Loading...

Protect Office365 and Windows365 with Azure Firewall

Protect Office365 and Windows365 with Azure Firewall

Written by Yuval Perry (Azure Firewall Product Manager)

 

Office 365 customers are looking for the best cloud connectivity experience at scale to achieve end-to-end connectivity through the most optimized route possible. Traffic from the organization’s network to the required Office 365 endpoints should be managed and secured, which could be a time-consuming ongoing task. With the recent announcement of Azure Firewall integration with Office 365, you can now easily manage this traffic and leverage the firewall’s security features to secure it.

 

Office 365 endpoints requirements are built of hundreds of FQDNs and IP addresses, split across multiple Office 365 services and categories. Some required endpoints are sensitive to network performance, latency and availability, while others do not require any optimization or are even not hosted in Microsoft datacenters, thus can be treated as normal internet bound traffic. To add to that complexity, new endpoints are added from time to time to onboard new Office 365 features or due to other service changes.

 

With this new integration of Azure Firewall with Office 365, you can now manage the network requirements in a more convenient and efficient manner. Instead of allowing and securing traffic to specific IP addresses and FQDNs and updating your Azure Firewall Policy rules upon endpoints updates, you can now use the new built-in Service Tags and FQDN Tags. These tags group the required endpoints per Office 365 product and category and are updated periodically behind the scenes to eliminate maintenance.

 

gusmodena_0-1684421142264.png

 

Configuring Azure Firewall Policy to secure Office 365

 

The new built-in Office 365 Service Tags group the required IPv4 addresses by Office365 service and category. For instance, “Office365.Exchange.Optimize” Service Tag groups all IPv4 addresses required for Exchange connectivity, representing Office 365 scenarios that are the most sensitive to network performance, latency, and availability. You can use these service tags as a destination in Azure Firewall Network Rule, to allow and secure specific or all Office 365 traffic from your defined source IP addresses, range, or IP group. When creating the rule, ensure to define the required TCP / UDP ports.

 

Service Tags are updated automatically by Microsoft when addresses are added or changed. Any Service Tag defined in a network rule is constantly translated to the most updated list of IP addresses, with no further action required.

 

gusmodena_1-1684421199773.png

 

Similarly, the new built-in FQDN tags represent the required FQDNs, grouped by Office365 service and category. For instance, “Office365.SharePoint.Optimize” tag groups the FQDN endpoints required by SharePoint which are sensitive to network performance, latency and availability. You can use these FQDN tags as a destination in Azure Firewall Policy Application Rules, to allow and secure any or all Office 365 outbound traffic.

 

FQDN Tags are updated automatically by Microsoft when FQDNs are added or changed. Any FQDN Tag defined in an application rule is constantly translated to the most updated list of FQDNs, with no further action required.

 

Some of the required Office 365 endpoints, which are listed in “Default” category, can be treated as a normal outbound internet traffic. When allowing communication to these endpoints, you can leverage Azure Firewall Premium’s security features of IDPS and TLS Inspection as an additional layer of protection to this outbound traffic. You can decrypt the traffic to reveal any malicious or unwanted activity and monitor it with IDPS engine across tens of thousands of signatures provided by Azure Firewall.

 

gusmodena_2-1684421250373.png

 

Configuring Azure Firewall Policy to secure Windows 365

 

Azure Firewall integration with Windows 365 provides a simplified and more efficient way to allow and secure outbound traffic to Windows 365. Instead of creating policy rules with the specific FQDNs, you can now use the new built-in FQDN tag represents the required Windows 365 FQDNs and the required Azure Virtual Desktop FQDNs. Use this tag in your application rule to seamlessly protect Windows365 communications:

 

gusmodena_3-1684421466929.png

 

In addition to an Application Rule using the new Windows 365 FQDN tag, you might need to other rules to allow and secure all Windows 365 features. You can read more details here.

 

Next steps:

 

Published on:

Learn more
Azure Network Security Blog articles
Azure Network Security Blog articles

Azure Network Security Blog articles

Share post:

Related posts

Microsoft 365 & Power Platform Call (Microsoft Speakers) – December 16th, 2025 – Screenshot Summary

Call Highlights   SharePoint Quicklinks: Primary PnP Website: https://aka.ms/m365pnp Documentation & Guidance SharePoint Dev Videos Issues...

1 hour ago

Azure Boards integration with GitHub Copilot

A few months ago we introduced the Azure Boards integration with GitHub Copilot in private preview. The goal was simple: allow teams to take a...

5 hours ago

Chat visibility in the Microsoft 365 Copilot App

Microsoft 365 Copilot app will show Chat in navigation for users blocked by admin policy but restrict access with a notice; ineligible users w...

6 hours ago

Express voice enrollment in Microsoft Teams

Express voice enrollment in Microsoft Teams enables quick voice profile registration for enhanced meeting features. It rolls out to enterprise...

6 hours ago

Microsoft Teams: Apps now supported in Private Channels

Microsoft Teams now supports apps in Private Channels, allowing bots, tabs, and message extensions with new governance controls. Rollout start...

6 hours ago

Retirement of featured links on SharePoint Start Page

The Featured Links feature on the SharePoint Start Page will be retired from March to June 2026 due to low use. Admins will lose access, and e...

6 hours ago

New permissions report available in SharePoint admin center

A new Permissions report in the SharePoint admin center (under Data access governance) will show which sites a user can access, including dire...

6 hours ago

Deprecation of Designer bot and Designer banners in Teams

The Designer bot and Designer banners in Microsoft Teams will be retired between mid-January and February 27, 2026. Users can no longer use th...

6 hours ago

Microsoft Teams: Meeting Notes now available for instant meetings

Teams meeting Notes, powered by Loop, are now available for instant calls and meetings, like those started from ‘Meet now’ and calls started f...

6 hours ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy