research-hub/azure-firewall-rules/AVDRDWeb.jsonc (40 lines of code) (raw):

/* * Denies access to the AVD client endpoint. * This is relevant if the AVD session hosts might be used as research VMs. * In that case, researchers should not be able to jump off the session host * to another AVD host pool. * 2023-12-29: This rule is less relevant now because we're no longer allowing access * to the AVD infrastructure thanks to using private endpoints. * * NOTE: If needed, these rules MUST NOT be split between AzureCloud and AzureUSGovernment. */ [ { "name": "Block_AVDWeb_App", "priority": 100, "ruleCollectionType": "FirewallPolicyFilterRuleCollection", "action": { "type": "Deny" }, "rules": [ { "ruleType": "ApplicationRule", "name": "AVD Client Endpoint", "protocols": [ { "protocolType": "Http", "port": 80 }, { "protocolType": "Https", "port": 443 } ], "targetFqdns": ["client.wvd.microsoft.com", "rdweb.wvd.azure.us"], "terminateTLS": false, "sourceIpGroups": ["{{ipAddressPool}}"], "destinationAddresses": [] } ] } ]