Skip to content

Commit d8ca943

Browse files
Merge pull request #209615 from igorpag/igorpag-fwavd-patch2
Fixed minor issues from another PR
2 parents 73abcba + 5cc8387 commit d8ca943

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/firewall/protect-azure-virtual-desktop.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ Follow the guidelines in this article to provide extra protection for your Azure
2121

2222
- A deployed Azure Virtual Desktop environment and host pool.
2323
- An Azure Firewall deployed with at least one Firewall Manager Policy.
24-
- DNS and DNS Proxy enabled in the Firewall Policy to use [FQDN in Network Rules](https://docs.microsoft.com/azure/firewall/fqdn-filtering-network-rules).
24+
- DNS and DNS Proxy enabled in the Firewall Policy to use [FQDN in Network Rules](../firewall/fqdn-filtering-network-rules.md).
2525

26-
For more information, see [Tutorial: Create a host pool by using the Azure portal](../virtual-desktop/create-host-pools-azure-marketplace.md)
26+
For more information, see [Tutorial: Create a host pool by using the Azure portal](../virtual-desktop/create-host-pools-azure-marketplace.md)
2727

2828
To learn more about Azure Virtual Desktop environments see [Azure Virtual Desktop environment](../virtual-desktop/environment-setup.md).
2929

@@ -32,11 +32,11 @@ To learn more about Azure Virtual Desktop environments see [Azure Virtual Deskto
3232
The Azure virtual machines you create for Azure Virtual Desktop must have access to several Fully Qualified Domain Names (FQDNs) to function properly. Azure Firewall provides an Azure Virtual Desktop FQDN Tag to simplify this configuration. Use the following steps to allow outbound Azure Virtual Desktop platform traffic:
3333

3434
You'll need to create an Azure Firewall Policy and create Rule Collections for Network Rules and Applications Rules. Give the Rule Collection a priority and an allow or deny action.
35-
In order to identify a specific AVD Host Pool as "Source" in the tables below, [IP Group](https://docs.microsoft.com/azure/firewall/ip-groups) can be created to represent it.
35+
In order to identify a specific AVD Host Pool as "Source" in the tables below, [IP Group](../firewall/ip-groups.md) can be created to represent it.
3636

3737
### Create network rules
3838

39-
Based on the Azure Virtual Desktop (AVD) [reference article](https://docs.microsoft.com/azure/virtual-desktop/safe-url-list), these are the ***mandatory*** rules to allow outbound access to the control plane and core dependent services:
39+
Based on the Azure Virtual Desktop (AVD) [reference article](../virtual-desktop/safe-url-list.md), these are the ***mandatory*** rules to allow outbound access to the control plane and core dependent services:
4040

4141
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
4242
| --------- | -------------------- | ------------------------------------- | -------- | ----------------- | ---------------- | --------------------------------- |

0 commit comments

Comments
 (0)