You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Provide access to Azure and Microsoft Update | Allow | Windows Admin Center | Azure Local | TCP | 445 |
104
104
| Use Windows Remote Management (WinRM) 2.0<br> for HTTP connections to run commands<br> on remote Windows servers | Allow | Windows Admin Center | Azure Local | TCP | 5985 |
@@ -113,7 +113,7 @@ Ensure that the following firewall rules are configured in your on-premises fire
| Allow inbound/outbound connectivity to the Active Directory Web services (ADWS) and Active Directory Management Gateway Service | Allow |Active Directory Services | Azure Local| TCP | 9389 |
116
+
| Allow inbound/outbound connectivity to the Active Directory Web services (ADWS) and Active Directory Management Gateway Service | Allow |Azure Local | Active Directory Services| TCP | 9389 |
117
117
118
118
### Network Time Protocol
119
119
@@ -198,4 +198,4 @@ This section shows how to configure Microsoft Defender firewall to allow IP addr
198
198
For more information, see also:
199
199
200
200
- The Windows Firewall and WinRM 2.0 ports section of [Installation and configuration for Windows Remote Management](/windows/win32/winrm/installation-and-configuration-for-windows-remote-management#windows-firewall-and-winrm-20-ports).
201
-
- [About Azure Local deployment](../deploy/deployment-introduction.md).
201
+
- [About Azure Local deployment](../deploy/deployment-introduction.md).
0 commit comments