Configuration du pare-feu pour Intune AD Connector dans les systèmes existants

Les pare-feu existants peuvent compliquer l'utilisation d'Intune Connector for Active Directory. Ce guide montre comment gérer en toute sécurité la connectivité dans les configurations restreintes.
Image de Mario

Mario

Table des matières

Modern endpoint management with Microsoft Intune enables IT teams to automate device provisioning and management processes, including Windows Autopilot scenarios and Hybrid Azure AD Join.

However, not every organization operates in a greenfield environment.

Legacy infrastructures, often found in healthcare, public sector, education or manufacturing come with specific challenges:

  • No Application Control features in firewalls
  • No Host-based Ruleset automation
  • No wildcard support for FQDN-based rules
  • Manual IP address maintenance is required

This blog post outlines how to design a secure and operationally manageable firewall configuration for the Intune Connector for Active Directory, even in restricted and technically outdated environments.

The challenge

The Intune Connector for Active Directory requires outbound communication to various Microsoft cloud services to function properly. However, in legacy environments, this can present some challenges:

  • No wildcard support in the firewall (no *.microsoft.com)
  • No Application Control feature available
  • Only specific IP addresses or FQDNs can be configured
  • Firewall rules must be maintained manually

 

Recommended technical approach

Step 1: Identify required endpoints

Microsoft provides official documentation listing all required URLs and IP address ranges for Microsoft 365 services and Intune:

Focus Categories for Intune Connector:

  • Microsoft 365 Common & Office Online
  • Intune
  • Azure Active Directory

Optional for Automation: Microsoft’s Endpoint API provides a machine-readable JSON file for automated processing (more here).

Step 2: Firewall ruleset design

Define dedicated outbound rules for the Intune Connector server.

Note: If DNS resolution is restricted, IP addresses must be resolved manually and configured explicitly in the firewall.

Step 3: Operational process for IP maintenance

Since Microsoft services evolve continuously, it’s essential to establish a reliable process for maintaining firewall rules.

Recommended steps:

  1. Monthly check of the official Microsoft documentation.
  2. Optional: PowerShell script querying the Microsoft Endpoint API for changes.
  3. Generate an automated notification or create a ticket for the firewall team.
  4. Keep documentation updated with the current IP ranges and URLs.

Step 4: Automation pipeline flow

  • Update IP Addresses: Automated PowerShell script pulls the latest Microsoft Endpoint API data.
  • Update DSC Config: IP addresses are dynamically injected into the DSC configuration template.
  • XOAP Deploy: XOAP pulls the new configuration and applies it to the target firewall servers.
  • Compliance check: XOAP runs a configuration compliance scan to validate correct deployment.

Best practices for firewall management in legacy environments

Long-term optimization options

Organizations should evaluate possible optimizations over time:

  • Upgrade firewall systems to support Application Control features.
  • Implement transparent or explicit proxy solutions.
  • Utilize Microsoft Azure Service Tags for dynamic IP management.
  • Consider Azure Firewall or modern next-generation firewalls for cloud-centric environments.

Automation use cases

Fully automated firewall changes with XOAP's Configuration Management

XOAP's Configuration Management makes it easy to define, version and automatically deploy configuration settings across systems, including firewalls, servers, and other infrastructure components.

By using Config as Code principles alongside PowerShell Desired State Configuration (DSC), firewall rules can be fully automated, audited, and enforced across multiple environments.

XOAP integration provides:

What XOAP provides for firewall management

Final thoughts

Running Intune Connector for Active Directory in environments with strict firewall rules is possible. It just takes the right setup and processes. By creating clear firewall rules, managing IPs and keeping good documentation, even older systems can safely connect to Microsoft cloud services.

Plus d'articles de blog comme celui-ci

EUC Hexagrid 2025 by Dizzion
Actualités

L'Hexagrid de l'EUC et notre rôle

XOAP est l'un des principaux acteurs de l'écosystème de l'informatique pour l'utilisateur final (EUC). Consultez l'Hexagrid EUC pour un aperçu technique détaillé.

fr_FR
Retour en haut