US government endpoints for Microsoft Intune

This page lists the US Government, US Government Community (GCC) High, and Department of Defense (DoD) endpoints needed for proxy settings in your Intune deployments.

To manage devices behind firewalls and proxy servers, you must enable communication for Intune.

  • The proxy server must support both HTTP (80) and HTTPS (443) because Intune clients use both protocols
  • For some tasks (like downloading software updates), Intune requires unauthenticated proxy server access to manage.microsoft.us

You can modify proxy server settings on individual client computers. You can also use Group Policy settings to change settings for all client computers located behind a specified proxy server.

Managed devices require configurations that let All Users access services through firewalls.

Note

The inspection of SSL traffic is not supported on 'manage.microsoft.us', or 'has.spserv.microsoft.com' endpoint.

For more information about Windows 10 auto-enrollment and device registration for US government customers, see Set up automatic enrollment for Windows.

The following tables list the ports and services that the Intune client accesses:

Endpoint IP address
*.manage.microsoft.us 52.227.99.114
20.141.108.112
13.72.17.166
52.126.185.115
52.227.211.91
23.97.10.212
52.227.29.124
52.247.174.16
52.227.29.244
52.227.208.144
52.227.1.233
20.141.104.221
52.247.134.218
20.141.78.227
13.77.236.201
enterpriseregistration.microsoftonline.us 13.72.188.239
13.72.55.179

US Government customer designated endpoints:

  • Azure portal: https://portal.azure.us/
  • Microsoft 365: https://portal.office365.us/
  • Intune Company Portal: https://portal.manage.microsoft.us/
  • Microsoft Intune admin center: https://intune.microsoft.us/

Network requirements for PowerShell scripts and Win32 apps

If you're using Intune to deploy PowerShell scripts or Win32 apps, you'll also need to grant access to endpoints in which your tenant currently resides.

Azure Scale Unit (ASU) Storage name CDN
FXPASU01 sovereignprodimedatapri
sovereignprodimedatasec
sovereignprodimedatahotfix
sovereignprodimedatapri.azureedge.net
sovereignprodimedatasec.azureedge.net
sovereignprodimedatahotfix.azureedge.net

Partner service endpoints that Intune depends on:

  • Azure AD Sync service: https://syncservice.gov.us.microsoftonline.com/DirectoryService.svc
  • Evo STS: https://login.microsoftonline.us
  • Directory Proxy: https://directoryproxy.microsoftazure.us/DirectoryProxy.svc
  • Azure AD Graph: https://directory.microsoftazure.us and https://graph.microsoftazure.us
  • MS Graph: https://graph.microsoft.us
  • ADRS: https://enterpriseregistration.microsoftonline.us

Windows Push Notification Services

On Intune-managed devices managed by using Mobile Device Management (MDM), Windows Push Notification Services (WNS) is required for device actions and other immediate activities. For more information, see Enterprise Firewall and Proxy Configurations to Support WNS Traffic

Apple device network information

Used for Hostname (IP address/subnet) Protocol Port
Retrieving and displaying content from Apple servers itunes.apple.com
*.itunes.apple.com
*.mzstatic.com
*.phobos.apple.com
*.phobos.itunes-apple.com.akadns.net
HTTP 80
Communication with APNS servers #-courier.push.apple.com
'#' is a random number from 0 to 50.
TCP 5223 and 443
Various functions including accessing the internet, iTunes store, macOS app store, iCloud, messaging, etc. phobos.apple.com
ocsp.apple.com
ax.itunes.apple.com
ax.itunes.apple.com.edgesuite.net
HTTP/HTTPS 80 or 443

For more information, see:

Next steps

Network endpoints for Microsoft Intune