Skip to content

Commit 33751a7

Browse files
authored
Merge pull request #8559 from ErikjeMS/win365gccB
41450210 - net reqs gcc
2 parents e43c2c3 + c797872 commit 33751a7

1 file changed

Lines changed: 86 additions & 7 deletions

File tree

windows-365/enterprise/requirements-network.md

Lines changed: 86 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Each customer has its specific requirements based on the workload they use to pr
4141

4242
### [Windows 365 Enterprise](#tab/enterprise)
4343

44-
To use your own network and provision Azure AD joined Cloud PCs, you must meet the following requirements:
44+
To use your own network and provision Azure Active Directory (Azure AD) joined Cloud PCs, you must meet the following requirements:
4545

4646
- Azure virtual network: You must have a virtual network (vNET) in your Azure subscription in the same region as where the Windows 365 desktops are created.
4747
- Network bandwidth: See [Azure’s Network guidelines](/windows-server/remote/remote-desktop-services/network-guidance).
@@ -54,17 +54,31 @@ To use your own network and provision Hybrid Azure AD joined Cloud PCs, you must
5454

5555
### [Windows 365 Government](#tab/government)
5656

57-
All of the Windows 365 Enterprise requirements apply with the following additions:
57+
All of the Windows 365 Enterprise requirements apply to [Windows 365 Government](introduction-windows-365-government.md) with the following additions:
58+
59+
#### Azure Active Directory joined Cloud PCs
5860

59-
To use your own network and provision both Azure AD joined and Hybrid Azure AD joined Cloud PCs, you must meet the following requirements:
61+
To use your own network and provision Azure AD joined Cloud PCs, you must meet the following requirements:
6062

6163
- The customer must have a subscription in the Azure Government environment.
62-
- Azure virtual network: You must have a virtual network (vNET) in your Azure Government subscription in the same region as where the Windows 365 Cloud PCs are created. For Government Community Cloud (GCC) and Government Community Cloud - High (GCCH), this will be a US Gov region.
64+
- Azure virtual network: You must have a virtual network (vNET) in your Azure Government subscription in the same region as where the Windows 365 Cloud PCs are created. For Government Community Cloud (GCC) and Government Community Cloud High (GCCH), this will be a US Gov region.
65+
- Network bandwidth: See [Azure’s Network guidelines](/windows-server/remote/remote-desktop-services/network-guidance).
66+
- A subnet within the vNet and available IP address space.
67+
68+
#### Hybrid Azure AD joined Cloud PCs
69+
70+
To use your own network and provision Hybrid Azure AD joined Cloud PCs, you must meet the above requirements, and the following requirements:
71+
72+
- The customer must have a subscription in the Azure Government environment.
73+
- The Azure virtual network must be able to resolve DNS entries for your Active Directory Domain Services (AD DS) environment. To support this resolution, define your AD DS DNS servers as the DNS servers for the virtual network.
74+
- The Azure vNet must have network access to an enterprise domain controller, either in Azure or on-premises.
6375

6476
---
6577

6678
## Allow network connectivity
6779

80+
### [Windows 365 Enterprise](#tab/ent)
81+
6882
You must allow traffic in your Azure network configuration to the following service URLs and ports:
6983

7084
- [Network endpoints for Microsoft Intune](/mem/intune/fundamentals/intune-endpoints)
@@ -114,12 +128,78 @@ You must allow traffic in your Azure network configuration to the following serv
114128
- enterpriseregistration.windows.net
115129
- global.azure-devices-provisioning.net (443 & 5671 outbound)
116130
- hm-iot-in-prod-preu01.azure-devices.net (443 & 5671 outbound)
117-
- hm-iot-in-prod-prap01.azure-devices.net (443 & 5671 outbound)
118-
- hm-iot-in-prod-prna01.azure-devices.net (443 & 5671 outbound)
131+
- hm-iot-in-prod-prap01.azure-devices.net (443 & 5671 outbound)
132+
- hm-iot-in-prod-prna01.azure-devices.net (443 & 5671 outbound)
119133
- hm-iot-in-prod-prau01.azure-devices.net (443 & 5671 outbound)
120134

