Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
If your monitored application or infrastructure is behind a firewall, you need to configure network access to allow communication with Azure Monitor services.
Azure Monitor uses service tags, which provide a dynamic way to manage network access, especially if you're using Azure network security groups, Azure Firewall, or next generation firewalls (NGFW) that can implement service tags. For hybrid or on-premises resources, or network perimeter controls that don't support service tags, retrieve the equivalent IP address lists programmatically or download them as JSON files. For more information, see Service tags on-premises.
To cover all necessary exceptions, use the service tags ActionGroup
, ApplicationInsightsAvailability
, and AzureMonitor
. Service tags don't replace validation and authentication checks required for cross-tenant communications between a customer's Azure resource and other service tag resources.
Outbound traffic
Each of the following Azure Monitor service sections require outbound traffic rules (destination) unless indicated otherwise. For example, availability monitoring and action group webhooks require inbound firewall rules (source).
Note
Azure Government uses the top-level ___domain .us
instead of .com
. Compare Azure Public and Azure Government endpoints for common Azure services.
Application Insights ingestion
You need to open the following outbound ports in your firewall to allow the Application Insights SDK or Application Insights agent to send data to the portal.
Note
These endpoints support IPv4 and IPv6.
Purpose | Hostname | Type | Ports |
---|---|---|---|
Telemetry | dc.applicationinsights.azure.com dc.applicationinsights.microsoft.com dc.services.visualstudio.com {region}.in.applicationinsights.azure.com |
Global Global Global Regional |
443 |
Live Metrics | live.applicationinsights.azure.com rt.applicationinsights.microsoft.com rt.services.visualstudio.com {region}.livediagnostics.monitor.azure.com An example {region} is westus2 |
Global Global Global Regional |
443 |
Application Insights agent configuration
Application Insights agent configuration is needed only when you're making changes.
Purpose | Hostname | Ports |
---|---|---|
Configuration | management.core.windows.net |
443 |
Configuration | management.azure.com |
443 |
Configuration | login.windows.net |
443 |
Configuration | login.microsoftonline.com |
443 |
Configuration | secure.aadcdn.microsoftonline-p.com |
443 |
Configuration | auth.gfx.ms |
443 |
Configuration | login.live.com |
443 |
Installation | globalcdn.nuget.org , packages.nuget.org ,api.nuget.org/v3/index.json nuget.org , api.nuget.org , dc.services.vsallin.net |
443 |
Availability tests
Availability tests require inbound firewall access and are best configured with service tags and custom headers. For more information, see Availability testing behind a firewall.
Logs Query API endpoints
Starting July 1, 2025, Log Analytics enforces TLS 1.2 or higher for secure communication. For more information, see Secure Logs data in transit.
Purpose | Hostname | Ports |
---|---|---|
Application Insights | api.applicationinsights.io api1.applicationinsights.io api2.applicationinsights.io api3.applicationinsights.io api4.applicationinsights.io api5.applicationinsights.io api.applicationinsights.azure.com *.api.applicationinsights.azure.com |
443 |
Log Analytics | api.loganalytics.io *.api.loganalytics.io api.loganalytics.azure.com api.monitor.azure.com *.api.monitor.azure.com |
443 |
Azure Data Explorer | ade.loganalytics.io ade.applicationinsights.io adx.monitor.azure.com *.adx.monitor.azure.com *.adx.applicationinsights.azure.com adx.applicationinsights.azure.com adx.loganalytics.azure.com *.adx.loganalytics.azure.com |
443 |
Logs Ingestion API endpoints
Starting March 1, 2026, Logs Ingestion enforces TLS 1.2 or higher for secure communication. For more information, see Secure Logs data in transit.
Purpose | Hostname | Ports |
---|---|---|
Logs Ingestion API | *.ingest.monitor.azure.com prod.la.ingest.monitor.core.windows.NET *.prod.la.ingestion.msftcloudes.com prod.la.ingestion.msftcloudes.com *.prod.la.ingest.monitor.core.windows.NET |
443 |
Application Insights analytics
Purpose | Hostname | Ports |
---|---|---|
CDN (Content Delivery Network) | applicationanalytics.azureedge.net |
80,443 |
Media CDN | applicationanalyticsmedia.azureedge.net |
80,443 |
Log Analytics portal
Purpose | Hostname | Ports |
---|---|---|
Portal | portal.loganalytics.io |
443 |
Application Insights Azure portal extension
Purpose | Hostname | Ports |
---|---|---|
Application Insights extension | stamp2.app.insightsportal.visualstudio.com |
80,443 |
Application Insights extension CDN | insightsportal-prod2-cdn.aisvc.visualstudio.com insightsportal-prod2-asiae-cdn.aisvc.visualstudio.com insightsportal-cdn-aimon.applicationinsights.io |
80,443 |
Application Insights SDKs (Software Development Kits)
Purpose | Hostname | Ports |
---|---|---|
Application Insights JS SDK CDN | az416426.vo.msecnd.net js.monitor.azure.com |
80,443 |
Action group webhooks
Webhooks require inbound network access. Eliminate the need to update firewall and network configurations by using the ActionGroup service tag. Alternatively, you can query the current list of IP addresses used by action groups with the Get-AzNetworkServiceTag PowerShell command or the other Service tags on-premises methods.
Here's an example of an inbound security rule with an ActionGroup service tag:
Application Insights Profiler for .NET
Purpose | Hostname | Ports |
---|---|---|
Agent | agent.azureserviceprofiler.net *.agent.azureserviceprofiler.net profiler.monitor.azure.com |
443 |
Portal | gateway.azureserviceprofiler.net dataplane.diagnosticservices.azure.com |
443 |
Storage | *.core.windows.net |
443 |
Snapshot Debugger
Note
Application Insights Profiler for .NET and Snapshot Debugger share the same set of IP addresses.
Purpose | Hostname | Ports |
---|---|---|
Agent | agent.azureserviceprofiler.net *.agent.azureserviceprofiler.net snapshot.monitor.azure.com |
443 |
Portal | gateway.azureserviceprofiler.net dataplane.diagnosticservices.azure.com |
443 |
Storage | *.core.windows.net |
443 |
Frequently asked questions
This section provides answers to common questions.
Can I monitor an intranet web server?
Yes, but you need to allow traffic to our services by either firewall exceptions or proxy redirects.
See IP addresses used by Azure Monitor to review our full list of services and IP addresses.
How do I reroute traffic from my server to a gateway on my intranet?
Route traffic from your server to a gateway on your intranet by overwriting endpoints in your configuration. If the Endpoint
properties aren't present in your config, these classes use the default values which are documented in IP addresses used by Azure Monitor.
Your gateway should route traffic to our endpoint's base address. In your configuration, replace the default values with http://<your.gateway.address>/<relative path>
.