Skip to content

Commit b86bdf8

Browse files
committed
41450210 - net reqs gcc
1 parent e0a9d98 commit b86bdf8

1 file changed

Lines changed: 32 additions & 5 deletions

File tree

windows-365/enterprise/requirements-network.md

Lines changed: 32 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,17 +54,19 @@ To use your own network and provision Hybrid Azure AD joined Cloud PCs, you must
5454

5555
### [Windows 365 Government](#tab/government)
5656

57-
All of the Windows 365 Enterprise requirements apply with the following additions:
57+
All of the Windows 365 Enterprise requirements apply to [Windows 365 Government](introduction-windows-365-government.md) with the following additions:
5858

59-
To use your own network and provision both Azure AD joined and Hybrid Azure AD joined Cloud PCs, you must meet the following requirements:
59+
To use your own network and provision either Azure AD joined or Hybrid Azure AD joined Cloud PCs, you must meet the following requirements:
6060

6161
- The customer must have a subscription in the Azure Government environment.
62-
- Azure virtual network: You must have a virtual network (vNET) in your Azure Government subscription in the same region as where the Windows 365 Cloud PCs are created. For Government Community Cloud (GCC) and Government Community Cloud - High (GCCH), this will be a US Gov region.
62+
- Azure virtual network: You must have a virtual network (vNET) in your Azure Government subscription in the same region as where the Windows 365 Cloud PCs are created. For Government Community Cloud (GCC) and Government Community Cloud - High (GCCH), this will be a US Gov region.
6363

6464
---
6565

6666
## Allow network connectivity
6767

68+
### [Windows 365 Enterprise](#tab/ent)
69+
6870
You must allow traffic in your Azure network configuration to the following service URLs and ports:
6971

7072
- [Network endpoints for Microsoft Intune](/mem/intune/fundamentals/intune-endpoints)
@@ -114,12 +116,37 @@ You must allow traffic in your Azure network configuration to the following serv
114116
- enterpriseregistration.windows.net
115117
- global.azure-devices-provisioning.net (443 & 5671 outbound)
116118
- hm-iot-in-prod-preu01.azure-devices.net (443 & 5671 outbound)
117-
- hm-iot-in-prod-prap01.azure-devices.net (443 & 5671 outbound)
118-
- hm-iot-in-prod-prna01.azure-devices.net (443 & 5671 outbound)
119+
- hm-iot-in-prod-prap01.azure-devices.net (443 & 5671 outbound)
120+
- hm-iot-in-prod-prna01.azure-devices.net (443 & 5671 outbound)
119121
- hm-iot-in-prod-prau01.azure-devices.net (443 & 5671 outbound)
120122

121123
All endpoints connect over port 443.
122124

125+
### [Windows 365 Government](#tab/gov)
126+
127+
You must allow traffic in your Azure network configuration to the service URLs and ports listed in this section. All endpoints connect over port 443 unless specified otherwise.
128+
129+
- GCC: [Network endpoints for Microsoft Intune](/mem/intune/fundamentals/intune-endpoints).
130+
- GCC: [Azure Virtual Desktop required URL list](/azure/virtual-desktop/safe-url-list).
131+
- GCCH: [Microsoft Intune network endpoints for US government deployments](/mem/intune/fundamentals/intune-us-government-endpoints).
132+
- GCCH: [Required URLs for Azure Virtual Desktop for US government deployments](/azure/virtual-desktop/safe-url-list?tabs=azure-for-us-government).
133+
134+
#### Cloud PC required URLs
135+
136+
| Address : Port | Required for |
137+
| --- | --- | --- |
138+
| 168.63.129.16:80 | GCC, GCCH |
139+
| 168.63.129.16:32526 | GCC, GCCH |
140+
| 168.63.129.16:53 | GCC, GCCH |
141+
| https://ghp01.ghp.cpcgateway.usgovtrafficmanager.net | GCCH |
142+
| https://gcp01.gcp.cpcgateway.usgovtrafficmanager.net | GCC |
143+
| TBD cmd agents / hermes related endpoint | |
144+
| 168.63.129.16:80 | GCC, GCCH |
145+
| cpcstprovghpghp01.blob.core.usgovcloudapi.net:443[br]cpcsaamssa1ghpghp01.blob.core.usgovcloudapi.net:443[br]cpcstcnryghpghp01.blob.core.usgovcloudapi.net:443[br]cpcsacnrysa1ghpghp01.blob.core.usgovcloudapi.net:443[br] | GCCH |
146+
| cpcstprovgcpgcp01.blob.core.usgovcloudapi.net:443[br]cpcsaamssa1gcpgcp01.blob.core.usgovcloudapi.net:443[br]cpcstcnrygcpgcp01.blob.core.usgovcloudapi.net:443[br]cpcsacnrysa1gcpgcp01.blob.core.usgovcloudapi.net:443 | GCC |
147+
148+
---
149+
123150
### Remote Desktop Protocol (RDP) broker service endpoints
124151

125152
Direct connectivity to Azure Virtual Desktop RDP broker service endpoints is critical for remoting performance to a Cloud PC. These endpoints affect both connectivity and latency. To align with the [Microsoft 365 network connectivity principles](/microsoft-365/enterprise/microsoft-365-network-connectivity-principles#new-office-365-endpoint-categories), you should categorize these endpoints as **Optimize** endpoints. We recommend that you use a direct path from your Azure virtual network to those endpoints.

0 commit comments

Comments
 (0)