It's mainly 80 & 443 the most required ports for Microsoft teams communication, you can use the following command while you loginig to Microsoft teams to detect which protocol is stacked.
from CMD type the following
netstat -n
Or you can use fiddler to check the same behaviour.
Skype for Business Online and Microsoft Teams
ID |
Category |
ER |
Addresses |
Ports |
11 |
Optimize |
Yes |
13.107.64.0/18, 52.112.0.0/14 |
UDP:3478, 3479, 3480, 3481 |
12 |
Allow |
Yes |
*.lync.com, *.teams.microsoft.com, teams.microsoft.com |
TCP:443, 80 |
13 |
Allow |
Yes |
*.broadcast.skype.com, broadcast.skype.com |
TCP:443 |
14 |
Default |
No |
quicktips.skypeforbusiness.com |
TCP:443 |
15 |
Default |
No |
*.sfbassets.com, *.urlp.sfbassets.com, skypemaprdsitus.trafficmanager.net |
TCP:443, 80 |
16 |
Default |
No |
*.keydelivery.mediaservices.windows.net, *.msecnd.net, *.streaming.mediaservices.windows.net, ajax.aspnetcdn.com, mlccdn.blob.core.windows.net |
TCP:443 |
17 |
Default |
No |
aka.ms, amp.azure.net |
TCP:443 |
18 |
Default |
No |
*.users.storage.live.com |
TCP:443 |
19 |
Default |
No |
*.adl.windows.com |
TCP:443, 80 |
22 |
Allow |
Yes |
*.skypeforbusiness.com |
TCP:443 |
25 |
Default |
No |
scsinstrument-ss-us.trafficmanager.net, scsquery-ss-asia.trafficmanager.net, scsquery-ss-eu.trafficmanager.net, scsquery-ss-us.trafficmanager.net |
TCP:443 |
26 |
Default |
No |
*.msedge.net, compass-ssl.microsoft.com |
TCP:443 |
27 |
Default |
No |
*.mstea.ms, *.secure.skypeassets.com, mlccdnprod.azureedge.net, videoplayercdn.osi.office.net |
TCP:443 |
29 |
Default |
No |
*.tenor.com |
TCP:443, 80 |
127 |
Default |
No |
*.skype.com |
TCP:443, 80 |
Comments
1 comment
Referenced case 13325
Please sign in to leave a comment.