Share via

Unable to add/update Azure firewall policy application rule with a valid FQDN

Mr K 25 Reputation points
2026-03-10T10:26:07.5566667+00:00

I am trying to add a application rule into Azure firewall policy to allow a valid FQDN but it's failing the validation. PII is a valid FQDN belonging to University of Cambridge. I would like to do it only through Azure portal as i don't have a Test Firewall setup to try methods such as Powershell, ARM/ bicep etc.

User's image

Azure Firewall
Azure Firewall

An Azure network security service that is used to protect Azure Virtual Network resources.

0 comments No comments

3 answers

Sort by: Most helpful
  1. Praveen Bandaru 11,305 Reputation points Microsoft External Staff Moderator
    2026-03-24T08:40:33.9666667+00:00

    Hello **Mr K
    I understand that you're attempting to create an application rule in the Azure firewall to permit your subdomains, but it's failing due to an invalid FQDN error message.

    There is a known issue with this format, which is why implementing the rule is not working my backend team is actively working on to fix the issue.

    The problem occurs with FQDNs when there are exactly two characters after the dot (.), causing our validation to fail. For instance, FQDNs like www.cam.ac.uk or similar will not be accepted. Any domain with .XX, test.XX.contoso.com, or xx.test.contoso will also fail validation.

    You can set up rules using scripting, such as CLI or PowerShell commands.


    If the answer is helpful, please 'Accept the answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".

    0 comments No comments

  2. Alex Burlachenko 19,695 Reputation points
    2026-03-11T06:17:23.4+00:00

    Hi Mr K,

    actually this is not about Cambridge being invalid, it is about how Azure Firewall validates FQDNs in application rules. In Firewall Policy application rules u cant use a plain apex or certain formats the way you expect and sometimes the portal validation is stricter than normal DNS logic.

    Try removing the scheme and make sure u are not adding http or https in the FQDN field, it must be just the hostname. Try using a wildcard like *.cam.ac.uk instead of www.cam.ac.uk because Azure Firewall application rules are really designed to match domains rather than single hostnames in some cases.

    Another thing to check is that u are not accidentally including spaces or invisible characters when pasting. The field must contain only the FQDN, no protocol no port no trailing slash.

    If it still fails in the portal but the format is clearly correct, this can be a portal validation bug. In that case the only real workaround is to try Azure CLI or Powershell because sometimes the backend accepts it even when the portal UI blocks it.

    So first try *.cam.ac.uk, then carefully retype www.cam.ac.uk manually and if it still says invalid I would try CLI because the domain itself is absolutely valid.

    rgds,

    Alex


  3. Thanmayi Godithi 8,310 Reputation points Microsoft External Staff Moderator
    2026-03-10T10:58:46.89+00:00

    Hi @Mr K,

    Thank you for reaching out on Microsoft Q&A forum.

    I understand that you want to add an Application rule only via portal. As per the screenshot provided the error encountered was invalid FQDN.

    When you specify an exact FQDN like www.PII.PII.uk, the Azure portal validation can sometimes fail because Azure Firewall application rules rely on SNI/Host header inspection, and Microsoft recommends using left‑most wildcards for domain-based matching in application rules. Using *.PII.PII.uk aligns with the supported pattern and therefore passes validation successfully. [learn.microsoft.com]

    Using *.PII.PII.uk does not automatically mean all subdomains are being actively used or exposed. It simply allows traffic to any subdomain if and only if such a subdomain actually exists and is requested by the client. In your case, since only www.PII.PII.uk is in use, effectively only that hostname is matched at runtime. Azure Firewall does not create or assume additional subdomains—it only evaluates outbound traffic against the rule based on the requested FQDN.

    Microsoft documentation also clarifies that wildcards are supported only in application rules (HTTP/HTTPS, MSSQL) and must be placed on the left-most label (for example, *.contoso.com). This is the recommended and supported approach when exact FQDN validation fails in the portal.

    Kindly let us know if the above helps or you need further assistance on this issue.

    If the answer is helpful, please 'Accept the answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.