Public IP Ranges for WVD

%3CLINGO-SUB%20id%3D%22lingo-sub-670683%22%20slang%3D%22en-US%22%3EPublic%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-670683%22%20slang%3D%22en-US%22%3E%3CP%3EHello%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAre%20there%20any%20public%20IP%20address%20ranges%2Fsubnets%20specifically%20for%20connectivity%20to%20the%20Windows%20Virtual%20Desktop%20infrastructure%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20have%20a%20secure%20environment%20which%20requires%20us%20to%20whitelist%20IP%20addresses%20on%20our%20on-prem%20firewall%20for%20external%20internet%20access.%20I've%20found%20the%20list%20of%20IP%20segments%20for%20Azure%20datacenters%20(%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-gb%2Fdownload%2Fdetails.aspx%3Fid%3D41653%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-gb%2Fdownload%2Fdetails.aspx%3Fid%3D41653%3C%2FA%3E)%20but%20we%20can't%20really%20whitelist%20all%20of%20those%20IP%20segments%20just%20for%20connectivity%20to%20WVD.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%2C%3C%2FP%3E%3CP%3EDaniel%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-693850%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-693850%22%20slang%3D%22en-US%22%3E%3CP%3EHello%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F354980%22%20target%3D%22_blank%22%3E%40DanRobb%3C%2FA%3E%2C%3C%2FP%3E%0A%3CP%3EWe%20are%20working%20on%20documenting%20the%20IPs%20used%20for%20WVD%20services.%20I%20will%20update%20this%20post%20as%20soon%20as%20documentation%20will%20be%20published%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-713686%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-713686%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F283712%22%20target%3D%22_blank%22%3E%40denisgun%3C%2FA%3E%26nbsp%3BThank%20you.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-767442%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-767442%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F283712%22%20target%3D%22_blank%22%3E%40denisgun%3C%2FA%3EIs%20there%20any%20update%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-838838%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-838838%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F354980%22%20target%3D%22_blank%22%3E%40DanRobb%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESimilar%20issue.%20Any%20traction%20for%20a%20list%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-987670%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-987670%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F283712%22%20target%3D%22_blank%22%3E%40denisgun%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAny%20update%20on%20this%20list%20please%3F%20We%20need%20to%20whitelist%20the%20ranges%20so%20we%20can%20secure%20connection%20to%20a%20DB%20instance%20in%20our%20Azure%20tenant.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1081148%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1081148%22%20slang%3D%22en-US%22%3E%3CP%3EBumping%20this.%26nbsp%3B%20When%20trying%20to%20secure%20the%20WVD%20range%20behind%20an%20NVA%20(in%20this%20case%2C%20a%20Palo%20Alto)%20if%20you%20override%20the%20default%20route%20you%20break%20access%20to%20WVD%20from%20the%20rdweb%20portals.%26nbsp%3B%20Really%20need%20a%20list%20of%20IP%20addresses%20(or%20the%20ability%20to%20use%20microsoft%20managed%20service%20objects!!%20in%20the%20route%20table)%20to%20override.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1126400%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1126400%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F283712%22%20target%3D%22_blank%22%3E%40denisgun%3C%2FA%3E-%20I'd%20like%20this%20as%20well.%26nbsp%3B%20Can%20you%20provide%20a%20status%20update%20as%20to%20when%20we%20can%20expect%20it%3F%26nbsp%3B%20This%20is%20most%20useful%20when%20trying%20to%20convince%20clients%20to%20allow%20this%20on%20their%20network.%26nbsp%3B%20So%20far%2C%20all%20I%20can%20find%20is%20connections%20to%20IPs%20that%20I%20trace%20back%20to%20DNS%20requests%20to%3A%3CBR%20%2F%3E%3CBR%20%2F%3Equery.prod.cms.rt.microsoft.com%3CBR%20%2F%3Erdweb.wvd.microsoft.com%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAn%20IP%20list%20is%20most%20useful%20as%20not%20all%20network%20filters%20can%20trigger%20on%20URLs%2C%20though.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1126552%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1126552%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F488110%22%20target%3D%22_blank%22%3E%40jw6224%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EProbably%20not%20complete%2C%20but%20here's%20the%20list%20I%20ended%20up%20with%20through%20trial%20and%20error.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Enetwork-object%20104.208.0.0%20255.248.0.0%3CBR%20%2F%3Enetwork-object%2013.104.0.0%20255.252.0.0%3CBR%20%2F%3Enetwork-object%2013.107.246.10%20255.255.255.255%3CBR%20%2F%3Enetwork-object%2013.64.0.0%20255.224.0.0%3CBR%20%2F%3Enetwork-object%2013.96.0.0%20255.248.0.0%3CBR%20%2F%3Enetwork-object%20137.116.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%20137.135.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%20151.101.248.133%20255.255.255.255%3CBR%20%2F%3Enetwork-object%20152.199.4.0%20255.255.255.0%3CBR%20%2F%3Enetwork-object%2020.36.0.0%20255.252.0.0%3CBR%20%2F%3Enetwork-object%20204.79.195.0%20255.255.255.0%3CBR%20%2F%3Enetwork-object%20204.79.196.0%20255.255.254.0%3CBR%20%2F%3Enetwork-object%2023.100.64.0%20255.255.248.0%3CBR%20%2F%3Enetwork-object%2023.102.128.0%20255.255.192.0%3CBR%20%2F%3Enetwork-object%2023.37.68.220%20255.255.255.255%3CBR%20%2F%3Enetwork-object%2040.126.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%2040.64.0.0%20255.248.0.0%3CBR%20%2F%3Enetwork-object%2040.71.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%2040.90.