Hi
We have deployed Azure Firewall in a hub-spoke topology where the spoke is hosting Azure Virtual Desktop (AVD) session hosts.
I’ve gone through this this article for guidance on how to allow some of the basic Azure infra services (DNS, Health Monitoring, NTP, and KMS etc.)--> https://docs.microsoft.com/en-us/azure/firewall/protect-azure-virtual-desktop
However, it’s not clear on how to create rule exceptions for O365, MS Teams, and Defender. There’s a huge list of URLs and IP listed here for example--> https://docs.microsoft.com/en-us/microsoft-365/enterprise/microsoft-365-ip-web-service?view=o365-worldwide
Also, as the list changes often, would like to know how ppl. manage to keep the firewall rules up to date?
We’re seeing the following errors reported on virtual desktop sessions because of the missing rules / exceptions:


Thanks
Taranjeet Singh