Skip to content

Commit cc2d9a0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nat-tb-edits
2 parents f2755ce + fddce65 commit cc2d9a0

File tree

1 file changed

+18
-14
lines changed

1 file changed

+18
-14
lines changed

articles/virtual-desktop/safe-url-list.md

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,42 +3,43 @@ title: Required URLs for Azure Virtual Desktop
33
description: A list of URLs you must unblock to ensure your Azure Virtual Desktop deployment works as intended.
44
author: Heidilohr
55
ms.topic: conceptual
6-
ms.date: 05/26/2022
6+
ms.date: 08/30/2022
77
ms.author: helohr
88
manager: femila
99
---
1010

1111
# Required URLs for Azure Virtual Desktop
1212

13-
In order to deploy and make Azure Virtual Desktop available to your users, you must allow specific URLs that your session host virtual machines (VMs) can access them anytime. Users also need to be able to connect to certain URLs to access their Azure Virtual Desktop resources. This article lists the required URLs you need to allow for your session hosts and users. Azure Virtual Desktop doesn't support deployments that block the URLs listed in this article.
13+
In order to deploy and make Azure Virtual Desktop available to your users, you must allow specific URLs that your session host virtual machines (VMs) can access them anytime. Users also need to be able to connect to certain URLs to access their Azure Virtual Desktop resources. This article lists the required URLs you need to allow for your session hosts and users if you're using [Azure Firewall](../firewall/protect-azure-virtual-desktop.md) or a third-party firewall or proxy service. Azure Virtual Desktop doesn't support deployments that block the URLs listed in this article.
1414

1515
You can validate that your session host VMs can connect to these URLs by following the steps to run the [Required URL Check tool](required-url-check-tool.md). The Required URL Check tool will validate each URL and show whether your session host VMs can access them. You can only use for deployments in the Azure public cloud, it does not check access for sovereign clouds.
1616

1717
## Session host virtual machines
1818

19-
Below is the list of URLs your session host VMs need to access for Azure Virtual Desktop. Select the relevant tab based on which cloud you're using.
19+
The following table is the list of URLs your session host VMs need to access for Azure Virtual Desktop. Select the relevant tab based on which cloud you're using.
2020

2121
# [Azure cloud](#tab/azure)
2222

23-
| Address | Outbound TCP port | Purpose | Service Tag |
23+
| Address | Outbound TCP port | Purpose | Service tag |
2424
|---|---|---|---|
25+
| `login.microsoftonline.com` | 443 | Authentication to Microsoft Online Services |
2526
| `*.wvd.microsoft.com` | 443 | Service traffic | WindowsVirtualDesktop |
2627
| `*.prod.warm.ingest.monitor.core.windows.net` | 443 | Agent traffic | AzureMonitor |
2728
| `catalogartifact.azureedge.net` | 443 | Azure Marketplace | AzureFrontDoor.Frontend |
2829
| `gcs.prod.monitoring.core.windows.net` | 443 | Agent traffic | AzureCloud |
2930
| `kms.core.windows.net` | 1688 | Windows activation | Internet |
3031
| `azkms.core.windows.net` | 1688 | Windows activation | Internet |
31-
| `mrsglobalsteus2prod.blob.core.windows.net` | 443 | Agent and SXS stack updates | AzureCloud |
32+
| `mrsglobalsteus2prod.blob.core.windows.net` | 443 | Agent and side-by-side (SXS) stack updates | AzureCloud |
3233
| `wvdportalstorageblob.blob.core.windows.net` | 443 | Azure portal support | AzureCloud |
3334
| `169.254.169.254` | 80 | [Azure Instance Metadata service endpoint](../virtual-machines/windows/instance-metadata-service.md) | N/A |
3435
| `168.63.129.16` | 80 | [Session host health monitoring](../virtual-network/network-security-groups-overview.md#azure-platform-considerations) | N/A |
3536
| `oneocsp.microsoft.com` | 80 | Certificates | N/A |
3637
| `www.microsoft.com` | 80 | Certificates | N/A |
3738

3839
> [!IMPORTANT]
39-
> We have finished transitioning the URLs we use for Agent traffic. We no longer support the URLs below. To avoid your session host VMs from showing *Needs Assistance* related to this, please allow `*.prod.warm.ingest.monitor.core.windows.net` if you have not already. Please remove these URLs if you have previously explicitly allowed them:
40+
> We've finished transitioning the URLs we use for Agent traffic. We no longer support the following URLs. To prevent your session host VMs from showing a *Needs Assistance* status, You must allow `*.prod.warm.ingest.monitor.core.windows.net` if you haven't already. You must also remove the following URLs if you explicitly allowed them before the change:
4041
>
41-
> | Address | Outbound TCP port | Purpose | Service Tag |
42+
> | Address | Outbound TCP port | Purpose | Service tag |
4243
> |--|--|--|--|
4344
> | `production.diagnostics.monitoring.core.windows.net` | 443 | Agent traffic | AzureCloud |
4445
> | `*xt.blob.core.windows.net` | 443 | Agent traffic | AzureCloud |
@@ -50,7 +51,6 @@ The following table lists optional URLs that your session host virtual machines
5051

5152
| Address | Outbound TCP port | Purpose |
5253
|--|--|--|
53-
| `login.microsoftonline.com` | 443 | Authentication to Microsoft Online Services |
5454
| `login.windows.net` | 443 | Sign in to Microsoft Online Services and Microsoft 365 |
5555
| `*.events.data.microsoft.com` | 443 | Telemetry Service |
5656
| `www.msftconnecttest.com` | 443 | Detects if the OS is connected to the internet |
@@ -62,22 +62,23 @@ The following table lists optional URLs that your session host virtual machines
6262