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%2040.90.23.0%20255.255.255.0%3CBR%20%2F%3Enetwork-object%2051.143.0.0%20255.255.128.0%3CBR%20%2F%3Enetwork-object%2052.109.0.0%20255.255.252.0%3CBR%20%2F%3Enetwork-object%2052.112.0.0%20255.252.0.0%3CBR%20%2F%3Enetwork-object%2052.125.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%2052.132.0.0%20255.252.0.0%3CBR%20%2F%3Enetwork-object%2052.136.0.0%20255.248.0.0%3CBR%20%2F%3Enetwork-object%2052.146.0.0%20255.254.0.0%3CBR%20%2F%3Enetwork-object%2052.152.0.0%20255.248.0.0%3CBR%20%2F%3Enetwork-object%2052.165.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%2052.177.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%2052.224.0.0%20255.224.0.0%3CBR%20%2F%3Enetwork-object%2052.239.246.0%20255.255.254.0%3CBR%20%2F%3Enetwork-object%2052.96.0.0%20255.240.0.0%3CBR%20%2F%3Enetwork-object%2072.21.0.0%20255.255.0.0%3CBR%20%2F%3Enetwork-object%2096.6.16.17%20255.255.255.255%3CBR%20%2F%3Enetwork-object%2023.102.135.246%20255.255.255.255%3CBR%20%2F%3Enetwork-object%20object%20URL-autologon.microsoftazuread-sso.com%3CBR%20%2F%3Enetwork-object%20object%20URL-genevamondocs.azurewebsites.net%3CBR%20%2F%3Enetwork-object%20object%20URL-global.metrics.nsatc.net%3CBR%20%2F%3Enetwork-object%20object%20URL-login.windows.net%3CBR%20%2F%3Enetwork-object%20object%20URL-mrsglobalsteus2prod.blob.core.windows.net%3CBR%20%2F%3Enetwork-object%20object%20URL-prod.warmpath.msftcloudes.com%3CBR%20%2F%3Enetwork-object%20object%20URL-prod2.metrics.nsatc.net%3CBR%20%2F%3Enetwork-object%20object%20URL-prod3.metrics.nsatc.net%3CBR%20%2F%3Enetwork-object%20object%20URL-prod4.metrics.nsatc.net%3CBR%20%2F%3Enetwork-object%20object%20URL-prod5.metrics.nsatc.net%3CBR%20%2F%3Enetwork-object%20object%20URL-production.diagnostics.monitoring.core.windows.net%3CBR%20%2F%3Enetwork-object%20object%20URL-rdbroker-r0.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rdbroker-r1.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rdbroker.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rddiagnostics-r0.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rddiagnostics-r1.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rddiagnostics.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rdgateway-r0.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rdgateway-r1.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rdweb-r0.wvd.microsoft.com%3CBR%20%2F%3Enetwork-object%20object%20URL-rdweb-r1.wvd.microsoft.com%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1127178%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1127178%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F354980%22%20target%3D%22_blank%22%3E%40DanRobb%3C%2FA%3EWe%20are%20using%20a%20Standard%20Load%20Balancer%20so%20that%20our%20WVD%20hosts%20are%20all%20behind%20one%20IP.%26nbsp%3B%20Might%20be%20the%20solution%20you%20need.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1127214%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1127214%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F516423%22%20target%3D%22_blank%22%3E%40jasonhand%3C%2FA%3EThanks%20for%20your%20reply.%20That's%20useful%20to%20know%20(solves%20a%20totally%20different%20issue%20I'm%20currently%20working%20on)%20but%20won't%20work%20for%20this%20issue.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESince%20the%20session%20hosts%20establish%20a%20reverse%20connection%20with%20the%20RD%20Broker%2C%20we%20don't%20really%20need%20to%20know%20what%20the%20public%20IP%20addresses%20of%20the%20session%20hosts%20are.%20It's%20the%20rest%20of%20the%20WVD%20infrastructure%20that%20we%20need%20them%20for%20(RD%20Web%20Access%2C%20RD%20Broker%2C%20RD%20Diagnostics%20etc.).%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMicrosoft%20still%20haven't%20provided%20a%20list%20of%20WVD%20IP%20ranges.%20ScriptingJAK's%20list%20was%20created%20through%20trial%20and%20error%2C%20but%20Microsoft%20could%20add%20a%20new%20range%20or%20URL%20at%20any%20moment%20and%20break%20WVD%20connectivity%20for%20organisations%20that%20need%20to%20whitelist%20outbound%20internet%20connectivity.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1132971%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1132971%22%20slang%3D%22en-US%22%3E%3CP%3EOver%206%20months%20have%20passed%2C%20do%20we%20have%20these%20IP%20addresses%20yet%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1400879%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1400879%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F354980%22%20target%3D%22_blank%22%3E%40DanRobb%3C%2FA%3E%26nbsp%3Bit%20seems%20these%20were%20just%20published%20at%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fdownload%2Fdetails.aspx%3Fid%3D56519%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20IP%20Ranges%20and%20Service%20Tags%20-%20Public%20Cloud%3C%2FA%3E%20link.%26nbsp%3B%20Awesome!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1404060%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1404060%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F671982%22%20target%3D%22_blank%22%3E%40atlantacloudgroup%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fvirtual-desktop%2Foverview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fvirtual-desktop%2Foverview%3C%2FA%3E%26nbsp%3B-%20we%20support%20Service%20Tag%20and%20FQDN%20Tag.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1426500%22%20slang%3D%22en-US%22%3ERe%3A%20Public%20IP%20Ranges%20for%20WVD%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1426500%22%20slang%3D%22en-US%22%3E%3CP%3EI%20really%20need%20a%20way%20for%20WVD%20sessions%20to%20be%20complaint%20for%20conditional%20access%20to%20work%20correctly%20-%20right%20now%2C%20I%20am%20(manually)%20setting%20the%20IP%20into%20a%20known%20locations%20list%20that%20is%20allowed%20in%20conditional%20access.%26nbsp%3B%20That%20is%20not%20sustainable.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Occasional Contributor

