<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing Microsoft Intune using Access Control Policy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-Microsoft-Intune-using-Access-Control-Policy/m-p/262038#M51381</link>
    <description>&lt;P&gt;Thanks for sharing with the community!&lt;/P&gt;</description>
    <pubDate>Thu, 06 Nov 2025 17:40:21 GMT</pubDate>
    <dc:creator>Daniel_Kuhl1</dc:creator>
    <dc:date>2025-11-06T17:40:21Z</dc:date>
    <item>
      <title>Securing Microsoft Intune using Access Control Policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-Microsoft-Intune-using-Access-Control-Policy/m-p/261865#M51339</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hello CheckMates,&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do you know that Microsoft is changing Intune network infrastructure impacting access control policies? Thanks to my colleague&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/40764"&gt;@MatthieuFeroul&lt;/a&gt;&amp;nbsp;for bringing this &lt;A title="Changes in Microsoft Intune communication" href="https://techcommunity.microsoft.com/blog/intunecustomersuccess/support-tip-upcoming-microsoft-intune-network-changes/4452738" target="_blank" rel="noopener"&gt;Microsoft Intune change&lt;/A&gt; to my attention! In the article you read:&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;"[...]&amp;nbsp;&lt;SPAN&gt;highlighting an important upcoming change to Intune network service endpoints. Starting on or shortly after&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;December 2, 2025&lt;/STRONG&gt;&lt;SPAN&gt;, Intune will also use&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Azure Front Door IP addresses&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to improve security and simplify firewall management."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What does it mean for Check Point Firewall administrators?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Don't panic &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt; Check Point &lt;STRONG&gt;Updatable Object 'Azure Front Door Public Services'&lt;/STRONG&gt; allows defining with a few clicks the relevant communication flow. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can see in the example snip of my test rule base below, that my lab network group "vpn-dom-r82gw" has access to 'Intune Services" and "Azure Front Door" and both have hits.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="rule-base-intune.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31994i43ADE550A085EBB8/image-size/large?v=v2&amp;amp;px=999" role="button" title="rule-base-intune.png" alt="rule-base-intune.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my lab, I observe traffic matching the "Azure Front Door for Intune" rule since last week, but please keep in mind, this is just a lab and I am not giving any general statement here.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="rule-base-front-door-log.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31996iC8ABD29D1D8646A6/image-size/large?v=v2&amp;amp;px=999" role="button" title="rule-base-front-door-log.png" alt="rule-base-front-door-log.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I left the 'Services' column to 'Any' in order to understand which services are currently used by my Intune managed device (an elderly Windows 10 computer, ready to retire). Therefore, I observed that in my lab, 'Intune Services' is using HTTP and HTTPS for communication. I haven't investigated this further.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="rule-base-front-intune-log.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31998i845A5BB2C98A328E/image-size/large?v=v2&amp;amp;px=999" role="button" title="rule-base-front-intune-log.png" alt="rule-base-front-intune-log.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Hope this heads up is helping you, shaping Access Control Policies for the relevant changes in the Microsoft Intune communication flow.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;greetings&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;pelmer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 10:05:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-Microsoft-Intune-using-Access-Control-Policy/m-p/261865#M51339</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2025-11-05T10:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Microsoft Intune using Access Control Policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-Microsoft-Intune-using-Access-Control-Policy/m-p/261930#M51350</link>
      <description>&lt;P&gt;Amazing as always, Peter &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 00:10:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-Microsoft-Intune-using-Access-Control-Policy/m-p/261930#M51350</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-06T00:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Microsoft Intune using Access Control Policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-Microsoft-Intune-using-Access-Control-Policy/m-p/262038#M51381</link>
      <description>&lt;P&gt;Thanks for sharing with the community!&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 17:40:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-Microsoft-Intune-using-Access-Control-Policy/m-p/262038#M51381</guid>
      <dc:creator>Daniel_Kuhl1</dc:creator>
      <dc:date>2025-11-06T17:40:21Z</dc:date>
    </item>
  </channel>
</rss>

