Skip to content

Commit 48d3d4a

Browse files
authored
Merge pull request #232385 from vhorne/fw-protect-o365
add protect office 365 article
2 parents f915592 + ed631cb commit 48d3d4a

File tree

6 files changed

+58
-2
lines changed

6 files changed

+58
-2
lines changed

articles/firewall/fqdn-tags.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following table shows the current FQDN tags you can use. Microsoft maintains
3333
|AzureHDInsight|Allows outbound access for HDInsight platform traffic. This tag doesn’t cover customer-specific Storage or SQL traffic from HDInsight. Enable these using [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or add them manually.|
3434
|WindowsVirtualDesktop|Allows outbound Azure Virtual Desktop (formerly Windows Virtual Desktop) platform traffic. This tag doesn’t cover deployment-specific Storage and Service Bus endpoints created by Azure Virtual Desktop. Additionally, DNS and KMS network rules are required. For more information about integrating Azure Firewall with Azure Virtual Desktop, see [Use Azure Firewall to protect Azure Virtual Desktop deployments](protect-azure-virtual-desktop.md).|
3535
|AzureKubernetesService (AKS)|Allows outbound access to AKS. For more information, see [Use Azure Firewall to protect Azure Kubernetes Service (AKS) Deployments](protect-azure-kubernetes-service.md).|
36-
|Office365<br><br>For example: Office365.Skype.Optimize|Several Office 365 tags are available to allow outbound access by Office 365 product and category. For more information, see [Office 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges).|
36+
|Office365<br><br>For example: Office365.Skype.Optimize|Several Office 365 tags are available to allow outbound access by Office 365 product and category. For more information, see [Use Azure Firewall to protect Office 365](protect-office-365.md).|
3737
|Windows365|Allows outbound communication to Windows 365, excluding network endpoints for Microsoft Intune. To allow outbound communication to port 5671, create a separated network rule. For more information, see Windows 365 [Network requirements](/windows-365/enterprise/requirements-network).|
3838

3939
> [!NOTE]
180 KB
Loading
142 KB
Loading
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: Use Azure Firewall to protect Office 365
3+
description: Learn how to use Azure Firewall to protect Office 365
4+
author: vhorne
5+
ms.service: firewall
6+
services: firewall
7+
ms.topic: how-to
8+
ms.date: 03/28/2023
9+
ms.author: yuvalpery
10+
---
11+
12+
# Use Azure Firewall to protect Office 365
13+
14+
You can use the Azure Firewall built-in Service Tags and FQDN tags to allow outbound communication to [Office 365 endpoints and IP addresses](/microsoft-365/enterprise/urls-and-ip-address-ranges).
15+
16+
## Tags creation
17+
18+
For each Office 365 product and category, Azure Firewall automatically retrieves the required endpoints and IP addresses, and creates tags accordingly:
19+
20+
- Tag name: all names begin with **Office365** and are followed by:
21+
- Product: Exchange / Skype / SharePoint / Common
22+
- Category: Optimize / Allow / Default
23+
- Required / Not required (optional)
24+
- Tag type:
25+
- **FQDN tag** represents only the required FQDNs for the specific product and category that communicate over HTTP/HTTPS (ports 80/443) and can be used in Application Rules to secure traffic to these FQDNs and protocols.
26+
- **Service tag** represents only the required IPv4 addresses and ranges for the specific product and category and can be used in Network Rules to secure traffic to these IP addresses and to any required port.
27+
28+
You should accept a tag being available for a specific combination of product, category and required / not required in the following cases:
29+
- For a Service Tag – this specific combination exists and has required IPv4 addresses listed.
30+
- For an FQDN Rule – this specific combination exists and has required FQDNs listed which communicate to ports 80/443.
31+
32+
Tags are updated automatically with any modifications to the required IPv4 addresses and FQDNs. New tags might be created automatically in the future as well if new combinations of product and category are added.
33+
34+
Network rule collection:
35+
:::image type="content" source="media/protect-office-365/network-rule-collection.png" alt-text="Screenshot showing Office 365 network rule collection.":::
36+
37+
Application rule collection:
38+
:::image type="content" source="media/protect-office-365/application-rule-collection.png" alt-text="Screenshot showing Office 365 application rule collection.":::
39+
40+
## Rules configuration
41+
42+
These built-in tags provide granularity to allow and protect the outbound traffic to Office 365 based on your preferences and usage. You can allow outbound traffic only to specific products and categories for a specific source. You can also use [Azure Firewall Premium’s TLS Inspection and IDPS](premium-features.md) to monitor some of the traffic. For example, traffic to endpoints in the Default category that can be treated as normal Internet outbound traffic. For more information about Office 365 endpoint categories, see [New Office 365 endpoint categories](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#new-office-365-endpoint-categories).
43+
44+
When you create the rules, ensure you define the required TCP ports (for network rules) and protocols (for application rules) as required by Office 365. If a specific combination of product, category and required/not required have both a Service Tag and an FQDN tag, you should create representative rules for both tags to fully cover the required communication.
45+
46+
## Limitations
47+
48+
If a specific combination of product, category and required/not required has only FQDNs required, but uses TCP ports that aren't 80/443, an FQDN tag isn't be created for this combination. Application Rules can only cover HTTP, HTTPS or MSSQL. To allow communication to these FQDNs, create your own network rules with these FQDNs and ports.
49+
For more information, see [Use FQDN filtering in network rules](fqdn-filtering-network-rules.md).
50+
51+
## Next steps
52+
53+
- Learn more about Office 365 network connectivity: [Microsoft 365 network connectivity overview](/microsoft-365/enterprise/microsoft-365-networking-overview)
54+

articles/firewall/service-tags.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure Firewall service tags can be used in the network rules destination field.
2121
Azure Firewall supports the following Service Tags to use in Azure Firewall Network rules:
2222

2323
- Tags for various Microsoft and Azure services listed in [Virtual network service tags](../virtual-network/service-tags-overview.md#available-service-tags).
24-
- Tags for the required IP addresses of Office365 services, split by Office365 product and category. You must define the TCP/UDP ports specified in the [Office 365 documentation](/microsoft-365/enterprise/urls-and-ip-address-ranges) inside your rules.
24+
- Tags for the required IP addresses of Office365 services, split by Office365 product and category. You must define the TCP/UDP ports in your rules. For more information, see [Use Azure Firewall to protect Office 365](protect-office-365.md).
2525

2626
## Configuration
2727

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,8 @@ items:
143143
href: protect-azure-virtual-desktop.md
144144
- name: Protect Azure Kubernetes Service (AKS)
145145
href: protect-azure-kubernetes-service.md
146+
- name: Protect Office 365
147+
href: protect-office-365.md
146148
- name: DNS settings
147149
href: dns-settings.md
148150
- name: Monitor diagnostic logs

0 commit comments

Comments
 (0)