Android Enterprise devices require access to several Google services in order to provision, receive policies, install applications, and maintain compliance. Organisations operating behind firewalls or with URL-filtering proxies need to ensure the following domains are accessible.
At minimum, devices need access to:
*.google.com - covers Google Play, managed Google Play, account services, and FCM (Firebase Cloud Messaging) for push notifications*.googleapis.com - API endpoints for device management and app distribution*.gstatic.com - static content delivery*.android.com - Android-specific servicesplay.google.com / play.google.com/work - managed Google Play accessaccounts.google.com - authenticationfcm.googleapis.com - push notifications for policy deliveryGoogle maintains the full and current list of required endpoints in the Android Enterprise network requirements support article.
In addition to the Google endpoints above, your EMM vendor will have their own set of required domains and ports. These vary by vendor and should be confirmed with your EMM documentation. Common examples include:
*.manage.microsoft.com, *.microsoftonline.com, and several others documented by Microsoft*.google.com with narrow allowlisting - some organisations attempt to allowlist only specific Google subdomains. This is fragile, as Google rotates and adds subdomains regularly. The broad *.google.com wildcard is strongly recommendedIf devices are failing to provision or check in, Google provides a connectivity diagnostics guide. Many EMM platforms also include device-level connectivity checks in their diagnostics tools.
MANAGED INFO HUB also has an Android Enterprise connectivity check baked in for app-derived testing of endpoint accessibility.