Hello,

 

Are there any public IP address ranges/subnets specifically for connectivity to the Windows Virtual Desktop infrastructure?

 

We have a secure environment which requires us to whitelist IP addresses on our on-prem firewall for external internet access. I've found the list of IP segments for Azure datacenters (https://www.microsoft.com/en-gb/download/details.aspx?id=41653) but we can't really whitelist all of those IP segments just for connectivity to WVD.

 

Thanks,

Daniel

14 Replies
Highlighted

Hello @DanRobb,

We are working on documenting the IPs used for WVD services. I will update this post as soon as documentation will be published

Highlighted

@fdwl Thank you.

Highlighted

@fdwlIs there any update?

Highlighted

@DanRobb 

 

Similar issue. Any traction for a list?

Highlighted

Hi @fdwl 

 

Any update on this list please? We need to whitelist the ranges so we can secure connection to a DB instance in our Azure tenant.

 

Thank you.

Highlighted

Bumping this.  When trying to secure the WVD range behind an NVA (in this case, a Palo Alto) if you override the default route you break access to WVD from the rdweb portals.  Really need a list of IP addresses (or the ability to use microsoft managed service objects!! in the route table) to override.

Highlighted

@fdwl- I'd like this as well.  Can you provide a status update as to when we can expect it?  This is most useful when trying to convince clients to allow this on their network.  So far, all I can find is connections to IPs that I trace back to DNS requests to:

query.prod.cms.rt.microsoft.com
rdweb.wvd.microsoft.com

 

An IP list is most useful as not all network filters can trigger on URLs, though.

Highlighted

@jw6224 

 

Probably not complete, but here's the list I ended up with through trial and error.

