You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/network-requirements.md
+15-12Lines changed: 15 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,15 @@
1
1
---
2
2
title: Network requirements
3
3
description: This article describes the IP addresses and ports you need to open to work with Defender for Cloud Apps.
4
-
ms.date: 02/29/2024
4
+
ms.date: 04/04/2024
5
5
ms.topic: reference
6
6
---
7
7
8
8
# Network requirements
9
9
10
-
10
+
>[!IMPORTANT]
11
+
>
12
+
> **Take Immediate Action by April, 21 2025**, to ensure optimal service quality and prevent the interruption of some services: Please update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively, if you currently allow outbound traffic based on Azure service tags, please add the new Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’ to your allowlist. This tag will be adjusted to reflect the above range by April 21, 2025.
11
13
12
14
This article provides a list of ports and IP addresses you need to allow and allowlist to work with Microsoft Defender for Cloud Apps.
13
15
@@ -16,6 +18,7 @@ In order to stay up to date on IP ranges, it's recommended to refer to the follo
16
18
| Service tag name | Defender for Cloud Apps services included |
17
19
|:---|:---|
18
20
| MicrosoftCloudAppSecurity | Portal access, Access and session controls, SIEM agent connection, App connector, Mail server, Log collector. |
The following tables list the current static IP ranges covered by the MicrosoftCloudAppSecurity service tag. For latest list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
21
24
@@ -56,11 +59,11 @@ To use Defender for Cloud Apps in the Microsoft Defender Portal:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,10 @@ ms.topic: overview
7
7
8
8
# What's new in Microsoft Defender for Cloud Apps
9
9
10
+
>[!IMPORTANT]
11
+
>
12
+
> **Take Immediate Action by April, 21 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you are using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Please update your firewall rules to allow outbound traffic on port 443 for the following IP addresses:13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 21, 2025. This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 21, 2025. Learn more: [Network requirements](https://aka.ms/MDANetworkDocs).
13
+
>
10
14
*Applies to: Microsoft Defender for Cloud Apps*
11
15
12
16
This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Cloud Apps.
0 commit comments