You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/faq.md
+9-18Lines changed: 9 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: virtual-network-manager
5
5
author: mbender-ms
6
6
ms.service: azure-virtual-network-manager
7
7
ms.topic: faq
8
-
ms.date: 07/11/2025
8
+
ms.date: 02/24/2026
9
9
ms.author: mbender
10
10
ms.custom:
11
11
- references_regions
@@ -23,7 +23,7 @@ This article answers frequently asked questions about Azure Virtual Network Mana
23
23
For current information about region support, refer to [Products available by region](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=virtual-network-manager).
24
24
25
25
> [!NOTE]
26
-
> All regions have[availability zones](/azure/reliability/availability-zones-region-support).
26
+
> Many Azure regions support[availability zones](/azure/reliability/availability-zones-region-support). To see which regions support availability zones, see the [Azure regions list](/azure/reliability/regions-list).
27
27
28
28
### What are common use cases for Azure Virtual Network Manager?
29
29
@@ -39,11 +39,11 @@ For current information about region support, refer to [Products available by re
39
39
40
40
### What's the cost of using Azure Virtual Network Manager?
41
41
42
-
Azure Virtual Network Manager charges are based on the number of virtual networks with an active Virtual Network Manager configuration deployed onto it. For example, if a Virtual Network Manager scope contains 100 virtual networks but configurations have only been deployed onto 5 of those virtual networks, you will be charged for those 5 virtual networks (not all 100). Also note that a charge for peering applies to the traffic volume of virtual networks that are managed by a deployed connectivity configuration (either mesh or hub-and-spoke).
42
+
Azure Virtual Network Manager charges are based on the number of virtual networks with an active Virtual Network Manager configuration deployed onto it. For example, if a Virtual Network Manager scope contains 100 virtual networks but configurations have only been deployed onto five of those virtual networks, you'll be charged for those five virtual networks (not all 100). Also note that a charge for peering applies to the traffic volume of virtual networks that are managed by a deployed connectivity configuration (either mesh or hub-and-spoke).
43
43
44
-
If a virtual network has multiple configurations deployed onto it by the same Virtual Network Manager instance, that virtual network only incurs a single charge rate; it will not duplicate charges. For example, if a Virtual Network Manager deploys both a connectivity configuration and a security admin configuration onto the same set of 5 virtual networks, you will be charged for those 5 virtual networks, but not charged twice. This cost does not account for multiple configurations unless the configurations originate from different Virtual Network Manager instances.
44
+
If a virtual network has multiple configurations deployed onto it by the same Virtual Network Manager instance, that virtual network only incurs a single charge rate; it will not duplicate charges. For example, if a Virtual Network Manager deploys both a connectivity configuration and a security admin configuration onto the same set of five virtual networks, you'll be charged for those five virtual networks, but not charged twice. This cost doesn't account for multiple configurations unless the configurations originate from different Virtual Network Manager instances.
45
45
46
-
Before March 2025, Azure Virtual Network Manager charges were based by default on the number of subscriptions that contained a virtual network with an active Virtual Network Manager configuration deployed onto it. If you created your Virtual Network Manager instance prior to March 2025, you may choose to [switch your pricing to the virtual network-based pricing](overview.md#pricing).
46
+
Before February 2025, Azure Virtual Network Manager charges were based by default on the number of subscriptions that contained a virtual network with an active Virtual Network Manager configuration deployed onto it. If you created your Virtual Network Manager instance prior to February 2025, you can choose to [switch your pricing to the virtual network-based pricing](overview.md#pricing).
47
47
48
48
Azure Virtual Network Manager's [**network verifier**](concept-virtual-network-verifier.md) tool charges per reachability analysis run in an Azure Virtual Network Manager verifier workspace. This charge is separate from Azure Virtual Network Manager charges.
49
49
@@ -118,9 +118,7 @@ No. Azure Virtual Network Manager doesn't currently support the ability to move
118
118
119
119
### Can I move a subscription with an Azure Virtual Network Manager to another tenant?
120
120
121
-
Yes, but there are some considerations to keep in mind:
122
-
- The target tenant can't have an Azure Virtual Network Manager created.
