Skip to content

Commit 6a2bb2e

Browse files
authored
Merge pull request #202463 from vhorne/fw-avd
update to reconcile with avd article
2 parents 314b845 + 5e07b1e commit 6a2bb2e

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/firewall/protect-azure-virtual-desktop.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: vhorne
55
ms.service: firewall
66
services: firewall
77
ms.topic: how-to
8-
ms.date: 10/06/2021
8+
ms.date: 06/22/2022
99
ms.author: victorh
1010
---
1111

@@ -37,9 +37,9 @@ You will need to create an Azure Firewall Policy and create Rule Collections for
3737
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
3838
| --------- | ----------- | ------------------------- | -------- | ----------------- | ---------------- | --------------------------------- |
3939
| Rule Name | IP Address | VNet or Subnet IP Address | TCP | 80 | IP Address | 169.254.169.254, 168.63.129.16 |
40-
| Rule Name | IP Address | VNet or Subnet IP Address | TCP | 443 | Service Tag | AzureCloud, WindowsVirtualDesktop |
40+
| Rule Name | IP Address | VNet or Subnet IP Address | TCP | 443 | Service Tag | AzureCloud, WindowsVirtualDesktop, AzureFrontDoor.Frontend |
4141
| Rule Name | IP Address | VNet or Subnet IP Address | TCP, UDP | 53 | IP Address | * |
42-
|Rule name | IP Address | VNet or Subnet IP Address | TCP | 1688 | IP address | 23.102.135.246 |
42+
|Rule name | IP Address | VNet or Subnet IP Address | TCP | 1688 | IP address | 23.102.135.246 (kms.core.windows.net)|
4343

4444
> [!NOTE]
4545
> Some deployments might not need DNS rules. For example, Azure Active Directory Domain controllers forward DNS queries to Azure DNS at 168.63.129.16.
@@ -53,7 +53,7 @@ You will need to create an Azure Firewall Policy and create Rule Collections for
5353
> [!IMPORTANT]
5454
> We recommend that you don't use TLS inspection with Azure Virtual Desktop. For more information, see the [proxy server guidelines](../virtual-desktop/proxy-server-support.md#dont-use-ssl-termination-on-the-proxy-server).
5555
56-
## Host pool outbound access to the internet
56+
## Host pool outbound access to the Internet
5757

5858
Depending on your organization needs, you might want to enable secure outbound internet access for your end users. If the list of allowed destinations is well-defined (for example, for [Microsoft 365 access](/microsoft-365/enterprise/microsoft-365-ip-web-service)), you can use Azure Firewall application and network rules to configure the required access. This routes end-user traffic directly to the internet for best performance. If you need to allow network connectivity for Windows 365 or Intune, see [Network requirments for Windows 365](/windows-365/requirements-network#allow-network-connectivity) and [Network endpoints for Intune](/mem/intune/fundamentals/intune-endpoints).
5959

0 commit comments

Comments
 (0)