Skip to content

Commit 29a5e0e

Browse files
Merge pull request #4138 from DeCohen/WI435766-mda-network-requirement-updates
Update firewall allowlist network requirements
2 parents 5d20aeb + 624d955 commit 29a5e0e

File tree

2 files changed

+51
-14
lines changed

2 files changed

+51
-14
lines changed

CloudAppSecurityDocs/network-requirements.md

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,23 @@ ms.topic: reference
88
# Network requirements
99

1010
>[!IMPORTANT]
11+
> **Important notice for GCC and Gov customers**
1112
>
12-
> **Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively, if you currently allow outbound traffic based on Azure service tags, please add the new Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’ to your allowlist. This tag will be adjusted to reflect the above range by April 28, 2025.
13-
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.
13+
> To prevent service disruption in Microsoft Defender for Cloud Apps, take immediate action by August 25, 2025.
14+
> Update your firewall configuration as follows:
15+
>
16+
> Allow outbound traffic on port 443 to the following IP ranges:
17+
>
18+
> - `51.54.53.136/29`
19+
> - `51.54.114.160/29`
20+
> - `62.11.173.176/29`
21+
>
22+
> If you use Azure service tags for outbound traffic, add the Azure Gov service tag `AzureFrontDoor.MicrosoftSecurity` tag to your firewall allowlist.
23+
>
24+
> Add the following endpoint to your firewall allowlist on port 443:
25+
> - `discoveryresources-cdn-prod.cloudappsecurity.com`
26+
>
27+
> For the full list of required IP addresses and DNS names, see [Portal access](network-requirements.md#portal-access).
1428
1529
This article provides a list of ports and IP addresses you need to allow and allowlist to work with Microsoft Defender for Cloud Apps.
1630

@@ -35,6 +49,8 @@ To see which data center you're connecting to, do the following steps:
3549
1. In the **About** screen, you can see the region and the data center.
3650

