Skip to content

Commit f0a2aae

Browse files
authored
Merge pull request #306824 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 748e35b + c7467af commit f0a2aae

3 files changed

Lines changed: 10 additions & 11 deletions

File tree

articles/backup/back-up-azure-stack-hyperconverged-infrastructure-virtual-machines.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,8 @@ These are the prerequisites for backing up virtual machines with MABS:
9191
```
9292
Install DPMAgentInstaller.exe`
9393
```
94-
94+
>[!Note]
95+
>Default Application Control settings may prevent agent deployment, [switch application control to "Audit" mode](/azure/azure-local/manage/manage-wdac#switch-application-control-policy-modes) before agent installation to work around this issue. After deployment is complete, it is highly recommended to switch the application control back to "Enforced" mode.
9596
2. After the installation is complete, run the following command to configure the agent on the node:
9697
9798
```

articles/storage/blobs/access-tiers-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,8 +127,6 @@ Keep in mind the following points when changing a blob's tier:
127127

128128
- If a blob is explicitly moved to the cool or cold tier and then moved to the archive tier, the early deletion charge applies.
129129

130-
- If a blob is explicitly moved to the cool or cold tier and then moved to the archive tier, the early deletion charge applies.
131-
132130
## Blob lifecycle management
133131

134132
Blob storage lifecycle management offers a rule-based policy that you can use to transition your data to the desired access tier when your specified conditions are met. You can also use lifecycle management to expire data at the end of its life. See [Optimize costs by automating Azure Blob Storage access tiers](./lifecycle-management-overview.md) to learn more.

articles/virtual-network/ip-services/default-outbound-access.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 09/01/2025
1313

1414
# Default outbound access in Azure
1515

16-
In Azure, when a virtual machine (VM) is deployed in a virtual network without an explicitly defined outbound connectivity method, it's automatically assigned an outbound public IP address. This IP address enables outbound connectivity from the resources to the Internet and to other public endpoints within Microsoft. This access is referred to as default outbound access.
16+
In Azure, when a virtual machine (VM) is deployed in a virtual network without an explicitly defined outbound connectivity method, it's automatically assigned an outbound public IP address. This IP address enables outbound connectivity from the resources to the internet and to other public endpoints within Microsoft. This access is referred to as default outbound access.
1717

1818
Examples of explicit outbound connectivity for virtual machines are:
1919

@@ -34,11 +34,11 @@ If a Virtual Machine (VM) is deployed without an explicit outbound connectivity
3434
> In some cases, a default outbound IP is still assigned to virtual machines in a nonprivate subnet, even when an explicit outbound method—such as a NAT Gateway or a UDR directing traffic to an NVA/firewall—is configured. This doesn't mean the default outbound IPs are used for egress unless those explicit methods are removed. To completely remove the default outbound IPs, the subnet must be made private, and the virtual machines must be stopped and deallocated.
3535
3636
> [!IMPORTANT]
37-
> After March 31, 2026, new virtual networks will default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the Internet and within Microsoft. For more information, see the [official announcement](https://azure.microsoft.com/updates/default-outbound-access-for-vms-in-azure-will-be-retired-transition-to-a-new-method-of-internet-access/). We recommend that you use one of the explicit forms of connectivity discussed in the following section. For other questions, see the "FAQs: Default Behavior Change to Private Subnets" section.
37+
> After March 31, 2026, new virtual networks will default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the internet and within Microsoft. For more information, see the [official announcement](https://azure.microsoft.com/updates/default-outbound-access-for-vms-in-azure-will-be-retired-transition-to-a-new-method-of-internet-access/). We recommend that you use one of the explicit forms of connectivity discussed in the following section. For other questions, see the "FAQs: Default Behavior Change to Private Subnets" section.
3838
3939
## Why is disabling default outbound access recommended?
4040

41-
**Security**: Default Internet access contradicts Zero Trust principles.<br>
41+
**Security**: Default internet access contradicts Zero Trust principles.<br>
4242
**Clarity**: Explicit connectivity is preferred over implicit access.<br>
4343
**Stability**: The default outbound IP isn't customer-owned and can change, leading to potential disruptions.
4444

@@ -58,9 +58,9 @@ Additionally,
5858
### Private subnets overview
5959

6060
* Creating a subnet to be Private prevents any virtual machines on the subnet from utilizing default outbound access to connect to public endpoints.
61-
* VMs on a Private subnet can still access the Internet (or any public endpoints within Microsoft) using explicit outbound connectivity.
61+
* VMs on a Private subnet can still access the internet (or any public endpoints within Microsoft) using explicit outbound connectivity.
6262
> [!NOTE]
63-
> Certain services don't function on a virtual machine in a Private Subnet without an explicit method of egress (examples are Windows Activation and Windows Updates).
63+
> Certain services don't function on a virtual machine in a private subnet without an explicit method of egress (examples are Windows Activation and Windows Updates).
6464
6565
### How to configure private subnets
6666

@@ -156,13 +156,13 @@ az network vnet subnet update --resource-group rgname --name subnetname --vnet-n
156156

157157
* A default route for the destination 0.0.0.0/0, with a next hop type of Virtual Appliance applies in the general case.
158158

159-
* One or more routes are configured to [Service Tag destinations](../virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) with next hop type `Internet`, to bypass the NVA/firewall. Unless an explicit outbound connectivity method is also configured for the source of the connection to these destinations, attempts to connection to these destinations fail, because default outbound access isn't available.
159+
* One or more routes are configured to [Service Tag destinations](../virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) with next hop type `Internet`, to bypass the NVA/firewall. Unless an explicit outbound connectivity method is also configured for the source of the connection to these destinations, attempts to connect to these destinations fail, because default outbound access isn't available.
160160

161161
* This limitation doesn't apply to the use of Service Endpoints, which use a different next hop type `VirtualNetworkServiceEndpoint`. See [Virtual Network service endpoints](../virtual-network-service-endpoints-overview.md).
162162

163163
* Virtual machines are still able to access Azure Storage accounts in the same region in a private subnet without an explicit method of outbound. NSGs are recommended to control egress connectivity.
164164

165-
* Private Subnets aren't applicable to delegated or managed subnets used for hosting PaaS services. In these scenarios, outbound connectivity is managed by the individual service.
165+
* Private subnets aren't applicable to delegated or managed subnets used for hosting PaaS services. In these scenarios, outbound connectivity is managed by the individual service.
166166

167167
> [!IMPORTANT]
168168
> When a load balancer backend pool is configured by IP address, it uses default outbound access due to an ongoing known issue. For secure by default configuration and applications with demanding outbound needs, associate a NAT gateway to the VMs in your load balancer's backend pool to secure traffic. See more on existing [known issues](../../load-balancer/whats-new.md#known-issues).
@@ -196,7 +196,7 @@ In some cases, a default outbound IP is still assigned to virtual machines in a
196196

197197
### FAQs: Default Behavior Change to Private Subnets
198198

199-
#### What does making Private Subnets default mean, and how will it be implemented?
199+
#### What does making private subnets default mean, and how will it be implemented?
200200
With the API version released after March 31, 2026, the defaultOutboundAccess property for subnets in new VNETs will be set to "false" by default. This change makes subnets private by default and prevents generation of default outbound IPs for virtual machines in those subnets.
201201
This behavior applies across all configuration methods--ARM templates, Azure portal, PowerShell, and CLI. Earlier versions of ARM templates (or tools like Terraform that can specify older versions) will continue to set defaultOutboundAccess as null, which implicitly allows outbound access.
202202

0 commit comments

Comments
 (0)