You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/network-requirements.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,16 @@
1
1
---
2
2
title: Network requirements
3
3
description: This article describes the IP addresses and ports you need to open to work with Defender for Cloud Apps.
4
-
ms.date: 02/29/2024
4
+
ms.date: 04/06/2025
5
5
ms.topic: reference
6
6
---
7
7
8
8
# Network requirements
9
9
10
-
10
+
>[!IMPORTANT]
11
+
>
12
+
> **Take Immediate Action by April, 21 2025**, to ensure optimal service quality and prevent the interruption of some services. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively, if you currently allow outbound traffic based on Azure service tags, please add the new Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’ to your allowlist. This tag will be adjusted to reflect the above range by April 21, 2025.
13
+
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.
11
14
12
15
This article provides a list of ports and IP addresses you need to allow and allowlist to work with Microsoft Defender for Cloud Apps.
13
16
@@ -16,6 +19,7 @@ In order to stay up to date on IP ranges, it's recommended to refer to the follo
16
19
| Service tag name | Defender for Cloud Apps services included |
17
20
|:---|:---|
18
21
| MicrosoftCloudAppSecurity | Portal access, Access and session controls, SIEM agent connection, App connector, Mail server, Log collector. |
The following tables list the current static IP ranges covered by the MicrosoftCloudAppSecurity service tag. For latest list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
21
25
@@ -56,11 +60,11 @@ To use Defender for Cloud Apps in the Microsoft Defender Portal:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,7 @@ ms.topic: overview
7
7
8
8
# What's new in Microsoft Defender for Cloud Apps
9
9
10
+
>
10
11
*Applies to: Microsoft Defender for Cloud Apps*
11
12
12
13
This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Cloud Apps.
@@ -19,6 +20,12 @@ For more information on what's new with other Microsoft Defender security produc
19
20
20
21
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
21
22
23
+
>[!IMPORTANT]
24
+
>
25
+
> **Take Immediate Action by April, 21 2025**, to ensure optimal service quality and prevent the interruption of some services. This change will only affect your organization if you're using a firewall allowlist that restricts outbound traffic based on IP addresses or Azure service tags. Update your firewall rules to allow outbound traffic on port 443 for the following IP addresses: 13.107.228.0/24, 13.107.229.0/24, 13.107.219.0/24, 13.107.227.0/24, 150.171.97.0/24. Alternatively use as an additional Azure service tag, ‘AzureFrontDoor.MicrosoftSecurity’, that will be adjusted to reflect the above range by April 21, 2025. This update should be completed and the IP addresses or new Azure service tag added to your firewall's allowlist by April 21, 2025.
26
+
> This change only affects commercial customers of Microsoft Defender for Cloud Apps. Customers connected to the Gov US1 or GCC datacenters won't be affected.
Copy file name to clipboardExpand all lines: defender-endpoint/advanced-features.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ This feature enables you to block potentially malicious files in your network. B
74
74
75
75
To turn **Allow or block** files on:
76
76
77
-
1. In the Microsoft Defender portal, in navigation pane, select **Settings**\>**Endpoints**\>**General**\>**Advanced features**\>**Allow or block file**.
77
+
1. In the Microsoft Defender portal, in the navigation pane, select **Settings**\>**Endpoints**\>**General**\>**Advanced features**\>**Allow or block file**.
78
78
79
79
2. Toggle the setting between **On** and **Off**.
80
80
@@ -129,8 +129,7 @@ Enabling the Skype for Business integration gives you the ability to communicate
129
129
130
130
Enabling this setting forwards Defender for Endpoint signals to Microsoft Defender for Cloud Apps to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Defender for Cloud Apps data.
131
131
132
-
> [!NOTE]
133
-
> This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on devices running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)), later Windows 10 versions, or Windows 11.
132
+
For more information, see [Microsoft Defender for Cloud Apps overview](/defender-cloud-apps/what-is-defender-for-cloud-apps).
Copy file name to clipboardExpand all lines: defender-endpoint/api/device-health-api-methods-properties.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ Retrieves a list of Microsoft Defender Antivirus device health details. This API
50
50
Data that is collected using either `JSON response` or by using files is a snapshot of the current state. This data doesn't contain historical data. To collect historical data, you must save the data in your own data storage.
51
51
52
52
> [!IMPORTANT]
53
-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
53
+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
54
54
>
55
55
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft Defender portal, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
Copy file name to clipboardExpand all lines: defender-endpoint/api/device-health-export-antivirus-health-report-api.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ Data that is collected using either '_JSON response_ or _via files_' is the curr
48
48
49
49
> [!IMPORTANT]
50
50
>
51
-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
51
+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
- [Microsoft Defender for Endpoint - Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection)
129
-
- [Onboard Windows servers to the Microsoft Defender for Endpoint service](configure-server-endpoints.md)
129
+
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
130
130
- [Microsoft Defender for Endpoint: Defending Windows Server 2012 R2 and 2016](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defending-windows-server-2012-r2-and-2016/ba-p/2783292)
131
131
132
132
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments