Skip to content

Latest commit

 

History

History
119 lines (91 loc) · 9.5 KB

File metadata and controls

119 lines (91 loc) · 9.5 KB
title Microsoft Defender for Endpoint streamlined connectivity URLs - US government environments (Preview)
description Get a list of the streamlined connectivity URLs required to onboard and maintain devices in Microsoft Defender for Endpoint in US Government cloud environments (GCC, GCC High, DoD).
author limwainstein
ms.author lwainstein
ms.topic how-to
ms.service defender-endpoint
ms.subservice onboard
ms.localizationpriority medium
ms.collection
m365-security
tier1
ms.reviewer pahuijbr
search.appverid MET150
audience ITPro
ms.date 12/25/2025
appliesto Microsoft Defender for Endpoint Plan 1, Microsoft Defender for Endpoint Plan 2, Microsoft Defender XDR

Microsoft Defender for Endpoint streamlined connectivity URLs - US government environments (Preview)

[!INCLUDE Microsoft Defender XDR rebranding]

[!INCLUDE Prerelease information]

This article includes a list of the streamlined connectivity URLs required to onboard and maintain devices in Microsoft Defender for Endpoint in US Government cloud environments (GCC, GCC High, DoD).

Prerequisites

See the prerequisites for streamlined connectivity.

Notes

  • Devices running Defender for Endpoint delivered via the Microsoft Monitoring Agent (MMA, also known as the Log Analytics Agent - specifically, Windows 7 SP1, Windows 8.1, Windows Server 2008 R2 and those Windows Server 2012 R2, 2016 devices not upgraded to the modern unified solution) will continue using the associated legacy method. For the list of additional URLs, refer to the Windows 7, 8.1, 2008R2 (MMA) tab.

  • Devices running Windows version 1607, 1703, 1709, 1803 can onboard using the new onboarding package but still require a longer list of URLs. The Windows 1607 to 1803 tab lists the additional URLs required.

US Gov URLs

General URLs

Note

Make sure your devices meet all component (app/antimalware platform, engine, EDR sensor) update versions and OS requirements else onboarding might be unsuccessful. You can re-onboard devices to switch them to streamlined connectivity if they meet these requirements.

Service Geography Category Port Endpoint/URL Description Required Win 11/10/Server (Unified) Win 7/8.1 Server (MMA) Mac Linux
Consolidated Defender for Endpoint services USGov Streamlined connectivity URL 443 *.endpoint.security.microsoft.us Streamlined connectivity URL consolidation and future services Required Yes No Yes Yes Yes
Microsoft Defender SmartScreen GCC Reporting and Notifications 443 unitedstates4.ss.wd.microsoft.us SmartScreen protection, reporting, notifications, Network Protection, custom URL indicators Required Yes Yes Yes
Microsoft Defender SmartScreen GCC High Reporting and Notifications 443 unitedstates1.ss.wd.microsoft.us SmartScreen protection, reporting, notifications, Network Protection, custom URL indicators Required Yes Yes Yes
Microsoft Defender SmartScreen DoD Reporting and Notifications 443 unitedstates2.ss.wd.microsoft.us SmartScreen protection, reporting, notifications, Network Protection, custom URL indicators Required Yes Yes Yes
Defender for Endpoint DoD Internal configuration management 443 https://config.ecs.dod.teams.microsoft.us/config/v1 This URL must be allowed to enable Defender on Linux endpoints to receive internal configurations from the cloud. Required Yes
Defender for Endpoint GCC High Internal configuration management 443 https://config.ecs.gov.teams.microsoft.us/config/v1 This URL must be allowed to enable Defender on Linux endpoints to receive internal configurations from the cloud. Required Yes
Defender for Endpoint GCC Mod Internal configuration management 443 https://gccmod.ecs.office.com/config/v1 This URL must be allowed to enable Defender on Linux endpoints to receive internal configurations from the cloud. Required Yes

URLs used for updates

Note

Depending on your environment, you may apply updates from a file share or update server and don't need to allow (all) direct connections from devices, or these connections are already required and allowed in your environment for other purposes such as Windows updates.

This table lists URL endpoints used by Microsoft Defender Antivirus. These endpoints are optional when updates are managed internally using WSUS, Configuration Manager, or a file share.

