br> - 169.254.169.254<br> - 168.63.129.16<br> - oneocsp.microsoft.com<br> - www.microsoft.com | FQDN tags: *WindowsVirtualDesktop*, *AzureMonitor*, *AzureFrontDoor.Frontend*, *AzureCloud*, *Internet* | [Session host virtual machines](/azure/virtual-desktop/required-fqdn-endpoint?tabs=azure#session-host-virtual-machines). |
76-
| **Microsoft Entra ID** | FQDNs and endpoints for Microsoft Entra ID can be found under ID 56, 59 and 125 in [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online). | Add service tag `AzureActiveDirectory` | [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) |
88+
| **Dev box communication endpoints** | - *.agentmanagement.dc.azure.com<br>- *.cmdagent.trafficmanager.net | N/A | N/A |
89+
| **Windows 365 service endpoints** | - *.infra.windows365.microsoft.com<br>- *.cmdagent.trafficmanager.net<br>- UDP connectivity via TURN<br>- TURN connectivity | FQDN tag: *Windows365* | [Windows 365 network requirements](/windows-365/enterprise/requirements-network?tabs=enterprise%2Cent#windows-365-service). |
90+
| **Windows 365 Registration endpoints** | For current W365 registration endpoints, see [Windows 365 service](/windows-365/enterprise/requirements-network?tabs=enterprise%2Cent) |
91+
| **Azure Virtual Desktop service endpoints** | For current AVD service endpoints, see [Session host virtual machines](/azure/virtual-desktop/required-fqdn-endpoint?tabs=azure#session-host-virtual-machines) | FQDN tags: *WindowsVirtualDesktop*, *AzureMonitor*, *AzureFrontDoor.Frontend*, *AzureCloud*, *Internet* | |
92+
| **Microsoft Entra ID** | FQDNs and endpoints for Microsoft Entra ID can be found under ID 56, 59 and 125 in [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online). | Service tag: *AzureActiveDirectory* | [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) |
7793
| **Microsoft Intune** | For current FQDNs and endpoints for Microsoft Entra ID, see [Intune core service](/mem/intune/fundamentals/intune-endpoints?tabs=north-america#endpoints)| FQDN tag: *MicrosoftIntune* | [Intune endpoints](/mem/intune/fundamentals/intune-endpoints) |
7894

79-
## Use FQDN tags and service tags for endpoints through Azure Firewall
80-
81-
Managing network security controls for dev boxes can be complex. To simplify configuration, use fully qualified domain name (FQDN) tags and service tags to allow network traffic.
82-
83-
- **FQDN tags**
84-
85-
An [FQDN tag](/azure/firewall/fqdn-tags) is a predefined tag in Azure Firewall that represents a group of fully qualified domain names. By using FQDN tags, you can easily create and maintain egress rules for specific services like Windows 365 without manually specifying each domain name.
86-
87-
The groupings defined by FQDN tags can overlap. For example, the Windows365 FQDN tag includes AVD endpoints for standard ports, see [reference](/windows-365/enterprise/azure-firewall-windows-365#windows365-tag).
88-
89-
Non-Microsoft firewalls don't usually support FQDN tags or service tags. There might be a different term for the same functionality; check your firewall documentation.
90-
91-
- **Service tags**
92-
93-
A [service tag](/azure/virtual-network/service-tags-overview) represents a group of IP address prefixes from a given Azure service. Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent updates to network security rules. Service tags can be used in both [Network Security Group (NSG)](/azure/virtual-network/network-security-groups-overview) and [Azure Firewall](/azure/firewall/service-tags) rules to restrict outbound network access, and in [User Defined Route (UDR)](/azure/virtual-network/virtual-networks-udr-overview#user-defined) to customize traffic routing behavior.
94-
95-
The listed FQDNs and endpoints and tags only correspond to Azure Virtual Desktop sites and resources. They don't include FQDNs and endpoints for other services such as Microsoft Entra ID. For service tags for other services, see [Available service tags](/azure/virtual-network/service-tags-overview#available-service-tags).
95+
The listed FQDNs and endpoints and tags only correspond to the most common resources. They don't include FQDNs and endpoints for all services. For service tags for other services, see [Available service tags](/azure/virtual-network/service-tags-overview#available-service-tags).
9696