123
-
- The spoke virtual networks in the network group can lose their reference when changing tenants, thus losing connectivity to the hub virtual network. To resolve this, after moving the subscription to another tenant, you must manually add the spoke virtual networks to the network group of Azure Virtual Network Manager.
121
+
No, moving the subscription where the Azure Virtual Network Manager instance exists to another tenant isn't supported. For more information, see [Limitations with Azure Virtual Network Manager](concept-limitations.md).
124
122
125
123
### How can I see what configurations are applied to help me troubleshoot?
126
124
@@ -148,27 +146,20 @@ The effect of each method is the same, where bi-directional connectivity is esta
148
146
149
147
### When managing virtual networks using virtual network peering, does this result in paying virtual network peering charges twice with Azure Virtual Network Manager?
150
148
151
-
There's no second or double charge for peering. Your virtual network manager respects all previously created virtual network peerings, and migrates those connections. All peering resources, whether created inside a virtual network manager or outside, with incur a single peering charge.
149
+
There's no second or double charge for peering. Your virtual network manager respects all previously created virtual network peerings, and migrates those connections. All peering resources, whether created inside a virtual network manager or outside, incur a single peering charge.
152
150
153
151
### Can I create exceptions to security admin rules?
154
152
155
153
Normally, security admin rules are defined to block traffic across virtual networks. However, there are times when certain virtual networks and their resources need to allow traffic for management or other processes. For these scenarios, you can [create exceptions](./concept-enforcement.md#network-traffic-enforcement-and-exceptions-with-security-admin-rules) where necessary. [Learn how to block high-risk ports with exceptions](how-to-block-high-risk-ports.md) for these scenarios.
156
154
157
155
### How can I deploy multiple security admin configurations to a region?
158
156
159
-
You can deploy only one security admin configuration to a region. However, multiple connectivity configurations can exist in a region if you[create multiple rule collections](how-to-block-network-traffic-portal.md#add-a-rule-collection-and-security-rule) in a security admin configuration.
157
+
You can deploy only one security admin configuration to a region. However, multiple connectivity configurations can exist in a region. To deploy multiple security admin rule sets to a region,[create multiple rule collections](how-to-block-network-traffic-portal.md#add-a-rule-collection-and-security-rule) in a security admin configuration.
160
158
161
159
### Do security admin rules apply to Azure private endpoints?
162
160
163
161
Currently, security admin rules don't apply to Azure private endpoints that fall under the scope of a virtual network managed by Azure Virtual Network Manager.
| Any | Any |`VirtualNetwork`|`VirtualNetwork`| Allow |
171
-
172
163
### Can an Azure Virtual WAN hub be part of a network group?
173
164
174
165
No, an Azure Virtual WAN hub can't be in a network group at this time.
@@ -195,7 +186,7 @@ Azure SQL Managed Instance has some network requirements. These requirements are
195
186
196
187
#### Are you applying security rules to a virtual network or subnet that contains services that block security configuration rules?
197
188
198
-
Certain services require specific network requirements to function properly. These services include Azure SQL Managed Instance, Azure Databricks, and Azure Application Gateway. By default, application of security admin rules is skipped on [virtual networks and subnets that contain any of these services](./concept-security-admins.md#nonapplication-of-security-admin-rules). Because**Allow** rules pose no risk of conflict, you can opt to apply **Allow Only** rules by setting the security configurations' `AllowRulesOnly` field on the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` .NET class.
189
+
Certain services require specific network requirements to function properly. By default, security admin rules aren't applied to virtual networks containing Azure SQL Managed Instance or Azure Databricks. Additionally, security admin rules aren't applied at the subnet level for services such as Azure Application Gateway, Azure Bastion, Azure Firewall, Azure Route Server, Azure VPN Gateway, Azure Virtual WAN, and Azure ExpressRoute Gateway. For the full list, see [Nonapplication of security admin rules](./concept-security-admins.md#nonapplication-of-security-admin-rules). For virtual network-level nonapplication, because**Allow** rules pose no risk of conflict, you can opt to apply **Allow Only** rules by setting the security configurations' `AllowRulesOnly` field on the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` .NET class.
0 commit comments