121135
All endpoints connect over port 443.
122136

137+
### [Windows 365 Government](#tab/gov)
138+
139+
You must allow traffic in your Azure network configuration to the service URLs and ports listed in this section. All endpoints connect over port 443 unless specified otherwise.
140+
141+
- GCC: [Network endpoints for Microsoft Intune](/mem/intune/fundamentals/intune-endpoints).
142+
- GCC: [Azure Virtual Desktop required URL list](/azure/virtual-desktop/safe-url-list).
143+
- GCCH: [Microsoft Intune network endpoints for US government deployments](/mem/intune/fundamentals/intune-us-government-endpoints).
144+
- GCCH: [Required URLs for Azure Virtual Desktop for US government deployments](/azure/virtual-desktop/safe-url-list?tabs=azure-for-us-government).
145+
146+
#### Cloud PC required URLs
147+
148+
| Address:Port | Required for |
149+
| --- | --- | --- |
150+
| 168.63.129.16:80 | GCC, GCCH |
151+
| 168.63.129.16:32526 | GCC, GCCH |
152+
| 168.63.129.16:53 | GCC, GCCH |
153+
| https://ghp01.ghp.cpcgateway.usgovtrafficmanager.net | GCCH |
154+
| https://gcp01.gcp.cpcgateway.usgovtrafficmanager.net | GCC |
155+
| TBD cmd agents / hermes related endpoint | |
156+
| 168.63.129.16:80 | GCC, GCCH |
157+
| cpcstprovghpghp01.blob.core.usgovcloudapi.net:443<br>cpcsaamssa1ghpghp01.blob.core.usgovcloudapi.net:443<br>cpcstcnryghpghp01.blob.core.usgovcloudapi.net:443<br>cpcsacnrysa1ghpghp01.blob.core.usgovcloudapi.net:443<br> | GCCH |
158+
| cpcstprovgcpgcp01.blob.core.usgovcloudapi.net:443<br>cpcsaamssa1gcpgcp01.blob.core.usgovcloudapi.net:443<br>cpcstcnrygcpgcp01.blob.core.usgovcloudapi.net:443<br>cpcsacnrysa1gcpgcp01.blob.core.usgovcloudapi.net:443 | GCC |
159+
160+
#### Intune-dependent URLs
161+
162+
| Address:Port | Required for |
163+
| --- | --- | --- |
164+
| portal.manage.microsoft.us:443 | GCCH |
165+
|m.manage.microsoft.us:443 | GCCH |
166+
| mam.manage.microsoft.us:443 | GCCH |
167+
| wip.mam.manage.microsoft.us:443 | GCCH |
168+
| Fef.FXPASU01.manage.microsoft.us:443 | GCCH |
169+
| portal.manage.microsoft.com:443 | GCC |
170+
| m.manage.microsoft.com:443 | GCC |
171+
| fef.msuc03.manage.microsoft.com:443 | GCC |
172+
| mam.manage.microsoft.com:443 | GCC |
173+
| wip.mam.manage.microsoft.com:443 | GCC |
174+
175+
#### Azure Active Directory-dependent URLs
176+
177+
| Address:Port | Required for |
178+
| --- | --- | --- |
179+
| login.microsoftonline.us | GCCH |
180+
| enterpriseregistration.microsoftonline.us:443 | GCCH |
181+
| login.live.com:443 | GCCH, GCC |
182+
| login.microsoftonline.com:443 | GCC |
183+
| enterpriseregistration.windows.net:443 | GCC |
184+
185+
#### Azure Virtual Device-dependent URLs
186+
187+
| Address:Port | Required for |
188+
| --- | --- | --- |
189+
| rdweb.wvd.azure.us:443 | GCCH |
190+
| rdbroker.wvd.azure.us:443 | GCCH |
191+
| rdweb.wvd.microsoft.com:443 | GCC |
192+
| rdbroker.wvd.microsoft.com:443 | GCC |
193+
194+
#### Localization package
195+
196+
| Address:Port | Required for |
197+
| --- | --- | --- |
198+
| download.microsoft.com:443 | GCCH, GCC |
199+
| software-download.microsoft.com:443 | GCCH, GCC |
200+
201+
---
202+
123203
### Remote Desktop Protocol (RDP) broker service endpoints
124204

125205
Direct connectivity to Azure Virtual Desktop RDP broker service endpoints is critical for remoting performance to a Cloud PC. These endpoints affect both connectivity and latency. To align with the [Microsoft 365 network connectivity principles](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#new-office-365-endpoint-categories), you should categorize these endpoints as **Optimize** endpoints. We recommend that you use a direct path from your Azure virtual network to those endpoints.
@@ -128,7 +208,6 @@ To make it easier to configure network security controls, use Azure Virtual Desk
128208

129209
Changing the network routes of a Cloud PC (at the network layer or at the Cloud PC layer like VPN) might break the connection between the Cloud PC and the Azure Virtual Desktop RDP broker. If so, the end user will be disconnected from their Cloud PC until a connection be re-established.
130210

131-
132211
## DNS requirements
133212

134213
As part of the Hybrid Azure AD Join requirements, your Cloud PCs must be able to join on-premises Active Directory. That requires that the Cloud PCs be able to resolve DNS records for your on-premises AD environment.

0 commit comments

Comments
 (0)