Skip to content

Commit faba736

Browse files
Merge pull request #16347 from ErikjeMS/win365b
54374136
2 parents 63755c2 + 253e5c2 commit faba736

File tree

2 files changed

+5
-1
lines changed

2 files changed

+5
-1
lines changed

windows-365/enterprise/partner-integration-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ While scenarios not listed here might still work in customers’ production envi
5252
1. A user authenticates using Microsoft Entra ID, on-premises Active Directory, or a third party identity provider.
5353
2. Windows 365 establishes a connection to the partner cloud gateway using partner protocols.
5454
3. A Cloud PC is assigned to the user and is accessible from the web/workspace portals.
55-
4. Windows 365 establishes a connection to the Cloud PC using partner protocols.
55+
4. Windows 365 establishes a connection to the Cloud PC using partner protocols.
5656

5757
<!-- ########################## -->
5858
## Next steps

windows-365/enterprise/provisioning-errors.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -184,6 +184,10 @@ If you are seeing this error, some factors to consider are:
184184
- If the device is Intune-enrolled, you can apply Intune policy to disable the ports.
185185
- The user can also disable the ports manually by adding a local firewall rule onto their device. For a list of high risk ports that are recommended for blocking, please see [Security admin rules in Azure Virtual Network Manager](/azure/virtual-network-manager/concept-security-admins#protect-high-risk-ports).
186186

187+
## Other provisioning failures
188+
189+
If you encounter other provisioning errors not covered above, make sure all the required endpoints are allowed on the VNet used for your ANC and any gateway device.
190+
187191
<!-- ########################## -->
188192
## Next steps
189193
[Troubleshooting](troubleshooting.md).

0 commit comments

Comments
 (0)