6363
# [Azure for US Government](#tab/azure-for-us-government)
6464

65-
| Address | Outbound TCP port | Purpose | Service Tag |
65+
| Address | Outbound TCP port | Purpose | Service tag |
6666
|--|--|--|--|
67+
| `login.microsoftonline.us` | 443 | Authentication to Microsoft Online Services and Microsoft 365 |
6768
| `*.wvd.azure.us` | 443 | Service traffic | WindowsVirtualDesktop |
6869
| `*.prod.warm.ingest.monitor.core.usgovcloudapi.net` | 443 | Agent traffic | AzureMonitor |
6970
| `gcs.monitoring.core.usgovcloudapi.net` | 443 | Agent traffic | AzureCloud |
7071
| `kms.core.usgovcloudapi.net` | 1688 | Windows activation | Internet |
71-
| `mrsglobalstugviffx.blob.core.usgovcloudapi.net` | 443 | Agent and SXS stack updates | AzureCloud |
72+
| `mrsglobalstugviffx.blob.core.usgovcloudapi.net` | 443 | Agent and side-by-side (SXS) stack updates | AzureCloud |
7273
| `wvdportalstorageblob.blob.core.usgovcloudapi.net` | 443 | Azure portal support | AzureCloud |
7374
| `169.254.169.254` | 80 | [Azure Instance Metadata service endpoint](../virtual-machines/windows/instance-metadata-service.md) | N/A |
7475
| `168.63.129.16` | 80 | [Session host health monitoring](../virtual-network/network-security-groups-overview.md#azure-platform-considerations) | N/A |
7576
| `ocsp.msocsp.com` | 80 | Certificates | N/A |
7677

7778
> [!IMPORTANT]
78-
> We have finished transitioning the URLs we use for Agent traffic. We no longer support the URLs below. To avoid your session host VMs from showing *Needs Assistance* related to this, please allow `*.prod.warm.ingest.monitor.core.usgovcloudapi.net`, if you have not already. Please remove these URLs if you have previously explicitly allowed them:
79+
> We've finished transitioning the URLs we use for Agent traffic. We no longer support the following URLs. To prevent your session host VMs from showing a *Needs Assistance* status, you must allow the URL `*.prod.warm.ingest.monitor.core.usgovcloudapi.net`, if you haven't already. You must also remove the following URLs if you explicitly allowed them before the change:
7980
>
80-
> | Address | Outbound TCP port | Purpose | Service Tag |
81+
> | Address | Outbound TCP port | Purpose | Service tag |
8182
> |--|--|--|--|
8283
> | `monitoring.core.usgovcloudapi.net` | 443 | Agent traffic | AzureCloud |
8384
> | `fairfax.warmpath.usgovcloudapi.net` | 443 | Agent traffic | AzureCloud |
@@ -89,7 +90,6 @@ The following table lists optional URLs that your session host virtual machines
8990

9091
| Address | Outbound TCP port | Purpose |
9192
|--|--|--|
92-
| `login.microsoftonline.us` | 443 | Authentication to Microsoft Online Services and Microsoft 365 |
9393
| `*.events.data.microsoft.com` | 443 | Telemetry Service |
9494
| `www.msftconnecttest.com` | 443 | Detects if the OS is connected to the internet |
9595
| `*.prod.do.dsp.mp.microsoft.com` | 443 | Windows Update |
@@ -121,7 +121,7 @@ Azure Virtual Desktop currently doesn't have a list of IP address ranges that yo
121121

122122
## Remote Desktop clients
123123

124-
Any [Remote Desktop clients](user-documentation/connect-windows-7-10.md?toc=%2Fazure%2Fvirtual-desktop%2Ftoc.json&bc=%2Fazure%2Fvirtual-desktop%2Fbreadcrumb%2Ftoc.json) you use to connect to Azure Virtual Desktop must have access to the URLs below. Select the relevant tab based on which cloud you're using. Opening these URLs is essential for a reliable client experience. Blocking access to these URLs is unsupported and will affect service functionality.
124+
Any [Remote Desktop clients](user-documentation/connect-windows-7-10.md?toc=%2Fazure%2Fvirtual-desktop%2Ftoc.json&bc=%2Fazure%2Fvirtual-desktop%2Fbreadcrumb%2Ftoc.json) you use to connect to Azure Virtual Desktop must have access to the following URLs. Select the relevant tab based on which cloud you're using. Opening these URLs is essential for a reliable client experience. Blocking access to these URLs is unsupported and will affect service functionality.
125125

126126
# [Azure cloud](#tab/azure)
127127

@@ -150,3 +150,7 @@ Any [Remote Desktop clients](user-documentation/connect-windows-7-10.md?toc=%2Fa
150150
---
151151

152152
These URLs only correspond to client sites and resources. This list doesn't include URLs for other services like Azure Active Directory or Office 365. Azure Active Directory URLs can be found under IDs 56, 59 and 125 in [Office 365 URLs and IP address ranges](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
153+
154+
## Next steps
155+
156+
To learn how to unblock these URLs in Azure Firewall for your Azure Virtual Desktop deployment, see [Use Azure Firewall to protect Azure Virtual Desktop](../firewall/protect-azure-virtual-desktop.md).

0 commit comments

Comments
 (0)