Skip to content

Commit 666f163

Browse files
committed
adjustments from Yair
1 parent 098f8a0 commit 666f163

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/firewall/protect-windows-virtual-desktop.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,8 @@ The Azure virtual machines you create for Windows Virtual Desktop must have acce
3030

3131
- Deploy Azure Firewall and configure your WVD host pool subnet User Defined Route (UDR) to route all traffic via the Azure Firewall. Your default route now points to the firewall.
3232
- Create an application rule collection and add a rule to enable the *WindowsVirtualDesktop* FQDN tag. The source IP address range is the host pool virtual network, the protocol is **https**, and the destination is **WindowsVirtualDesktop**.
33-
- Enable Storage and Service Bus Service Endpoints on your WVD host pool subnet.
3433

35-
The set of required storage and service bus accounts for your WVD host pool is deployment specific, so it isn't yet captured in the WindowsVirtualDesktop FQDN tag. You can address this in one of the following ways:
34+
- The set of required storage and service bus accounts for your WVD host pool is deployment specific, so it isn't yet captured in the WindowsVirtualDesktop FQDN tag. You can address this in one of the following ways:
3635

3736
- Allow https access from your host pool subnet to *xt.blob.core.windows.net and *eh.servicebus.windows.net. These wildcard FQDNs enable the required access, but are less restrictive.
3837
- Use the following log analytics query to list the exact required FQDNs, and then allow them explicitly in your firewall application rules:

0 commit comments

Comments
 (0)