You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/protect-azure-virtual-desktop.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,9 +21,9 @@ Follow the guidelines in this article to provide extra protection for your Azure
21
21
22
22
- A deployed Azure Virtual Desktop environment and host pool.
23
23
- An Azure Firewall deployed with at least one Firewall Manager Policy.
24
-
- DNS and DNS Proxy enabled in the Firewall Policy to use [FQDN in Network Rules](https://docs.microsoft.com/azure/firewall/fqdn-filtering-network-rules).
24
+
- DNS and DNS Proxy enabled in the Firewall Policy to use [FQDN in Network Rules](../firewall/fqdn-filtering-network-rules.md).
25
25
26
-
For more information, see [Tutorial: Create a host pool by using the Azure portal](../virtual-desktop/create-host-pools-azure-marketplace.md)
26
+
For more information, see [Tutorial: Create a host pool by using the Azure portal](../virtual-desktop/create-host-pools-azure-marketplace.md)
27
27
28
28
To learn more about Azure Virtual Desktop environments see [Azure Virtual Desktop environment](../virtual-desktop/environment-setup.md).
29
29
@@ -32,11 +32,11 @@ To learn more about Azure Virtual Desktop environments see [Azure Virtual Deskto
32
32
The Azure virtual machines you create for Azure Virtual Desktop must have access to several Fully Qualified Domain Names (FQDNs) to function properly. Azure Firewall provides an Azure Virtual Desktop FQDN Tag to simplify this configuration. Use the following steps to allow outbound Azure Virtual Desktop platform traffic:
33
33
34
34
You'll need to create an Azure Firewall Policy and create Rule Collections for Network Rules and Applications Rules. Give the Rule Collection a priority and an allow or deny action.
35
-
In order to identify a specific AVD Host Pool as "Source" in the tables below, [IP Group](https://docs.microsoft.com/azure/firewall/ip-groups) can be created to represent it.
35
+
In order to identify a specific AVD Host Pool as "Source" in the tables below, [IP Group](../firewall/ip-groups.md) can be created to represent it.
36
36
37
37
### Create network rules
38
38
39
-
Based on the Azure Virtual Desktop (AVD) [reference article](https://docs.microsoft.com/azure/virtual-desktop/safe-url-list), these are the ***mandatory*** rules to allow outbound access to the control plane and core dependent services:
39
+
Based on the Azure Virtual Desktop (AVD) [reference article](../virtual-desktop/safe-url-list.md), these are the ***mandatory*** rules to allow outbound access to the control plane and core dependent services:
40
40
41
41
| Name | Source type | Source | Protocol | Destination ports | Destination type | Destination |
0 commit comments