Open a ticket
Chat with us
BLOG Published on 2023/12/10 by Woshada Dassanayake in Tech-Tips

Configuring Private links for Azure Virtual Desktop – Part 2 Private Endpoint for Feed discovery and Feed Download

AVD is the Microsoft VDI solution with global Microsoft managed PAAS components such as Remote gateway, Web Access, and Broker services. Now, you can use Azure private links to connect to these remote resources privately and securely. With private endpoints, you no longer expose your services to the public internet. Using Microsoft's backbone, session hosts will connect to the PAAS components by internal IP addresses. Also, if required, Microsoft configures clients to connect only through the Site-to-site VPN or Express route.

This is Part 2 of the article series, where I will configure private endpoints for Feed discovery and Feed Download, a Full private AVD solution. In part 1 (here), I discussed configuring private endpoints for session hosts to the Microsoft AVD control plan.

This can be considered to be optional in many situations. When you configure private Endpoints for Feed Discovery and Feed download, your clients need to be on the corporate private network to access AVD. AVD traffic flow will be fully routed through the private internal network.

To configure, you need to do the same Private endpoint configurations on Workspace for Feed and Global.


  1. Log in to the Azure Portal – Azure Virtual Desktop – Workspaces, click the workspace and go to Networking.


  2. Click Disable public access and use private access.


  3. Click Private endpoint connections and + New private endpoint.


  4. Select Feed


  5. Next, select the subnet which you want to place the Private endpoint. You can have a dedicated one if you wish.

  6. Next, you need to select the DNS. You can use Private DNS Zone. I'm using on-premise ActiveI'mrectory as my DNS server, so I'm not integrating with private DNS Zone.


  7. Review and create the Private Endpoint.
  8. Next, you need to ensure that your clients can resolve the DNS of the private endpoints. Here, I'm using on-premises ActivI'mirectory as my DNS for clients. I'm creating a forward lookup zone and manually creating A records for private endpoint FQDN to resolve internal IP addresses.


Optional - DNS forward lookup zone

Next, you need to make sure that your clients can resolve the DNS of the private endpoints. Here, I'm using on-premises activI'mirectory as my DNS for clients. I'm creating a forward look zone and manually creating A records for private endpoint FQDN to resolve internal IP addresses.

  1. Login to the ADDS domain controller.
  2. Go to DNS – Forward lookup zone – Create new zone. Skip this if you already have a forward lookup zone for privatelink.wvd.microsoft.com
  3. Name the zone as – wvd.microsoft.com
  4. Go to the Private endpoint – DNS Configurations and note down custom DNS records.


  5. Copy the FQDN till wvd.microsoft.com and create the A record in ADDS DNS using it.
    In example -




  6. Create all custom DNS records in ADDS DNS.


Configure Private Endpoint for Global Feed download

  1. Log in to the Azure Portal – Azure Virtual Desktop – Workspaces, click the workspace and go to Networking.
  2. If it's not already disabled, Disable public access and use private access
  3. Click Private endpoint connections and + New private endpoint


  4. This time, select Global.


  5. Next, select the subnet where you want to place the private endpoint; you can have a dedicated one if you wish.


  6. Next, you need to select the DNS. You can use Private DNS Zone. I'm using on-premise ActiveI'mrectory as my DNS server, so I'm not integrating with private DNS Zone.


  7. Go to the Private endpoint – DNS Configurations and note down custom DNS records.


  8. As you did in the previous step, Copy the FQDN till wvd.microsoft.com and create the A record in ADDS DNS using it.


  9. After configuring the DNS, restart the Session host VMs. Once you have configured everything, you will see VMs connecting to the AVD VM's service through private links.


  10. Now, if you try to connect to the AVD session hosts using the public internet, you should see the error below, and you can now only connect from the internal network.

I hope this post is helpful.






Woshada Dassanayake

Technical Lead in Cloud Infrastructure and Operations

Expert in Cloud platform operations, Cloud hosting and Network operations.

Newsletter

To keep up with the news and updates related to our products, make sure to subscribe to our newsletter!

Copyright © 2024 Terminalworks. All Rights Reserved