Skip to content

Commit 6be7cd4

Browse files
committed
docs: fix metadata, style edits
1 parent d078cdd commit 6be7cd4

1 file changed

Lines changed: 16 additions & 17 deletions

File tree

articles/firewall/protect-office-365.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -2,41 +2,40 @@
22
title: Use Azure Firewall to protect Microsoft 365
33
description: Learn how to use Azure Firewall to protect Microsoft 365
44
author: duongau
5+
ms.author: yuvalpery
56
ms.service: azure-firewall
6-
services: firewall
77
ms.topic: how-to
8-
ms.date: 03/31/2025
9-
ms.author: yuvalpery
8+
ms.date: 03/28/2026
109
ms.custom: sfi-image-nochange
1110
# Customer intent: As a network administrator, I want to configure Azure Firewall with Microsoft 365 service and FQDN tags, so that I can effectively control and secure outbound traffic to Microsoft 365 endpoints while optimizing performance and compliance.
1211
---
1312

1413
# Use Azure Firewall to protect Microsoft 365
1514

16-
You can use the Azure Firewall built-in Service Tags and FQDN tags to allow outbound communication to [Microsoft 365 endpoints and IP addresses](/microsoft-365/enterprise/urls-and-ip-address-ranges).
15+
Use the Azure Firewall built-in service tags and FQDN tags to allow outbound communication to [Microsoft 365 endpoints and IP addresses](/microsoft-365/enterprise/urls-and-ip-address-ranges).
1716

1817
> [!NOTE]
19-
> Microsoft 365 service tags and FQDN tags are supported in Azure Firewall policy only. They aren't supported in classic rules.
18+
> Azure Firewall policy supports Microsoft 365 service tags and FQDN tags. Classic rules don't support them.
2019
2120
## Tags creation
2221

2322
For each Microsoft 365 product and category, Azure Firewall automatically retrieves the required endpoints and IP addresses, and creates tags accordingly:
2423

2524
- Tag name: all names begin with **Microsoft365** and are followed by:
26-
- Product: Exchange / Skype / SharePoint / Common
25+
- Product: Exchange, Skype, SharePoint, or Common
2726
- [Category](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#optimizing-connectivity-to-microsoft-365-services):
28-
- Optimize & Allow: Network endpoints with **Optimize** or **Allow** category carry higher traffic volume and are sensitive to network latency and performance. These endpoints have IP addresses listed with the domain.
29-
- Default: Network endpoints in the **Default** category don't have associated IP addresses because they are dynamic in nature and IP addresses change over time.
30-
- Required / Not required (optional)
27+
- Optimize and Allow: Network endpoints with **Optimize** or **Allow** category carry higher traffic volume and are sensitive to network latency and performance. These endpoints have IP addresses listed with the domain.
28+
- Default: Network endpoints in the **Default** category don't have associated IP addresses because they're dynamic in nature and IP addresses change over time.
29+
- Required or Not required (optional)
3130
- Tag type:
32-
- **FQDN tag** represents only the required FQDNs for the specific product and category that communicate over HTTP/HTTPS (ports 80/443) and can be used in Application Rules to secure traffic to these FQDNs and protocols.
33-
- **Service tag** represents only the required IPv4 addresses and ranges for the specific product and category and can be used in Network Rules to secure traffic to these IP addresses and to any required port.
31+
- **FQDN tag** represents only the required FQDNs for the specific product and category that communicate over HTTP/HTTPS (ports 80/443). Use these tags in Application Rules to secure traffic to these FQDNs and protocols.
32+
- **Service tag** represents only the required IPv4 addresses and ranges for the specific product and category. Use these tags in Network Rules to secure traffic to these IP addresses and to any required port.
3433

35-
You should accept a tag being available for a specific combination of product, category and required / not required in the following cases:
34+
Accept a tag for a specific combination of product, category, and required or not required in the following cases:
3635
- For a Service Tag – this specific combination exists and has required IPv4 addresses listed.
37-
- For an FQDN Rule – this specific combination exists and has required FQDNs listed which communicate to ports 80/443.
36+
- For an FQDN Rule – this specific combination exists and has required FQDNs listed that communicate to ports 80/443.
3837

39-
Tags are updated automatically with any modifications to the required IPv4 addresses and FQDNs. New tags might be created automatically in the future as well if new combinations of product and category are added.
38+
Azure Firewall automatically updates tags with any modifications to the required IPv4 addresses and FQDNs. In the future, Azure Firewall might automatically create new tags if new combinations of product and category are added.
4039

4140
Network rule collection:
4241
:::image type="content" source="media/protect-office-365/network-rule-collection.png" alt-text="Screenshot showing Microsoft 365 network rule collection.":::
@@ -48,15 +47,15 @@ Application rule collection:
4847

4948
These built-in tags provide granularity to allow and protect the outbound traffic to Microsoft 365 based on your preferences and usage. You can allow outbound traffic only to specific products and categories for a specific source. You can also use [Azure Firewall Premium’s TLS Inspection and IDPS](premium-features.md) to monitor some of the traffic. For example, traffic to endpoints in the Default category that can be treated as normal Internet outbound traffic. For more information about Microsoft 365 endpoint categories, see [New Microsoft 365 endpoint categories](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#new-office-365-endpoint-categories).
5049

51-
When you create the rules, ensure you define the required TCP ports (for network rules) and protocols (for application rules) as required by Microsoft 365. If a specific combination of product, category and required/not required have both a Service Tag and an FQDN tag, you should create representative rules for both tags to fully cover the required communication.
50+
When you create the rules, ensure you define the required TCP ports (for network rules) and protocols (for application rules) as required by Microsoft 365. If a specific combination of product, category, and required or not required status has both a Service Tag and an FQDN tag, create representative rules for both tags to fully cover the required communication.
5251

5352
## Limitations
5453

55-
If a specific combination of product, category and required/not required has only FQDNs required, but uses TCP ports that aren't 80/443, an FQDN tag isn't created for this combination. Application Rules can only cover HTTP, HTTPS or MSSQL. To allow communication to these FQDNs, create your own network rules with these FQDNs and ports.
54+
If a specific combination of product, category, and required or not required status has only FQDNs required but uses TCP ports that aren't 80 or 443, the system doesn't create an FQDN tag for this combination. Application Rules can only cover HTTP, HTTPS, or MSSQL. To allow communication to these FQDNs, create your own network rules with these FQDNs and ports.
5655
For more information, see [Use FQDN filtering in network rules](fqdn-filtering-network-rules.md).
5756

5857
## Next steps
5958

6059
- For more information, see [Protect Microsoft 365 and Windows 365 with Azure Firewall](https://techcommunity.microsoft.com/t5/azure-network-security-blog/protect-office365-and-windows365-with-azure-firewall/ba-p/3824533).
61-
- Learn more about Microsoft 365 network connectivity: [Microsoft 365 network connectivity overview](/microsoft-365/enterprise/microsoft-365-networking-overview)
60+
- Learn more about Microsoft 365 network connectivity: [Microsoft 365 network connectivity overview](/microsoft-365/enterprise/microsoft-365-networking-overview).
6261

0 commit comments

Comments
 (0)