As mentioned in MC1150664, as part of Microsoft’s ongoing Secure Future Initiative (SFI), starting on or shortly after December 2, 2025, the network service endpoints for Microsoft Intune will also use the Azure Front Door IP addresses. Since Basic Mobility and Security for Microsoft 365 uses Intune infrastructure, customers may need to add Azure Front Door IP addresses, if using a firewall allowlist that allows outbound traffic based on IP addresses or Azure service tags.
Do not remove any existing network endpoints required for Basic Mobility and Security for Microsoft 365. Additional network endpoints are documented as part of the Azure Front Door and service tags information referenced in the files linked below:
- Public clouds: Download Azure IP Ranges and Service Tags – Public Cloud from Official Microsoft Download Center
- Government clouds: Download Azure IP Ranges and Service Tags – US Government Cloud from Official Microsoft Download Center
The additional ranges are those listed in the JSON files linked above and can be found by searching for “AzureFrontDoor.MicrosoftSecurity”.
[How this will affect your organization:]
If you have configured an outbound traffic policy for IP address ranges or Azure service tags for your firewalls, routers, proxy servers, client-based firewalls, VPN or network security groups, you will need to update them to include the new Azure Front Door ranges with the “AzureFrontDoor.MicrosoftSecurity” tag.
Note: The previously available PowerShell scripts for retrieving Microsoft Intune endpoint IP addresses and FQDNs no longer returns accurate data from the Office 365 Endpoint service. Instead, use the consolidated list provided in the Intune endpoints documentation. Using the original scripts or endpoint lists from the Office 365 Endpoint service is insufficient and may lead to incorrect configurations.
[What you need to do to prepare:]
Ensure that your firewall rules are updated and added to your firewall’s allowlist with the additional IP addresses documented under Azure Front Door by December 2, 2025.
Alternatively, you may add the service tag “AzureFrontDoor.MicrosoftSecurity” to your firewall rules to allow outbound traffic on port 443 for the addresses in the tag.
If you are not the IT admin who can make this change, notify your networking team. If you are responsible for configuring internet traffic, refer to the following documentation for more details:
For network best practices, make sure to check out the blog: Support tip: Aligning network policy with Intune and Zero Trust
If you have a helpdesk, inform them about this upcoming change. If you need additional assistance, contact Microsoft Support and refer to this message center post.
Source: Microsoft
![Reminder: Update firewall configurations to include new network endpoints [MC1183282] 1 Reminder: Update firewall configurations to include new network endpoints [MC1183282]](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-steve-27594599-1024x683.webp)
![Microsoft Entra: Soft deletion and restoration for cloud security groups [MC1183299] 2 pexels no1379 32440666](https://mwpro.co.uk/wp-content/uploads/2025/06/pexels-no1379-32440666-150x150.webp)
![Retirement of the TeamworkDevice (beta) API in Microsoft Graph [MC1183294] 3 pexels bess hamiti 83687 36487](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-bess-hamiti-83687-36487-150x150.webp)
![New toolbar customization for multi-select in Outlook Mobile [MC1183297] 4 pexels 550498053 16792653](https://mwpro.co.uk/wp-content/uploads/2024/08/pexels-550498053-16792653-150x150.webp)
![Updated compose toolbar and actions in Outlook Mobile [MC1183298] 5 woman 6572974 1920](https://mwpro.co.uk/wp-content/uploads/2025/06/woman-6572974_1920-150x150.webp)
![Introducing the Explore Pane in Microsoft 365 Copilot [MC1183295] 7 Introducing the Explore Pane in Microsoft 365 Copilot [MC1183295]](https://mwpro.co.uk/wp-content/uploads/2025/06/cat-7003849_1920-96x96.webp)