Share via

The Update firewall configurations for new Intune network service endpoints will not run

Trish Wood 0 Reputation points
2026-04-03T20:30:11.2366667+00:00

tried to run Azure Front Door Connectivity Diagnostics Tool it would not, ran as a user and admin downloaded software PSTools.zip still didn't work. I am losing time and patience with this.

Azure Firewall
Azure Firewall

An Azure network security service that is used to protect Azure Virtual Network resources.


1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-03T20:30:30.72+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    The Azure Front Door Connectivity Diagnostics Tool is a PowerShell script (Test-IntuneAFDConnectivity.ps1). To get it to run and use it to validate the new Intune network service endpoints, follow these steps and checks:

    1. Confirm script location and execution
      1. Download and extract the script to a local folder (for example, C:\Tools\IntuneAFD).
      2. Open Windows PowerShell as Administrator.
      3. Change to the folder where the script is stored:
              Set-Location C:\Tools\IntuneAFD
        
      4. Run the script for public cloud:
              .\Test-IntuneAFDConnectivity.ps1
        
        For US Government/GCC High/DoD:
              .\Test-IntuneAFDConnectivity.ps1 -CloudType gov
        
    2. Use detailed logging to see why it “won’t run” If the script exits immediately or returns an error, run with verbose and detailed logging to capture diagnostics:
         .\Test-IntuneAFDConnectivity.ps1 -LogLevel Detailed -OutputPath "C:\Logs" -Verbose
      
      Then review the log files in C:\Logs for any PowerShell or connectivity errors.
    3. Check PowerShell execution policy If the script is blocked by execution policy, set a temporary policy for the current process:
         Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
      
      Then rerun the script from the same PowerShell window.
    4. Validate firewall/proxy/VPN for Azure Front Door and Intune endpoints Even if the script starts, failures in its tests indicate network blocks:
      • If Azure Front Door IP Address tests show failed IPs or ranges, ensure Azure Firewall or any upstream firewall/proxy/VPN allows outbound TCP 80 and 443 to the Azure Front Door IP ranges used by Intune. These are documented under the Intune client and host service entry (ID 163), including the Azure Front Door ranges:
        • 13.107.219.0/24
        • 13.107.227.0/24
        • 13.107.228.0/23
        • 150.171.97.0/24
        • 2620:1ec:40::/48
        • 2620:1ec:49::/48
        • 2620:1ec:4a::/47
      • Ensure the Intune client and host service FQDNs and IP subnets are allowed outbound on TCP 80/443, for example:
        • *.manage.microsoft.com
        • manage.microsoft.com
        • *.dm.microsoft.com
        • EnterpriseEnrollment.manage.microsoft.com
        • And the associated IP subnets listed under ID 163.
    5. Confirm no SSL inspection or HTTPS break/inspect on critical endpoints SSL inspection is not supported on some Intune-related endpoints (for example, Microsoft Store API and Defender for Endpoint). If the script reports “HTTPS endpoint unreachable”, check for:
      • HTTPS inspection or TLS interception on:
        • Intune service FQDNs
        • Azure Front Door IP ranges used by Intune Disable inspection for these endpoints or add appropriate bypass rules.
    6. Ensure firewall configuration is updated for upcoming Intune changes As part of the Secure Future Initiative, starting on or shortly after December 2, 2025, Intune network service endpoints will also use Azure Front Door IP addresses. For environments using Azure Firewall or other IP-based allowlists:
      • Do not remove existing Intune endpoints.
      • Add the Azure Front Door IP ranges for Intune (via the AzureFrontDoor.MicrosoftSecurity service tag in the Azure IP Ranges and Service Tags file for public cloud).
      • Review and update any third-party firewall or proxy allowlists accordingly.
    7. If the script still will not start at all If there is no output and no log file created even with -Verbose and -LogLevel Detailed:
      • Re-download the script to ensure it is not corrupted.
      • Confirm it is being run from PowerShell (not CMD) and that the current directory is the script directory.
      • Verify that security software on the machine is not blocking PowerShell script execution.

    Once the script runs successfully, use its exit code and detailed log output to identify any remaining blocked FQDNs or IP ranges, then adjust Azure Firewall and any other network devices to allow the required Intune and Azure Front Door endpoints on the specified ports.


    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.