 

network-object 104.208.0.0 255.248.0.0
network-object 13.104.0.0 255.252.0.0
network-object 13.107.246.10 255.255.255.255
network-object 13.64.0.0 255.224.0.0
network-object 13.96.0.0 255.248.0.0
network-object 137.116.0.0 255.255.0.0
network-object 137.135.0.0 255.255.0.0
network-object 151.101.248.133 255.255.255.255
network-object 152.199.4.0 255.255.255.0
network-object 20.36.0.0 255.252.0.0
network-object 204.79.195.0 255.255.255.0
network-object 204.79.196.0 255.255.254.0
network-object 23.100.64.0 255.255.248.0
network-object 23.102.128.0 255.255.192.0
network-object 23.37.68.220 255.255.255.255
network-object 40.126.0.0 255.255.0.0
network-object 40.64.0.0 255.248.0.0
network-object 40.71.0.0 255.255.0.0
network-object 40.90.0.0 255.255.0.0
network-object 40.90.23.0 255.255.255.0
network-object 51.143.0.0 255.255.128.0
network-object 52.109.0.0 255.255.252.0
network-object 52.112.0.0 255.252.0.0
network-object 52.125.0.0 255.255.0.0
network-object 52.132.0.0 255.252.0.0
network-object 52.136.0.0 255.248.0.0
network-object 52.146.0.0 255.254.0.0
network-object 52.152.0.0 255.248.0.0
network-object 52.165.0.0 255.255.0.0
network-object 52.177.0.0 255.255.0.0
network-object 52.224.0.0 255.224.0.0
network-object 52.239.246.0 255.255.254.0
network-object 52.96.0.0 255.240.0.0
network-object 72.21.0.0 255.255.0.0
network-object 96.6.16.17 255.255.255.255
network-object 23.102.135.246 255.255.255.255
network-object object URL-autologon.microsoftazuread-sso.com
network-object object URL-genevamondocs.azurewebsites.net
network-object object URL-global.metrics.nsatc.net
network-object object URL-login.windows.net
network-object object URL-mrsglobalsteus2prod.blob.core.windows.net
network-object object URL-prod.warmpath.msftcloudes.com
network-object object URL-prod2.metrics.nsatc.net
network-object object URL-prod3.metrics.nsatc.net
network-object object URL-prod4.metrics.nsatc.net
network-object object URL-prod5.metrics.nsatc.net
network-object object URL-production.diagnostics.monitoring.core.windows.net
network-object object URL-rdbroker-r0.wvd.microsoft.com
network-object object URL-rdbroker-r1.wvd.microsoft.com
network-object object URL-rdbroker.wvd.microsoft.com
network-object object URL-rddiagnostics-r0.wvd.microsoft.com
network-object object URL-rddiagnostics-r1.wvd.microsoft.com
network-object object URL-rddiagnostics.wvd.microsoft.com
network-object object URL-rdgateway-r0.wvd.microsoft.com
network-object object URL-rdgateway-r1.wvd.microsoft.com
network-object object URL-rdweb-r0.wvd.microsoft.com
network-object object URL-rdweb-r1.wvd.microsoft.com

Highlighted

@DanRobbWe are using a Standard Load Balancer so that our WVD hosts are all behind one IP.  Might be the solution you need.

Highlighted

@jasonhandThanks for your reply. That's useful to know (solves a totally different issue I'm currently working on) but won't work for this issue.

 

Since the session hosts establish a reverse connection with the RD Broker, we don't really need to know what the public IP addresses of the session hosts are. It's the rest of the WVD infrastructure that we need them for (RD Web Access, RD Broker, RD Diagnostics etc.).

 

Microsoft still haven't provided a list of WVD IP ranges. ScriptingJAK's list was created through trial and error, but Microsoft could add a new range or URL at any moment and break WVD connectivity for organisations that need to whitelist outbound internet connectivity.

 

 

Highlighted

Over 6 months have passed, do we have these IP addresses yet?

Highlighted

@DanRobb it seems these were just published at the Azure IP Ranges and Service Tags - Public Cloud link.  Awesome!

Highlighted

@Deleted 

https://docs.microsoft.com/en-us/azure/virtual-desktop/overview - we support Service Tag and FQDN Tag.

Highlighted

I really need a way for WVD sessions to be complaint for conditional access to work correctly - right now, I am (manually) setting the IP into a known locations list that is allowed in conditional access.  That is not sustainable.