Protect Office365 and Windows365 with Azure Firewall
Written by Yuval Perry (Azure Firewall Product Manager)
Office 365 customers are looking for the best cloud connectivity experience at scale to achieve end-to-end connectivity through the most optimized route possible. Traffic from the organization’s network to the required Office 365 endpoints should be managed and secured, which could be a time-consuming ongoing task. With the recent announcement of Azure Firewall integration with Office 365, you can now easily manage this traffic and leverage the firewall’s security features to secure it.
Office 365 endpoints requirements are built of hundreds of FQDNs and IP addresses, split across multiple Office 365 services and categories. Some required endpoints are sensitive to network performance, latency and availability, while others do not require any optimization or are even not hosted in Microsoft datacenters, thus can be treated as normal internet bound traffic. To add to that complexity, new endpoints are added from time to time to onboard new Office 365 features or due to other service changes.
With this new integration of Azure Firewall with Office 365, you can now manage the network requirements in a more convenient and efficient manner. Instead of allowing and securing traffic to specific IP addresses and FQDNs and updating your Azure Firewall Policy rules upon endpoints updates, you can now use the new built-in Service Tags and FQDN Tags. These tags group the required endpoints per Office 365 product and category and are updated periodically behind the scenes to eliminate maintenance.
Configuring Azure Firewall Policy to secure Office 365
The new built-in Office 365 Service Tags group the required IPv4 addresses by Office365 service and category. For instance, “Office365.Exchange.Optimize” Service Tag groups all IPv4 addresses required for Exchange connectivity, representing Office 365 scenarios that are the most sensitive to network performance, latency, and availability. You can use these service tags as a destination in Azure Firewall Network Rule, to allow and secure specific or all Office 365 traffic from your defined source IP addresses, range, or IP group. When creating the rule, ensure to define the required TCP / UDP ports.
Service Tags are updated automatically by Microsoft when addresses are added or changed. Any Service Tag defined in a network rule is constantly translated to the most updated list of IP addresses, with no further action required.
Similarly, the new built-in FQDN tags represent the required FQDNs, grouped by Office365 service and category. For instance, “Office365.SharePoint.Optimize” tag groups the FQDN endpoints required by SharePoint which are sensitive to network performance, latency and availability. You can use these FQDN tags as a destination in Azure Firewall Policy Application Rules, to allow and secure any or all Office 365 outbound traffic.
FQDN Tags are updated automatically by Microsoft when FQDNs are added or changed. Any FQDN Tag defined in an application rule is constantly translated to the most updated list of FQDNs, with no further action required.
Some of the required Office 365 endpoints, which are listed in “Default” category, can be treated as a normal outbound internet traffic. When allowing communication to these endpoints, you can leverage Azure Firewall Premium’s security features of IDPS and TLS Inspection as an additional layer of protection to this outbound traffic. You can decrypt the traffic to reveal any malicious or unwanted activity and monitor it with IDPS engine across tens of thousands of signatures provided by Azure Firewall.
Configuring Azure Firewall Policy to secure Windows 365
Azure Firewall integration with Windows 365 provides a simplified and more efficient way to allow and secure outbound traffic to Windows 365. Instead of creating policy rules with the specific FQDNs, you can now use the new built-in FQDN tag represents the required Windows 365 FQDNs and the required Azure Virtual Desktop FQDNs. Use this tag in your application rule to seamlessly protect Windows365 communications:
In addition to an Application Rule using the new Windows 365 FQDN tag, you might need to other rules to allow and secure all Windows 365 features. You can read more details here.
Next steps:
Published on:
Learn moreRelated posts
SharePoint Framework (SPFx) roadmap update – December 2025
SPFx is powering the future of Microsoft 365. From AI-driven portals to seamless integrations across SharePoint, Teams and Viva, SPFx is drivi...
Exam AB-900: Microsoft 365 Copilot and Agent Administration Fundamentals
Following on the steps of the other AB exams I’ve been writing about my experience with (see Exam AB-730: AI Business Professional &...
Microsoft Copilot (Microsoft 365): Chat History Landing page: Filtering UI Refresh
To help you quickly find the conversations that matter, we’re updating the Chat History filtering experience. This refresh makes the interface...
Microsoft Copilot (Microsoft 365): Capture voice notes in the Microsoft 365 Copilot mobile app
With a Microsoft 365 Copilot license, transform offline discussions into structured, actionable, and searchable content with voice notes in Co...
Microsoft Graph PowerShell SDK V2.34 Makes WAM the Default
The Web Account Manager (WAM) authentication broker becomes the default method for handling interactive Microsoft Graph PowerShell SDK connect...
Automating Business PDFs Using Azure Document Intelligence and Power Automate
In today’s data-driven enterprises, critical business information often arrives in the form of PDFs—bank statements, invoices, policy document...
Microsoft 365: New functionality and prices in 2026
A range of security and AI enhancements have been announced for the Microsoft 365 suite of products in 2026, along with some small price incre...
Automating Microsoft 365 with PowerShell Update 19
Update #19 of the Automating Microsoft 365 with PowerShell eBook is now available. Subscribers can download the updated PDF and EPUB files fro...
Teams admin center: Auto‑updates for Teams Android device firmware and apps will be paused during year‑end holidays
Auto-updates for Teams Android device firmware and apps via Teams admin center will pause from December 20, 2025, to January 12, 2026, to ensu...
OpenAI’s GPT-Image-1.5 model is now available in Microsoft 365 Copilot
Microsoft 365 Copilot will replace GPT-4o with OpenAI’s GPT-Image-1.5 from mid-December 2025 to late January 2026, enhancing image generation ...