You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Servers located on-premises or in other clouds can be managed with machine configuration
255
+
by connecting them to [Azure Arc](../../azure-arc/servers/overview.md).
258
256
259
-
For Arc-enabled servers in private datacenters, allow traffic using the
260
-
following patterns:
257
+
For Azure Arc-enabled servers, allow traffic using the following patterns:
261
258
262
259
- Port: Only TCP 443 required for outbound internet access
263
260
- Global URL: `*.guestconfiguration.azure.com`
264
261
262
+
See the [Azure Arc-enabled servers network requirements](../../azure-arc/servers/network-requirements.md) for a full list
263
+
of all network endpoints required by the Azure Connected Machine Agent for core Azure Arc and machine configuration scenarios.
264
+
265
+
### Communicate over Private Link outside of Azure
266
+
267
+
When using [private link with Arc-enabled servers](../../azure-arc/servers/private-link-security.md), built-in policy packages will automatically be downloaded over the private link.
268
+
You do not need to set any tags on the Arc-enabled server to enable this feature.
269
+
265
270
## Assigning policies to machines outside of Azure
266
271
267
272
The Audit policy definitions available for machine configuration include the
268
273
**Microsoft.HybridCompute/machines** resource type. Any machines onboarded to
269
-
[Azure Arc for servers](../../azure-arc/servers/overview.md) that are in the
274
+
[Azure Arc-enabled servers](../../azure-arc/servers/overview.md) that are in the
270
275
scope of the policy assignment are automatically included.
0 commit comments