Skip to content

Commit d2e3522

Browse files
authored
Merge pull request #112463 from vhorne/fw-wvd
add protect wvd article
2 parents 8a0bfc3 + 0261629 commit d2e3522

File tree

4 files changed

+78
-1
lines changed

4 files changed

+78
-1
lines changed

articles/firewall/fqdn-tags.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 11/19/2019
8+
ms.date: 04/24/2020
99
ms.author: victorh
1010
---
1111

@@ -31,6 +31,7 @@ The following table shows the current FQDN tags you can use. Microsoft maintains
3131
|App Service Environment (ASE)|Allows outbound access to ASE platform traffic. This tag doesn’t cover customer-specific Storage and SQL endpoints created by ASE. These should be enabled via [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or added manually.<br><br>For more information about integrating Azure Firewall with ASE, see [Locking down an App Service Environment](../app-service/environment/firewall-integration.md#configuring-azure-firewall-with-your-ase).|
3232
|Azure Backup|Allows outbound access to the Azure Backup services.|
3333
|Azure HDInsight|Allows outbound access for HDInsight platform traffic. This tag doesn’t cover customer-specific Storage or SQL traffic from HDInsight. Enable these using [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or add them manually.|
34+
|WindowsVirtualDesktop (WVD)|Allows outbound Windows Virtual Desktop platform traffic. This tag doesn’t cover deployment-specific Storage and Service Bus endpoints created by WVD. Additionally, DNS and KMS network rules are required. For more information about integrating Azure Firewall with WVD, see [Use Azure Firewall to protect Window Virtual Desktop deployments](protect-windows-virtual-desktop.md).
3435

3536
> [!NOTE]
3637
> When selecting FQDN Tag in an application rule, the protocol:port field must be set to **https**.
120 KB
Loading
Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
---
2+
title: Use Azure Firewall to protect Windows Virtual Desktop
3+
description: Learn how to use Azure Firewall to protect Windows Virtual Desktop deployments
4+
author: vhorne
5+
ms.service: firewall
6+
services: firewall
7+
ms.topic: conceptual
8+
ms.date: 04/28/2020
9+
ms.author: victorh
10+
---
11+
12+
# Use Azure Firewall to protect Window Virtual Desktop deployments
13+
14+
Windows Virtual Desktop (WVD) is a desktop and app virtualization service that runs on Azure. When an end user connects to a Windows Virtual Desktop environment, their session is run by a host pool. A host pool is a collection of Azure virtual machines that register to Windows Virtual Desktop as session hosts. These virtual machines run in your virtual network and are subject to the virtual network security controls. They need outbound Internet access to the WVD service to operate properly and might also need outbound Internet access for end users. Azure Firewall can help you lock down your environment and filter outbound traffic.
15+
16+
[ ![Windows Virtual Desktop architecture](media/protect-windows-virtual-desktop/windows-virtual-desktop-architecture-diagram.png) ](media/protect-windows-virtual-desktop/windows-virtual-desktop-architecture-diagram.png#lightbox)
17+
18+
Follow the guidelines in this article to provide additional protection for your WVD host pool using Azure Firewall.
19+
20+
## Prerequisites
21+
22+
23+
- A deployed WVD environment and host pool.
24+
25+
For more information, see [Tutorial: Create a host pool by using the Azure Marketplace](../virtual-desktop/create-host-pools-azure-marketplace.md) and [Create a host pool with an Azure Resource Manager template](../virtual-desktop/create-host-pools-arm-template.md).
26+
27+
To learn more about WVD environments see [Windows Virtual Desktop environment](../virtual-desktop/environment-setup.md).
28+
29+
## Host pool outbound access to Windows Virtual Desktop
30+
31+
The Azure virtual machines you create for Windows Virtual Desktop must have access to several Fully Qualified Domain Names (FQDNs) to function properly. Azure Firewall provides a Windows Virtual Desktop FQDN Tag to simplify this configuration. Use the following steps to allow outbound WVD platform traffic:
32+
33+
- Deploy Azure Firewall and configure your WVD host pool subnet User Defined Route (UDR) to route all traffic via the Azure Firewall. Your default route now points to the firewall.
34+
- Create an application rule collection and add a rule to enable the *WindowsVirtualDesktop* FQDN tag. The source IP address range is the host pool virtual network, the protocol is **https**, and the destination is **WindowsVirtualDesktop**.
35+
36+
- The set of required storage and service bus accounts for your WVD host pool is deployment specific, so it isn't yet captured in the WindowsVirtualDesktop FQDN tag. You can address this in one of the following ways:
37+
38+
- Allow https access from your host pool subnet to *xt.blob.core.windows.net, *eh.servicebus.windows.net and *xt.table.core.windows.net. These wildcard FQDNs enable the required access, but are less restrictive.
39+
- Use the following log analytics query to list the exact required FQDNs, and then allow them explicitly in your firewall application rules:
40+
```
41+
AzureDiagnostics
42+
| where Category == "AzureFirewallApplicationRule"
43+
| search "Deny"
44+
| search "gsm*eh.servicebus.windows.net" or "gsm*xt.blob.core.windows.net" or "gsm*xt.table.core.windows.net"
45+
| parse msg_s with Protocol " request from " SourceIP ":" SourcePort:int " to " FQDN ":" *
46+
| project TimeGenerated,Protocol,FQDN
47+
```
48+
49+
- Create a network rule collection add the following rules:
50+
51+
- Allow DNS – allow traffic from your ADDS private IP address to * for TCP and UDP ports 53.
52+
- Allow KMS – allow traffic from your WVD virtual machines to Windows Activation Service TCP port 1688. For more information about the destination IP addresses, see [Windows activation fails in forced tunneling scenario](../virtual-machines/troubleshooting/custom-routes-enable-kms-activation.md#solution).
53+
54+
> [!NOTE]
55+
> Some deployments may not need DNS rules, for example Azure Active Directory Domain controllers forward DNS queries to Azure DNS at 168.63.129.16.
56+
57+
## Host pool outbound access to the Internet
58+
59+
Depending on your organization needs, you may want to enable secure outbound Internet access for your end users. In cases where the list of allowed destinations is well-defined (for example [Office 365 access](https://docs.microsoft.com/Office365/Enterprise/office-365-ip-web-service)) you can use Azure Firewall application and network rules to configure the required access. This routes end-user traffic directly to the Internet for best performance.
60+
61+
If you want to filter outbound user Internet traffic using an existing on-premises secure web gateway, you can configure web browsers or other applications running on the WVD host pool with an explicit proxy configuration. For example, see [How to use Microsoft Edge command-line options to configure proxy settings](https://docs.microsoft.com/deployedge/edge-learnmore-cmdline-options-proxy-settings). These proxy settings only influence your end-user Internet access, allowing the WVD platform outbound traffic directly via Azure Firewall.
62+
63+
## Additional considerations
64+
65+
You may need to configure additional firewall rules, depending on your requirements:
66+
67+
- NTP server access
68+
69+
By default, virtual machines running Windows connect to time.windows.com over UDP port 123 for time synchronization. Create a network rule to allow this access, or for a time server that you use in your environment.
70+
71+
72+
## Next steps
73+
74+
- Learn more about Windows Virtual Desktop: [What is Windows Virtual Desktop?](../virtual-desktop/overview.md)

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,8 @@
7575
href: snat-private-range.md
7676
- name: Create IP Groups
7777
href: create-ip-group.md
78+
- name: Protect Windows Virtual Desktop
79+
href: protect-windows-virtual-desktop.md
7880
- name: Reference
7981
items:
8082
- name: Azure CLI

0 commit comments

Comments
 (0)