GlobalProtect on Windows 365 Cloud PC
Focus
Focus
GlobalProtect

GlobalProtect on Windows 365 Cloud PC

Table of Contents

GlobalProtect on Windows 365 Cloud PC

GlobalProtect on Windows 365 Cloud PC
Where Can I Use This?What Do I Need?
  • NGFW (managed by Panorama and Strata Cloud Manager)
  • Prisma Access (managed by Panorama and Strata Cloud Manager)
  • GlobalProtect 6.2.6-c857 and later 6.2.x releases or 6.3.2 and later 6.3.x releases
A Windows 365 Cloud PC is a virtual machine that provides a Windows desktop experience in the cloud. You can deploy GlobalProtect on Cloud PCs to enhance network security for cloud-based virtual desktop environments. Windows and macOS users can connect to the cloud PC via the Remote Desktop (RDP) protocol, enabling them to access private applications hosted in the cloud. GlobalProtect routes network traffic through Prisma Access, providing additional defense against unauthorized access and cyber threats.
Follow the steps below to deploy GlobalProtect on a Windows 365 Cloud PC:
  1. Prepare Win32 app content for upload.
    During this stage, you configure the GlobalProtect client settings and prepare the installation package.
  2. Add the Win32 app to Microsoft Intune.
    During this step, you add the GlobalProtect app to Intune and configure the deployment settings. The system then pushes the GlobalProtect installation to the designated Cloud PCs based on the settings and groups you've specified. The GlobalProtect app is installed when the Cloud PC receives and processes this deployment instruction from Intune.
    It is recommended that you set the User Switch Tunnel Rename Timeout to the maximum value to avoid GlobalProtect getting disconnected when the RDP tunnel is disconnected or closed. The User Switch Tunnel Rename Timeout value range is as follows:
    • GlobalProtect version 6.2.x releases till 6.2.8: 0 to 600 seconds
    • GlobalProtect version 6.2.8 and later: 0 to 7200 seconds
    For an uninterrupted RDP stream between the host and cloud PC, you must exclude Microsoft network traffic in one of the following ways:
    • Exclude Wildcard FQDN (*.wvd.microsoft.com) and the Windows Virtual Desktop service tags. You can obtain IP information for the Windows Virtual Desktop service tag manually with the Azure IP Ranges JSON file. For more information, refer to Azure IP Ranges and Service Tags – Public Cloud. You can also use a PowerShell script to get the IPs in a CSV format.
      Since the IP address count exceeds 200 entries, you may need to use advanced split tunneling. It is recommended that you configure bypass with wildcard FQDNs since FQDNs do not change over time. You can also add other service endpoints to your optimized path. For more information, refer to the Microsoft Network Requirements. If your solution does not support wildcard FQDNs, you can use IP addresses for the bypass configuration. Currently, Microsoft only provides IP addresses for RDP connectivity.
    • Exclude the following access routes and domains:
      • Enforcer exclusion list:
        • 40.64.144.0/20
        • 20.202.0.0/16
        • 51.5.0.0/16
        • *.wvd.microsoft.com
      • Split tunneling exclusion list:
        • 40.64.144.0/20
        • 20.202.0.0/16
        • 51.5.0.0/16
        • *.wvd.microsoft.com
        The table below provides more details on the exclusion list:
        Bypass TypeValueDescriptionNotes
        FQDN
        *.wvd.microsoft.com
        TCP Based RDP Bypass
        TCP Only (UDP subnet/s needs to be added as required)
        IP
        40.64.144.0/20
        TCP Based RDP Bypass
        The IP range is anticipated to be fully utilized by the end of January 2025 (consolidating from current ~380 /32s)
        IP
        20.202.0.0/16
        UDP based RDP bypass via TURN (Current)
        The TURN relays are currently used and will be discontinued once the 51.5.0.0/16 subnet is in use.
        IP
        51.5.0.0/16
        UDP based RDP bypass via TURN (Current)
        Future use (eta early 2025) –New Dedicated TURN infrastructure to Windows 365/AVD
        Check with Microsoft to confirm whether any additional subnets or domains are required to exclude RDP traffic.
        TURN traffic for RDP Shortpath will bypass split tunnel configuration and subsequently to enforce the split tunnel configuration you need to implement Security Policy to block the sessions across the tunnel.
  3. Review the event logs on the Windows host and the managed app logs on Intune to confirm that the GlobalProtect app was deployed successfully on the Cloud PC.

Supported Features and Limitations

For a list of GlobalProtect features supported on Windows 365 Cloud PC, see the Compatibility Matrix.
Connect Before Logon is not supported on Windows 365 Cloud PC. This is because the Remote Desktop Protocol (RDP) session to the Cloud PC is established using pre-authenticated credentials, allowing the user to log in directly without using the Windows login screen. In addition, the RDP session closes as soon as the user logs out. This is expected behavior of the Microsoft Cloud PC architecture. Since Connect Before Logon requires the Windows login screen to function, it is not compatible in this environment.
Pre-Logon is supported on Windows 365 Cloud PC for the following scenarios:
  • Cloud PC reboot - after a reboot, the cloud PC establishes the prelogon tunnel until the user logs in.
  • Cloud PC sign out - when the user is signed out from the PC, the prelogon tunnel is established and remains connected until the user signs back in.
Disconnecting from the Cloud PC or closing the Cloud PC window are treated as lock events. As a result, GlobalProtect continues to use the user-logon tunnel and does not switch to the pre-logon tunnel. This is expected behavior.