3751
![View your data center.](media/data-center.png)
52+
53+
3854

3955
## Portal access
4056

@@ -53,7 +69,6 @@ To use Defender for Cloud Apps in the Microsoft Defender Portal:
5369
static2.sharepointonline.com
5470
*.blob.core.windows.net
5571
discoveryresources-cdn-prod.cloudappsecurity.com
56-
discoveryresources-cdn-gov.cloudappsecurity.us
5772
```
5873

5974
1. Allow the following items based on your data center:
@@ -65,8 +80,8 @@ To use Defender for Cloud Apps in the Microsoft Defender Portal:
6580
|US3|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.90.218.196, 40.90.218.198, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.3.226.231, 4.255.218.227|*.us3.portal.cloudappsecurity.com|
6681
|EU1|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.119.154.72, 51.143.58.207, 52.137.89.147, 52.157.238.58, 52.174.56.180, 52.183.75.62, 20.71.203.39, 137.116.224.49|\*.eu.portal.cloudappsecurity.com|
6782
|EU2|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.81.156.154, 40.81.156.156, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.0.210.84, 20.90.9.64|*.eu2.portal.cloudappsecurity.com|
68-
|Gov US1|13.72.19.4, 52.227.143.223|*.us1.portal.cloudappsecurity.us|
69-
|GCC| 52.227.23.181, 52.227.180.126| *.us1.portal.cloudappsecuritygov.com |
83+
|Gov US1|13.72.19.4, 52.227.143.223, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29|*.us1.portal.cloudappsecurity.us|
84+
|GCC| 52.227.23.181, 52.227.180.126, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29|*.us1.portal.cloudappsecuritygov.com|
7085

7186
> [!NOTE]
7287
> For portal access, instead of a wildcard (\*), you can choose to open only your specific tenant URL. For example, based on the screenshot above you can open: `contoso.us.portal.cloudappsecurity.com`. To determine your tenant URL, see the earlier section [View your data center](#view-your-data-center), and look for **API URL**.
@@ -151,8 +166,8 @@ To enable Defender for Cloud Apps to connect to your SIEM, add **outbound port 4
151166
|US3|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.90.218.196, 40.90.218.198, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.3.226.231, 4.255.218.227|
152167
|EU1|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.119.154.72, 51.143.58.207, 52.137.89.147, 52.157.238.58, 52.174.56.180, 52.183.75.62, 20.71.203.39, 137.116.224.49|
153168
|EU2|13.107.219.0/24, 13.107.227.0/24, 13.107.228.0/24, 13.107.229.0/24, 150.171.97.0/24, 13.80.125.22, 40.74.1.235, 40.74.6.204, 40.81.156.154, 40.81.156.156, 51.143.58.207, 52.137.89.147, 52.183.75.62, 20.0.210.84, 20.90.9.64|
154-
|Gov US1|13.72.19.4, 52.227.143.223|
155-
|GCC| 52.227.23.181, 52.227.180.126|
169+
|Gov US1|13.72.19.4, 52.227.143.223, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29 |
170+
|GCC| 52.227.23.181, 52.227.180.126, 51.54.53.136/29, 51.54.114.160/29, 62.11.173.176/29|
156171

157172
> [!NOTE]
158173
>

CloudAppSecurityDocs/release-notes.md

Lines changed: 29 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,33 @@ For more information on what's new with other Microsoft Defender security produc
2020

2121
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2222

23-
>[!IMPORTANT]
24-
> **Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you're using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 28, 2025.\
25-
> This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 29, 2025.
26-
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.\
27-
> Learn more: [Network requirements](https://aka.ms/MDANetworkDocs).
23+
## July 2025
24+
25+
### Updated network requirements for GCC and Gov customers
26+
27+
To support ongoing security enhancements and maintain service availability, Microsoft Defender for Cloud Apps now requires updated firewall configurations for customers in GCC and Gov environments.
28+
29+
To avoid service disruption, take action by **August 25, 2025**, and update your firewall configuration as follows:
30+
31+
Allow outbound traffic on port 443 to the following IP ranges:
32+
- `51.54.53.136/29`
33+
- `51.54.114.160/29`
34+
- `62.11.173.176/29`
35+
36+
If you're using Azure service tags, add `AzureFrontDoor.MicrosoftSecurity` to your firewall allowlist.
37+
38+
Add the following endpoint to your firewall allowlist on port 443:
39+
- `discoveryresources-cdn-prod.cloudappsecurity.com`
40+
41+
For the full list of required IP addresses and endpoints, see [Network requirements](network-requirements.md#portal-access).
2842

2943

3044
## June 2025
3145

46+
3247
### “Behaviors” data type in Microsoft Defender for Cloud Apps - General Availability
3348

34-
The **Behaviors** data type significantly enhances overall threat detection accuracy by reducing alerts on generic anomalies and surfacing alerts only when observed patterns align with real security scenarios. You can now use **Behaviors** to conduct investigations in [Advanced Hunting](https://learn.microsoft.com/defender-xdr/advanced-hunting-overview), build better [custom detections](https://learn.microsoft.com/defender-xdr/custom-detection-rules) based on behavioral signals, and benefit from automatic inclusion of context-related behaviors into [incidents](https://learn.microsoft.com/defender-xdr/incidents-overview). This provides clearer context and helps security operations teams to reduce alert fatigue, prioritize, and respond more efficiently.
49+
The **Behaviors** data type enhances overall threat detection accuracy by reducing alerts on generic anomalies and surfacing alerts only when observed patterns align with real security scenarios. You can now use **Behaviors** to conduct investigations in [Advanced Hunting](/defender-xdr/advanced-hunting-overview), build better [custom detections](/defender-xdr/custom-detection-rules) based on behavioral signals, and benefit from automatic inclusion of context-related behaviors into [incidents](/defender-xdr/incidents-overview). This provides clearer context and helps security operations teams to reduce alert fatigue, prioritize, and respond more efficiently.
3550

3651
For more information, see:
3752
- [Investigate behaviors with advanced hunting](/defender-cloud-apps/behaviors).
@@ -80,6 +95,13 @@ For more information, see: [Find your cloud app and calculate risk scores](risk-
8095
## April 2025
8196

8297

98+
### Firewall configuration update required by April 29, 2025
99+
100+
**Take Immediate Action by April, 29 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you're using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 28, 2025.\
101+
- This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 29, 2025.
102+
- This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.\
103+
- Learn more: [Network requirements](https://aka.ms/MDANetworkDocs).
104+
83105
### OAuth app information is now available in attack paths (Preview)
84106

85107
The Security Exposure Management platform now includes OAuth applications as part of the attack path and attack surface map experiences. This enhancement enables you to visualize how attackers could exploit OAuth apps to move laterally within your environment and access critical assets. By identifying these attack paths and investigating associated permissions, you can reduce exposure and improve the security posture of your Microsoft 365 services.
@@ -227,7 +249,7 @@ For more information, see [OAuth app permission related details on app governanc
227249

228250
### Granular data usage insights into EWS API access (Preview)
229251

230-
Defender for Cloud Apps users who use app governance can now get granular insights into data accessed by apps using legacy EWS API alongside Microsoft Graph. The enhanced coverage of data usage insights enable you to get deeper visibility into apps accessing emails using legacy EWS API.
252+
Defender for Cloud Apps users who use app governance can now get granular insights into data accessed by apps using legacy EWS API alongside Microsoft Graph. The enhanced coverage of data usage insights enables you to get deeper visibility into apps accessing emails using legacy EWS API.
231253

232254
For more information, see [OAuth app data usage insights on app governance](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
233255

0 commit comments

Comments
 (0)