9797
Azure Virtual Desktop doesn't have a list of IP address ranges that you can unblock instead of FQDNs to allow network traffic. If you're using a Next Generation Firewall (NGFW), you need to use a dynamic list made for Azure IP addresses to make sure you can connect.
9898

9999
For more information, see [Use Azure Firewall to manage and secure Windows 365 environments](/windows-365/enterprise/azure-firewall-windows-365).
100100

101-
The following table is the list of FQDNs and endpoints your dev boxes need to access. All entries are outbound; you don't need to open inbound ports for dev boxes.
102-
103-
|Address |Protocol |Outbound port |Purpose |Service tag|
104-
|---|---|---|---|---|
105-
|login.microsoftonline.com |TCP |443 |Authentication to Microsoft Online Services |
106-
|*.wvd.microsoft.com |TCP |443 |Service traffic |WindowsVirtualDesktop |
107-
|*.prod.warm.ingest.monitor.core.windows.net |TCP |443 |Agent traffic [Diagnostic output](/azure/virtual-desktop/diagnostics-log-analytics) |AzureMonitor |
108-
|catalogartifact.azureedge.net |TCP |443 |Azure Marketplace |AzureFrontDoor.Frontend|
109-
|gcs.prod.monitoring.core.windows.net |TCP |443 |Agent traffic |AzureCloud|
110-
|kms.core.windows.net |TCP |1688 |Windows activation |Internet|
111-
|azkms.core.windows.net |TCP |1688 |Windows activation |Internet|
112-
|mrsglobalsteus2prod.blob.core.windows.net |TCP |443 |Agent and side-by-side (SXS) stack updates |AzureCloud|
113-
|wvdportalstorageblob.blob.core.windows.net |TCP |443 |Azure portal support |AzureCloud|
114-
|169.254.169.254 |TCP |80 |[Azure Instance Metadata service endpoint](/azure/virtual-machines/windows/instance-metadata-service)|N/A|
115-
|168.63.129.16 |TCP |80 |[Session host health monitoring](/azure/virtual-network/network-security-groups-overview#azure-platform-considerations)|N/A|
116-
|oneocsp.microsoft.com |TCP |80 |Certificates |N/A|
117-
|www.microsoft.com |TCP |80 |Certificates |N/A|
118-
119-
The following table lists optional FQDNs and endpoints that your session host virtual machines might also need to access for other services:
120-
121-
|Address |Protocol |Outbound port |Purpose|
122-
|---|---|---|---|
123-
|login.windows.net |TCP |443 |Sign in to Microsoft Online Services and Microsoft 365|
124-
|*.events.data.microsoft.com |TCP |443 |Telemetry Service|
125-
|www.msftconnecttest.com |TCP |80 |Detects if the session host is connected to the internet|
126-
|*.prod.do.dsp.mp.microsoft.com |TCP |443 |Windows Update|
127-
|*.sfx.ms |TCP |443 |Updates for OneDrive client software|
128-
|*.digicert.com |TCP |80 |Certificate revocation check|
129-
|*.azure-dns.com |TCP |443 |Azure DNS resolution|
130-
|*.azure-dns.net |TCP |443 |Azure DNS resolution|
131-
132-
This list doesn't include FQDNs and endpoints for other services such as Microsoft Entra ID, Office 365, custom DNS providers, or time services. Microsoft Entra FQDNs and endpoints can be found under ID 56, 59 and 125 in [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
133-
134101
> [!TIP]
135102
> You must use the wildcard character (*) for FQDNs involving service traffic. For agent traffic, if you prefer not to use a wildcard, here's how to find specific FQDNs to allow:
136103
> 1. Ensure your session host virtual machines are registered to a host pool.
@@ -141,7 +108,8 @@ This list doesn't include FQDNs and endpoints for other services such as Microso
141108

142109
Direct connectivity to Azure Virtual Desktop RDP broker service endpoints is critical for remote performance to a dev box. These endpoints affect both connectivity and latency. To align with the Microsoft 365 network connectivity principles, you should categorize these endpoints as *Optimize* endpoints, and use a [Remote Desktop Protocol (RDP) Shortpath](/windows-365/enterprise/rdp-shortpath-public-networks) from your Azure virtual network to those endpoints. RDP Shortpath can provide another connection path for improved dev box connectivity, especially in suboptimal network conditions.
143110

