Skip to content

Commit 1ef81bb

Browse files
committed
add govt tab
1 parent 9a4eb44 commit 1ef81bb

File tree

1 file changed

+17
-1
lines changed

1 file changed

+17
-1
lines changed

articles/firewall/protect-azure-virtual-desktop.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall
66
services: firewall
77
ms.topic: how-to
8-
ms.date: 07/25/2022
8+
ms.date: 09/30/2022
99
ms.author: victorh
1010
---
1111

@@ -38,6 +38,8 @@ In order to identify a specific AVD Host Pool as "Source" in the tables below, [
3838

3939
Based on the Azure Virtual Desktop (AVD) [reference article](../virtual-desktop/safe-url-list.md), these are the ***mandatory*** rules to allow outbound access to the control plane and core dependent services:
4040

41+
# [Azure cloud](#tab/azure)
42+
4143
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
4244
| --------- | -------------------- | ------------------------------------- | -------- | ----------------- | ---------------- | --------------------------------- |
4345
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | login.microsoftonline.com |
@@ -51,6 +53,20 @@ Based on the Azure Virtual Desktop (AVD) [reference article](../virtual-desktop/
5153
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 80 | FQDN | oneocsp.microsoft.com |
5254
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 80 | FQDN | www.microsoft.com |
5355

56+
# [Azure for US Government](#tab/azure-for-us-government)
57+
58+
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
59+
| --------- | -------------------- | ------------------------------------- | -------- | ----------------- | ---------------- | --------------------------------- |
60+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | login.microsoftonline.us |
61+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | Service Tag | WindowsVirtualDesktop, AzureMonitor |
62+
|Rule Name|IP Address or Group|IP Group or VNet or Subnet IP Address|TCP|443|FQDN|gcs.monitoring.core.usgovcloudapi.net|
63+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP, UDP | 53 | IP Address | * |
64+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 1688 | IP address | kms.core.usgovcloudapi.net|
65+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | mrsglobalstugviffx.blob.core.usgovcloudapi.net |
66+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 443 | FQDN | wvdportalstorageblob.blob.core.usgovcloudapi.net |
67+
| Rule Name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 80 | IP Address | 169.254.169.254, 168.63.129.16 |
68+
| Rule name | IP Address or Group | IP Group or VNet or Subnet IP Address | TCP | 80 | FQDN | ocsp.msocsp.com |
69+
5470
> [!NOTE]
5571
> Some deployments might not need DNS rules. For example, Azure Active Directory Domain controllers forward DNS queries to Azure DNS at 168.63.129.16.
5672

0 commit comments

Comments
 (0)