Hello,
This problem is directly tied to how Windows Update communicates through restrictive proxy and firewall configurations. It’s not related to Windows 365 Enterprise or Windows for Business—it’s a pure infrastructure and networking issue. The reason your updates are failing is that Windows Update requires access to a specific set of Microsoft endpoints, and unlike normal web browsing, it uses multiple domains, CDNs, and sometimes hard‑coded IP ranges. Simply whitelisting a handful of Microsoft URLs in the proxy override list is not sufficient.
For Windows 10/11 and Server 2022/2025, the required endpoints include windowsupdate.microsoft.com, update.microsoft.com, download.windowsupdate.com, *.update.microsoft.com, *.windowsupdate.com, *.delivery.mp.microsoft.com, and *.dl.delivery.mp.microsoft.com. Additionally, the Windows Update client uses the Delivery Optimization service, which requires access to *.do.dsp.mp.microsoft.com. If those are blocked or only partially whitelisted, the update agent will connect but fail to download payloads.
Another common oversight is SSL inspection. If your proxy or firewall is performing TLS interception, the Windows Update agent will reject the connection because it requires a direct trusted Microsoft certificate chain. You need to bypass SSL inspection for the update domains.
The most reliable way to handle this in a locked‑down environment is to configure Group Policy or MDM to point clients to Windows Update for Business or to an internal WSUS server. WSUS allows you to control patch distribution without opening broad internet access. If you must use direct Windows Update, you need to ensure that all the required domains and CDNs are whitelisted and excluded from proxy filtering. Microsoft maintains an official list of required endpoints in their documentation, and you should mirror that list exactly rather than trying to guess or paste domains piecemeal.
In short, your updates are failing because the restrictive proxy is blocking or inspecting traffic to required Microsoft update endpoints. Either configure WSUS internally or expand your proxy whitelist to include the full set of Windows Update and Delivery Optimization domains, with SSL inspection disabled for those. Once that’s in place, the VMs will patch normally without breaking your browsing restrictions.
I hope you've found something useful here. If it helps you get more insight into the issue, it's appreciated to accept the answer. Should you have more questions, feel free to leave a message. Have a nice day!
Domic Vo.