144-
To make it easier to configure network security controls, use Azure Virtual Desktop service tags to identify those endpoints for direct routing using an Azure Networking User Defined Route (UDR). A UDR results in direct routing between your virtual network and the RDP broker for lowest latency. For more information about Azure Service Tags, see Azure service tags overview.
111+
To make it easier to configure network security controls, use Azure Virtual Desktop service tags to identify those endpoints for direct routing using an Azure Networking User Defined Route (UDR). A UDR results in direct routing between your virtual network and the RDP broker for lowest latency.
112+
145113
Changing the network routes of a dev box (at the network layer or at the dev box layer like VPN) might break the connection between the dev box and the Azure Virtual Desktop RDP broker. If so, the end user is disconnected from their dev box until a connection is re-established.
146114

147115
## DNS requirements
@@ -164,7 +132,7 @@ You can allow dev boxes to connect to on-premises resources through a hybrid con
164132

165133
## Traffic interception technologies
166134

167-
Some enterprise customers use traffic interception, SSL decryption, deep packet inspection, and other similar technologies for security teams to monitor network traffic. Dev box provisioning might need direct access to the virtual machine. These traffic interception technologies can cause issues with running Azure network connection checks or dev box provisioning. Make sure no network interception is enforced for dev boxes provisioned within Microsoft Dev Box.
135+
Some enterprise customers use traffic interception, TLS decryption, deep packet inspection, and other similar technologies for security teams to monitor network traffic. Dev box provisioning might need direct access to the virtual machine. These traffic interception technologies can cause issues with running Azure network connection checks or dev box provisioning. Make sure no network interception is enforced for dev boxes provisioned within Microsoft Dev Box.
168136

169137
Traffic interception technologies can exacerbate latency issues. You can use a [Remote Desktop Protocol (RDP) Shortpath](/windows-365/enterprise/rdp-shortpath-public-networks) to help minimize latency issues.
170138

@@ -193,9 +161,9 @@ This section covers some common connection and network issues.
193161

194162
- **Logon attempt failed**
195163

196-
If the dev box user encounters logon problems and sees an error message indicating that the logon attempt failed, ensure you enabled the PKU2U protocol on both the local PC and the session host.
164+
If the dev box user encounters sign in problems and sees an error message indicating that the sign in attempt failed, ensure you enabled the PKU2U protocol on both the local PC and the session host.
197165

198-
For more information about troubleshooting logon errors, see [Troubleshoot connections to Microsoft Entra joined VMs - Windows Desktop client](/azure/virtual-desktop/troubleshoot-azure-ad-connections#the-logon-attempt-failed).
166+
For more information about troubleshooting sign in errors, see [Troubleshoot connections to Microsoft Entra joined VMs - Windows Desktop client](/azure/virtual-desktop/troubleshoot-azure-ad-connections#the-logon-attempt-failed).
199167

200168
- **Group policy issues in hybrid environments**
201169

@@ -205,13 +173,13 @@ This section covers some common connection and network issues.
205173

206174
### IPv6 addressing issues
207175

208-
If you're experiencing IPv6 issues, check that the *Microsoft.AzureActiveDirectory* service endpoint is not enabled on the virtual network or subnet. This service endpoint converts the IPv4 to IPv6.
176+
If you're experiencing IPv6 issues, check that the *Microsoft.AzureActiveDirectory* service endpoint isn't enabled on the virtual network or subnet. This service endpoint converts the IPv4 to IPv6.
209177

210178
For more information, see [Virtual Network service endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview).
211179

212180
### Updating dev box definition image issues
213181

214-
When you update the image used in a dev box definition, you must ensure that you have sufficient IP addresses available in your virtual network. Additional free IP addresses are necessary for the Azure Network connection health check. If the health check fails the dev box definition will not update. You need 1 additional IP address per dev box, and two IP addresses for the health check and Dev Box infrastructure.
182+
When you update the image used in a dev box definition, you must ensure that you have sufficient IP addresses available in your virtual network. More free IP addresses are necessary for the Azure Network connection health check. If the health check fails the dev box definition won't update. You need one additional IP address per dev box, and two IP addresses for the health check and Dev Box infrastructure.
215183

216184
For more information about updating dev box definition images, see [Update a dev box definition](how-to-manage-dev-box-definitions.md#update-a-dev-box-definition).
217185

0 commit comments

Comments
 (0)