Service Geography Category Port Endpoint/URL Description Required/Optional Win 11/10/Server (Unified) Win 7/8.1 Server (MMA)
Microsoft Defender Antivirus US Gov MU/WU 443 *.update.microsoft.com Security intelligence and product updates Optional Yes Yes Yes
Microsoft Defender Antivirus US Gov MU/WU 443 *.delivery.mp.microsoft.com Security intelligence and product updates Optional Yes Yes Yes
Microsoft Defender Antivirus US Gov MU/WU 443 *.windowsupdate.com Security intelligence and product updates Optional Yes Yes Yes
Microsoft Defender Antivirus US Gov MU (ADL) 443 *.download.windowsupdate.com Alternate location for Microsoft Defender Antivirus Security intelligence updates Optional Yes Yes Yes
Microsoft Defender Antivirus US Gov MU (ADL) 443 *.download.microsoft.com Alternate location for Microsoft Defender Antivirus Security intelligence updates Optional Yes Yes Yes
Microsoft Defender Antivirus US Gov MU (ADL) 443 fe3cr.delivery.mp.microsoft.com/ClientWebService/client.asmx Alternate location for Microsoft Defender Antivirus Security intelligence updates Optional Yes Yes Yes

URLs used for certificate validation checks

Note

Certificate validation is performed through the Windows operating system, helping to prevent abuse of compromised certificates. This means the operating system must be able to connect to these destinations, or, should be updated with the latest certificate trust lists if they can't retrieve them from Microsoft directly. For more information, see Configure trusted roots and disallowed certificates in Windows.

Service Geography Category Port Endpoint/URL Description Required/Optional Win 11/10/Server (Unified) Win 7/8.1 Server (MMA) Mac Linux
Microsoft Defender for Endpoint US Gov CRL 80 crl.microsoft.com/pki/crl/* Certificate Revocation Lists - required to validate certificates / Used by Windows when creating the SSL connection to MAPS for updating the CRL Required Yes Yes Yes
Microsoft Defender for Endpoint US Gov CRL 80 ctldl.windowsupdate.com Expands on the existing automatic root update mechanism technology to let certificates that are compromised or untrusted be specifically flagged as untrusted Required Yes
Microsoft Defender for Endpoint US Gov CRL 80 www.microsoft.com/pkiops/* Used when creating the SSL connection to MAPS for updating the CRL Required Yes Yes Yes
Microsoft Defender for Endpoint US Gov CRL 80 http://www.microsoft.com/pki/certs Used when creating the SSL connection to MAPS for updating the CRL Required Yes Yes Yes

Other URLs

Note

The URLs in this table are required for Live Response Performance (Direct Connection/Proxy bypass required)

Service Geography Category Port Endpoint/URL Description Required/Optional Win 11/10/Server (Unified)
Microsoft Defender for Endpoint US Gov Common 443 *.wns.windows.com Windows Push Notification Services (WNS) - Live Response Required Yes
Microsoft Defender for Endpoint US Gov Common 443 login.microsoftonline.us Windows Push Notification Services (WNS) - Live Response Required Yes
Microsoft Defender for Endpoint US Gov Common 443 login.live.com Windows Push Notification Services (WNS) - Live Response Required Yes

Security center URLs

Note

The following table lists the required URL endpoints for accessing the Microsoft Defender Security Center portal.

Service Geography URL
Microsoft Defender for Endpoint US Gov *.blob.core.usgovcloudapi.net
Microsoft Defender for Endpoint US Gov crl.microsoft.com
Microsoft Defender for Endpoint US Gov https://*.microsoftonline-p.com
Microsoft Defender for Endpoint US Gov https://secure.aadcdn.microsoftonline-p.com
Microsoft Defender for Endpoint US Gov https://static2.sharepointonline.com
Microsoft Defender for Endpoint GCC https://login.microsoftonline.com
Microsoft Defender for Endpoint GCC https://*.gcc.securitycenter.microsoft.us
Microsoft Defender for Endpoint GCC https://onboardingpckgsusmvprd.blob.core.usgovcloudapi.net
Microsoft Defender for Endpoint GCC High https://login.microsoftonline.us
Microsoft Defender for Endpoint GCC High https://*.securitycenter.microsoft.us
Microsoft Defender for Endpoint GCC High https://onboardingpckgsusgvprd.blob.core.usgovcloudapi.net
Microsoft Defender for Endpoint DoD https://login.microsoftonline.us
Microsoft Defender for Endpoint DoD https://*.securitycenter.microsoft.us
Microsoft Defender for Endpoint DoD https://onboardingpckgsusgvprd.blob.core.usgovcloudapi.net

Microsoft Defender process exclusions

[!INCLUDE Microsoft Defender for Endpoint processes]