Proposed Pull Request Change

title description services author ms.service ms.topic ms.date ms.author
FQDN tags overview for Azure Firewall An FQDN tag represents a group of fully qualified domain names (FQDNs) associated with well known Microsoft services. firewall duongau azure-firewall concept-article 06/07/2024 duau
๐Ÿ“„ Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: FQDN tags overview for Azure Firewall description: An FQDN tag represents a group of fully qualified domain names (FQDNs) associated with well known Microsoft services. services: firewall author: duongau ms.service: azure-firewall ms.topic: concept-article ms.date: 06/07/2024 ms.author: duau # Customer intent: As a network administrator, I want to use FQDN tags in application rules for Azure Firewall, so that I can easily manage and allow outbound network traffic for essential Microsoft services without manually specifying each individual FQDN. --- # FQDN tags overview An FQDN tag represents a group of fully qualified domain names (FQDNs) associated with well known Microsoft services. You can use an FQDN tag in application rules to allow the required outbound network traffic through your firewall. For example, to manually allow Windows Update network traffic through your firewall, you need to create multiple application rules per the Microsoft documentation. Using FQDN tags, you can create an application rule, include the **Windows Updates** tag, and now network traffic to Microsoft Windows Update endpoints can flow through your firewall. You can't create your own FQDN tags, nor can you specify which FQDNs are included within a tag. Microsoft manages the FQDNs encompassed by the FQDN tag, and updates the tag as FQDNs change. <!--- screenshot of application rule with a FQDN tag.--> The following table shows the current FQDN tags you can use. Microsoft maintains these tags and you can expect more tags to be added periodically. ## Current FQDN tags |FQDN tag |Description | |---------|---------| |WindowsUpdate |Allow outbound access to Microsoft Update as described in [How to Configure a Firewall for Software Updates](/mem/configmgr/sum/get-started/install-a-software-update-point).| |WindowsDiagnostics|Allow outbound access to all [Windows Diagnostics endpoints](/windows/privacy/configure-windows-diagnostic-data-in-your-organization#endpoints).| |MicrosoftActiveProtectionService (MAPS)|Allow outbound access to [MAPS](https://cloudblogs.microsoft.com/enterprisemobility/2016/05/31/important-changes-to-microsoft-active-protection-service-maps-endpoint/).| |AppServiceEnvironment (ASE)|Allows outbound access to ASE platform traffic. This tag doesnโ€™t cover customer-specific Storage and SQL endpoints created by ASE. These should be enabled via [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or added manually.<br><br>For more information about integrating Azure Firewall with ASE, see [Locking down an App Service Environment](../app-service/environment/firewall-integration.md#configuring-azure-firewall-with-your-ase).| |AzureBackup|Allows outbound access to the Azure Backup services.| |AzureHDInsight|Allows outbound access for HDInsight platform traffic. This tag doesnโ€™t cover customer-specific Storage or SQL traffic from HDInsight. Enable these using [Service Endpoints](../virtual-network/tutorial-restrict-network-access-to-resources.md) or add them manually.| |WindowsVirtualDesktop|Allows outbound Azure Virtual Desktop (formerly Windows Virtual Desktop) platform traffic. This tag doesnโ€™t cover deployment-specific Storage and Service Bus endpoints created by Azure Virtual Desktop. Additionally, DNS and KMS network rules are required. For more information about integrating Azure Firewall with Azure Virtual Desktop, see [Use Azure Firewall to protect Azure Virtual Desktop deployments](protect-azure-virtual-desktop.md).| |AzureKubernetesService (AKS)|Allows outbound access to AKS. For more information, see [Use Azure Firewall to protect Azure Kubernetes Service (AKS) Deployments](protect-azure-kubernetes-service.md).| |Office365<br><br>For example: Office365.Skype.Optimize|Several Office 365 tags are available to allow outbound access by Office 365 product and category. For more information, see [Use Azure Firewall to protect Office 365](protect-office-365.md).| |Windows365|Allows outbound communication to Windows 365, excluding network endpoints for Microsoft Intune. To allow outbound communication to port 5671, create a separated network rule. For more information, see Windows 365 [Network requirements](/windows-365/enterprise/requirements-network).| |MicrosoftIntune|Allow access to [Microsoft Intune](/mem/intune/fundamentals/intune-endpoints) for managed devices.| |citrixHdxPlusForWindows365|Required when using Citrix HDX Plus.| > [!NOTE] > When you select **FQDN Tag** in an application rule, the protocol:port field must be set to **https**. ## Next steps To learn how to deploy an Azure Firewall, see [Tutorial: Deploy and configure Azure Firewall using the Azure portal](tutorial-firewall-deploy-portal.md).
Success! Branch created successfully. Create Pull Request on GitHub
Error: