Skip to content

Commit b78abd5

Browse files
Merge pull request #297363 from duongau/patch-20
Firewall - Protect M365 (add description for category)
2 parents 8f2879c + 6219844 commit b78abd5

File tree

1 file changed

+18
-16
lines changed

1 file changed

+18
-16
lines changed
Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,30 @@
11
---
2-
title: Use Azure Firewall to protect Office 365
3-
description: Learn how to use Azure Firewall to protect Office 365
2+
title: Use Azure Firewall to protect Microsoft 365
3+
description: Learn how to use Azure Firewall to protect Microsoft 365
44
author: duongau
55
ms.service: azure-firewall
66
services: firewall
77
ms.topic: how-to
8-
ms.date: 11/27/2023
8+
ms.date: 03/31/2025
99
ms.author: yuvalpery
1010
---
1111

12-
# Use Azure Firewall to protect Office 365
12+
# Use Azure Firewall to protect Microsoft 365
1313

14-
You can use the Azure Firewall built-in Service Tags and FQDN tags to allow outbound communication to [Office 365 endpoints and IP addresses](/microsoft-365/enterprise/urls-and-ip-address-ranges).
14+
You can use the Azure Firewall built-in Service Tags and FQDN tags to allow outbound communication to [Microsoft 365 endpoints and IP addresses](/microsoft-365/enterprise/urls-and-ip-address-ranges).
1515

1616
> [!NOTE]
17-
> Office 365 service tags and FQDN tags are supported in Azure Firewall policy only. They aren't supported in classic rules.
17+
> Microsoft 365 service tags and FQDN tags are supported in Azure Firewall policy only. They aren't supported in classic rules.
1818
1919
## Tags creation
2020

21-
For each Office 365 product and category, Azure Firewall automatically retrieves the required endpoints and IP addresses, and creates tags accordingly:
21+
For each Microsoft 365 product and category, Azure Firewall automatically retrieves the required endpoints and IP addresses, and creates tags accordingly:
2222

23-
- Tag name: all names begin with **Office365** and are followed by:
23+
- Tag name: all names begin with **Microsoft365** and are followed by:
2424
- Product: Exchange / Skype / SharePoint / Common
25-
- Category: Optimize / Allow / Default
25+
- [Category](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#optimizing-connectivity-to-microsoft-365-services):
26+
- Optimize & Allow: Network endpoints with **Optimize** or **Allow** category carry higher traffic volume and are sensitive to network latency and performance. These endpoints have IP addresses listed with the domain.
27+
- Default: Network endpoints in the **Default** category don't have associated IP addresses because they are dynamic in nature and IP addresses change over time.
2628
- Required / Not required (optional)
2729
- Tag type:
2830
- **FQDN tag** represents only the required FQDNs for the specific product and category that communicate over HTTP/HTTPS (ports 80/443) and can be used in Application Rules to secure traffic to these FQDNs and protocols.
@@ -35,24 +37,24 @@ You should accept a tag being available for a specific combination of product, c
3537
Tags are updated automatically with any modifications to the required IPv4 addresses and FQDNs. New tags might be created automatically in the future as well if new combinations of product and category are added.
3638

3739
Network rule collection:
38-
:::image type="content" source="media/protect-office-365/network-rule-collection.png" alt-text="Screenshot showing Office 365 network rule collection.":::
40+
:::image type="content" source="media/protect-office-365/network-rule-collection.png" alt-text="Screenshot showing Microsoft 365 network rule collection.":::
3941

4042
Application rule collection:
41-
:::image type="content" source="media/protect-office-365/application-rule-collection.png" alt-text="Screenshot showing Office 365 application rule collection.":::
43+
:::image type="content" source="media/protect-office-365/application-rule-collection.png" alt-text="Screenshot showing Microsoft 365 application rule collection.":::
4244

4345
## Rules configuration
4446

45-
These built-in tags provide granularity to allow and protect the outbound traffic to Office 365 based on your preferences and usage. You can allow outbound traffic only to specific products and categories for a specific source. You can also use [Azure Firewall Premium’s TLS Inspection and IDPS](premium-features.md) to monitor some of the traffic. For example, traffic to endpoints in the Default category that can be treated as normal Internet outbound traffic. For more information about Office 365 endpoint categories, see [New Office 365 endpoint categories](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#new-office-365-endpoint-categories).
47+
These built-in tags provide granularity to allow and protect the outbound traffic to Microsoft 365 based on your preferences and usage. You can allow outbound traffic only to specific products and categories for a specific source. You can also use [Azure Firewall Premium’s TLS Inspection and IDPS](premium-features.md) to monitor some of the traffic. For example, traffic to endpoints in the Default category that can be treated as normal Internet outbound traffic. For more information about Microsoft 365 endpoint categories, see [New Microsoft 365 endpoint categories](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#new-office-365-endpoint-categories).
4648

47-
When you create the rules, ensure you define the required TCP ports (for network rules) and protocols (for application rules) as required by Office 365. If a specific combination of product, category and required/not required have both a Service Tag and an FQDN tag, you should create representative rules for both tags to fully cover the required communication.
49+
When you create the rules, ensure you define the required TCP ports (for network rules) and protocols (for application rules) as required by Microsoft 365. If a specific combination of product, category and required/not required have both a Service Tag and an FQDN tag, you should create representative rules for both tags to fully cover the required communication.
4850

4951
## Limitations
5052

51-
If a specific combination of product, category and required/not required has only FQDNs required, but uses TCP ports that aren't 80/443, an FQDN tag isn't be created for this combination. Application Rules can only cover HTTP, HTTPS or MSSQL. To allow communication to these FQDNs, create your own network rules with these FQDNs and ports.
53+
If a specific combination of product, category and required/not required has only FQDNs required, but uses TCP ports that aren't 80/443, an FQDN tag isn't created for this combination. Application Rules can only cover HTTP, HTTPS or MSSQL. To allow communication to these FQDNs, create your own network rules with these FQDNs and ports.
5254
For more information, see [Use FQDN filtering in network rules](fqdn-filtering-network-rules.md).
5355

5456
## Next steps
5557

56-
- For more information, see [Protect Office365 and Windows365 with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/protect-office365-and-windows365-with-azure-firewall/ba-p/3824533).
57-
- Learn more about Office 365 network connectivity: [Microsoft 365 network connectivity overview](/microsoft-365/enterprise/microsoft-365-networking-overview)
58+
- For more information, see [Protect Microsoft 365 and Windows 365 with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/protect-office365-and-windows365-with-azure-firewall/ba-p/3824533).
59+
- Learn more about Microsoft 365 network connectivity: [Microsoft 365 network connectivity overview](/microsoft-365/enterprise/microsoft-365-networking-overview)
5860

0 commit comments

Comments
 (0)