Skip to content

Commit 6bf0fe6

Browse files
committed
diagram and fqdns tag
1 parent 666f163 commit 6bf0fe6

File tree

3 files changed

+4
-2
lines changed

3 files changed

+4
-2
lines changed

articles/firewall/fqdn-tags.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 04/23/2020
8+
ms.date: 04/24/2020
99
ms.author: victorh
1010
---
1111

@@ -31,7 +31,7 @@ The following table shows the current FQDN tags you can use. Microsoft maintains
3131
|App Service Environment (ASE)|Allows outbound access to ASE platform traffic. This tag doesn’t cover customer-specific Storage and SQL endpoints created by ASE. These should be enabled via [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or added manually.<br><br>For more information about integrating Azure Firewall with ASE, see [Locking down an App Service Environment](../app-service/environment/firewall-integration.md#configuring-azure-firewall-with-your-ase).|
3232
|Azure Backup|Allows outbound access to the Azure Backup services.|
3333
|Azure HDInsight|Allows outbound access for HDInsight platform traffic. This tag doesn’t cover customer-specific Storage or SQL traffic from HDInsight. Enable these using [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or add them manually.|
34-
|WindowsVirtualDesktop|Allows outbound Windows Virtual Desktop platform traffic.
34+
|WindowsVirtualDesktop (WVD)|Allows outbound Windows Virtual Desktop platform traffic. This tag doesn’t cover deployment-specific Storage and Service Bus endpoints created by WVD. Additionally, DNS and KMS network rules are required. For more information about integrating Azure Firewall with WVD, see [Use Azure Firewall to protect Window Virtual Desktop deployments](protect-windows-virtual-desktop.md).
3535

3636
> [!NOTE]
3737
> When selecting FQDN Tag in an application rule, the protocol:port field must be set to **https**.
113 KB
Loading

articles/firewall/protect-windows-virtual-desktop.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.author: victorh
1313

1414
Windows Virtual Desktop (WVD) is a desktop and app virtualization service that runs on Azure. When an end user connects to a Windows Virtual Desktop environment, their session is run by a host pool. A host pool is a collection of Azure virtual machines that register to Windows Virtual Desktop as session hosts. These virtual machines run in your virtual network and are subject to the virtual network security controls. They need outbound Internet access to the WVD service to operate properly and might also need outbound Internet access for end users. Azure Firewall can help you lock down your environment and filter outbound traffic.
1515

16+
![Windows Virtual Desktop architrecture](media/protect-windows-virtual-desktop/wvd-architecture-diagram.png)
17+
1618
Follow the guidelines in this article to provide additional protection for your WVD host pool using Azure Firewall.
1719

1820
## Prerequisites

0 commit comments

Comments
 (0)