An Azure network security service that is used to protect Azure Virtual Network resources.
The Azure Front Door Connectivity Diagnostics Tool is a PowerShell script (Test-IntuneAFDConnectivity.ps1). To get it to run and use it to validate the new Intune network service endpoints, follow these steps and checks:
- Confirm script location and execution
- Download and extract the script to a local folder (for example,
C:\Tools\IntuneAFD). - Open Windows PowerShell as Administrator.
- Change to the folder where the script is stored:
Set-Location C:\Tools\IntuneAFD - Run the script for public cloud:
For US Government/GCC High/DoD:.\Test-IntuneAFDConnectivity.ps1.\Test-IntuneAFDConnectivity.ps1 -CloudType gov
- Download and extract the script to a local folder (for example,
- Use detailed logging to see why it “won’t run”
If the script exits immediately or returns an error, run with verbose and detailed logging to capture diagnostics:
Then review the log files in.\Test-IntuneAFDConnectivity.ps1 -LogLevel Detailed -OutputPath "C:\Logs" -VerboseC:\Logsfor any PowerShell or connectivity errors. - Check PowerShell execution policy
If the script is blocked by execution policy, set a temporary policy for the current process:
Then rerun the script from the same PowerShell window.Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass - Validate firewall/proxy/VPN for Azure Front Door and Intune endpoints
Even if the script starts, failures in its tests indicate network blocks:
- If Azure Front Door IP Address tests show failed IPs or ranges, ensure Azure Firewall or any upstream firewall/proxy/VPN allows outbound TCP 80 and 443 to the Azure Front Door IP ranges used by Intune. These are documented under the Intune client and host service entry (ID 163), including the Azure Front Door ranges:
-
13.107.219.0/24 -
13.107.227.0/24 -
13.107.228.0/23 -
150.171.97.0/24 -
2620:1ec:40::/48 -
2620:1ec:49::/48 -
2620:1ec:4a::/47
-
- Ensure the Intune client and host service FQDNs and IP subnets are allowed outbound on TCP 80/443, for example:
-
*.manage.microsoft.com -
manage.microsoft.com -
*.dm.microsoft.com -
EnterpriseEnrollment.manage.microsoft.com - And the associated IP subnets listed under ID 163.
-
- If Azure Front Door IP Address tests show failed IPs or ranges, ensure Azure Firewall or any upstream firewall/proxy/VPN allows outbound TCP 80 and 443 to the Azure Front Door IP ranges used by Intune. These are documented under the Intune client and host service entry (ID 163), including the Azure Front Door ranges:
- Confirm no SSL inspection or HTTPS break/inspect on critical endpoints
SSL inspection is not supported on some Intune-related endpoints (for example, Microsoft Store API and Defender for Endpoint). If the script reports “HTTPS endpoint unreachable”, check for:
- HTTPS inspection or TLS interception on:
- Intune service FQDNs
- Azure Front Door IP ranges used by Intune Disable inspection for these endpoints or add appropriate bypass rules.
- HTTPS inspection or TLS interception on:
- Ensure firewall configuration is updated for upcoming Intune changes
As part of the Secure Future Initiative, starting on or shortly after December 2, 2025, Intune network service endpoints will also use Azure Front Door IP addresses. For environments using Azure Firewall or other IP-based allowlists:
- Do not remove existing Intune endpoints.
- Add the Azure Front Door IP ranges for Intune (via the
AzureFrontDoor.MicrosoftSecurityservice tag in the Azure IP Ranges and Service Tags file for public cloud). - Review and update any third-party firewall or proxy allowlists accordingly.
- If the script still will not start at all
If there is no output and no log file created even with
-Verboseand-LogLevel Detailed:- Re-download the script to ensure it is not corrupted.
- Confirm it is being run from PowerShell (not CMD) and that the current directory is the script directory.
- Verify that security software on the machine is not blocking PowerShell script execution.
Once the script runs successfully, use its exit code and detailed log output to identify any remaining blocked FQDNs or IP ranges, then adjust Azure Firewall and any other network devices to allow the required Intune and Azure Front Door endpoints on the specified ports.
References: