Hi Leo,
How is your issue going? Has it been resolved yet? If it has, please consider accepting the answer as it helps others sharing the same problem benefit too. Thank you :)
VP
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Hello everyone,
I’m seeking advice regarding firewall configurations for Windows updates. Despite having three active rules, the update process occasionally fails with the following error: 'We couldn't connect to the update service. We'll try again later.'
My current configuration includes:
M365 URL EDL: Source servers to Palo Alto M365 URL EDL (ports 80/443).
M365 IP EDL: Source servers to Palo Alto M365 IP EDL (ports 80/443).
Custom URL List: Source servers to a collection of Microsoft update URLs (ports 80/443).
Despite these rules, connectivity remains inconsistent. I suspect I may be missing specific required URLs. Could someone provide guidance or a comprehensive list of the necessary endpoints?
Thank you,
Hi Leo,
The core issue stems from relying on Microsoft 365 External Dynamic Lists for operating system updates, as Microsoft maintains a strict separation between its productivity application endpoints and its Windows Update infrastructure. While your current lists successfully handle regular Office traffic, the Windows Update agent is being blocked from reaching its dedicated content delivery networks. To stabilize the update process, you must expand your custom URL list on the Palo Alto appliance to include the native Microsoft wildcards for https://www.google.com/search?q=update.microsoft.com, https://www.google.com/search?q=windowsupdate.com, https://www.google.com/search?q=delivery.mp.microsoft.com, and https://www.google.com/search?q=download.windowsupdate.com over both port 80 and 443. Permitting HTTP alongside HTTPS is essential because the update client frequently initiates unencrypted requests for payload manifests before securing the connection to download the binaries.
Beyond simply allowing the traffic through your security policies, you must configure your firewall to bypass SSL Decryption and Deep Packet Inspection for these specific domains. The Windows Update client utilizes strict certificate pinning, meaning it explicitly expects a security certificate issued directly by Microsoft. If the firewall intercepts this traffic and presents its own internal inspection certificate, the update agent will drop the connection for security reasons, resulting in the generic connection error you are experiencing. You can verify if decryption is breaking the chain by running the Get-WindowsUpdateLog cmdlet in PowerShell and reviewing the generated log file on your desktop for TLS or certificate validation failures.
Hope this answer brought you some useful information. If it did, please hit “accept answer”. Should you have any questions, feel free to leave a comment.
VP
For reliable Windows Update connectivity behind a firewall/proxy, allow the documented Windows Update and related Microsoft service endpoints instead of relying only on generic M365 URL/IP feeds.
Key points:
*.prod.do.dsp.mp.microsoft.com (TLS 1.2)emdl.ws.microsoft.com (HTTP)*.dl.delivery.mp.microsoft.com (HTTP)*.windowsupdate.com (HTTP)*.delivery.mp.microsoft.com (HTTPS)*.update.microsoft.com (TLS 1.2)tsfe.trafficshaping.dsp.mp.microsoft.com (TLS 1.2)http://windowsupdate.microsoft.comhttp://*.windowsupdate.microsoft.comhttps://*.windowsupdate.microsoft.comhttp://*.update.microsoft.comhttps://*.update.microsoft.comhttp://*.windowsupdate.comhttp://download.windowsupdate.comhttp://download.microsoft.comhttp://*.download.windowsupdate.comhttp://ntservicepack.microsoft.com*.wdcp.microsoft.com*.wdcpalt.microsoft.com*.wd.microsoft.com*.update.microsoft.com*.delivery.mp.microsoft.com*.windowsupdate.comctldl.windowsupdate.com*.dl.delivery.mp.microsoft.com (HTTP/80)*.windowsupdate.com (HTTP/80)nslookup and curl/Invoke-WebRequest).MicrosoftUpdateServer) is first when appropriate.Implementing the documented Windows Update, Microsoft Update, Defender, and Delivery Optimization endpoints—using the exact protocol/port combinations—and excluding critical URLs from SSL inspection typically resolves intermittent “couldn’t connect to the update service” errors in locked-down environments.
References: