You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/back-up-azure-stack-hyperconverged-infrastructure-virtual-machines.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,8 @@ These are the prerequisites for backing up virtual machines with MABS:
91
91
```
92
92
Install DPMAgentInstaller.exe`
93
93
```
94
-
94
+
>[!Note]
95
+
>Default Application Control settings may prevent agent deployment, [switch application control to "Audit" mode](/azure/azure-local/manage/manage-wdac#switch-application-control-policy-modes) before agent installation to work around this issue. After deployment is complete, it is highly recommended to switch the application control back to "Enforced" mode.
95
96
2. After the installation is complete, run the following command to configure the agent on the node:
Copy file name to clipboardExpand all lines: articles/storage/blobs/access-tiers-overview.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,8 +127,6 @@ Keep in mind the following points when changing a blob's tier:
127
127
128
128
- If a blob is explicitly moved to the cool or cold tier and then moved to the archive tier, the early deletion charge applies.
129
129
130
-
- If a blob is explicitly moved to the cool or cold tier and then moved to the archive tier, the early deletion charge applies.
131
-
132
130
## Blob lifecycle management
133
131
134
132
Blob storage lifecycle management offers a rule-based policy that you can use to transition your data to the desired access tier when your specified conditions are met. You can also use lifecycle management to expire data at the end of its life. See [Optimize costs by automating Azure Blob Storage access tiers](./lifecycle-management-overview.md) to learn more.
Copy file name to clipboardExpand all lines: articles/virtual-network/ip-services/default-outbound-access.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.date: 09/01/2025
13
13
14
14
# Default outbound access in Azure
15
15
16
-
In Azure, when a virtual machine (VM) is deployed in a virtual network without an explicitly defined outbound connectivity method, it's automatically assigned an outbound public IP address. This IP address enables outbound connectivity from the resources to the Internet and to other public endpoints within Microsoft. This access is referred to as default outbound access.
16
+
In Azure, when a virtual machine (VM) is deployed in a virtual network without an explicitly defined outbound connectivity method, it's automatically assigned an outbound public IP address. This IP address enables outbound connectivity from the resources to the internet and to other public endpoints within Microsoft. This access is referred to as default outbound access.
17
17
18
18
Examples of explicit outbound connectivity for virtual machines are:
19
19
@@ -34,11 +34,11 @@ If a Virtual Machine (VM) is deployed without an explicit outbound connectivity
34
34
> In some cases, a default outbound IP is still assigned to virtual machines in a nonprivate subnet, even when an explicit outbound method—such as a NAT Gateway or a UDR directing traffic to an NVA/firewall—is configured. This doesn't mean the default outbound IPs are used for egress unless those explicit methods are removed. To completely remove the default outbound IPs, the subnet must be made private, and the virtual machines must be stopped and deallocated.
35
35
36
36
> [!IMPORTANT]
37
-
> After March 31, 2026, new virtual networks will default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the Internet and within Microsoft. For more information, see the [official announcement](https://azure.microsoft.com/updates/default-outbound-access-for-vms-in-azure-will-be-retired-transition-to-a-new-method-of-internet-access/). We recommend that you use one of the explicit forms of connectivity discussed in the following section. For other questions, see the "FAQs: Default Behavior Change to Private Subnets" section.
37
+
> After March 31, 2026, new virtual networks will default to using private subnets, meaning that an explicit outbound method must be enabled in order to reach public endpoints on the internet and within Microsoft. For more information, see the [official announcement](https://azure.microsoft.com/updates/default-outbound-access-for-vms-in-azure-will-be-retired-transition-to-a-new-method-of-internet-access/). We recommend that you use one of the explicit forms of connectivity discussed in the following section. For other questions, see the "FAQs: Default Behavior Change to Private Subnets" section.
38
38
39
39
## Why is disabling default outbound access recommended?
40
40
41
-
**Security**: Default Internet access contradicts Zero Trust principles.<br>
41
+
**Security**: Default internet access contradicts Zero Trust principles.<br>
42
42
**Clarity**: Explicit connectivity is preferred over implicit access.<br>
43
43
**Stability**: The default outbound IP isn't customer-owned and can change, leading to potential disruptions.
44
44
@@ -58,9 +58,9 @@ Additionally,
58
58
### Private subnets overview
59
59
60
60
* Creating a subnet to be Private prevents any virtual machines on the subnet from utilizing default outbound access to connect to public endpoints.
61
-
* VMs on a Private subnet can still access the Internet (or any public endpoints within Microsoft) using explicit outbound connectivity.
61
+
* VMs on a Private subnet can still access the internet (or any public endpoints within Microsoft) using explicit outbound connectivity.
62
62
> [!NOTE]
63
-
> Certain services don't function on a virtual machine in a Private Subnet without an explicit method of egress (examples are Windows Activation and Windows Updates).
63
+
> Certain services don't function on a virtual machine in a private subnet without an explicit method of egress (examples are Windows Activation and Windows Updates).
* A default route for the destination 0.0.0.0/0, with a next hop type of Virtual Appliance applies in the general case.
158
158
159
-
* One or more routes are configured to [Service Tag destinations](../virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) with next hop type `Internet`, to bypass the NVA/firewall. Unless an explicit outbound connectivity method is also configured for the source of the connection to these destinations, attempts to connection to these destinations fail, because default outbound access isn't available.
159
+
* One or more routes are configured to [Service Tag destinations](../virtual-networks-udr-overview.md#service-tags-for-user-defined-routes) with next hop type `Internet`, to bypass the NVA/firewall. Unless an explicit outbound connectivity method is also configured for the source of the connection to these destinations, attempts to connect to these destinations fail, because default outbound access isn't available.
160
160
161
161
* This limitation doesn't apply to the use of Service Endpoints, which use a different next hop type `VirtualNetworkServiceEndpoint`. See [Virtual Network service endpoints](../virtual-network-service-endpoints-overview.md).
162
162
163
163
* Virtual machines are still able to access Azure Storage accounts in the same region in a private subnet without an explicit method of outbound. NSGs are recommended to control egress connectivity.
164
164
165
-
* Private Subnets aren't applicable to delegated or managed subnets used for hosting PaaS services. In these scenarios, outbound connectivity is managed by the individual service.
165
+
* Private subnets aren't applicable to delegated or managed subnets used for hosting PaaS services. In these scenarios, outbound connectivity is managed by the individual service.
166
166
167
167
> [!IMPORTANT]
168
168
> When a load balancer backend pool is configured by IP address, it uses default outbound access due to an ongoing known issue. For secure by default configuration and applications with demanding outbound needs, associate a NAT gateway to the VMs in your load balancer's backend pool to secure traffic. See more on existing [known issues](../../load-balancer/whats-new.md#known-issues).
@@ -196,7 +196,7 @@ In some cases, a default outbound IP is still assigned to virtual machines in a
196
196
197
197
### FAQs: Default Behavior Change to Private Subnets
198
198
199
-
#### What does making Private Subnets default mean, and how will it be implemented?
199
+
#### What does making private subnets default mean, and how will it be implemented?
200
200
With the API version released after March 31, 2026, the defaultOutboundAccess property for subnets in new VNETs will be set to "false" by default. This change makes subnets private by default and prevents generation of default outbound IPs for virtual machines in those subnets.
201
201
This behavior applies across all configuration methods--ARM templates, Azure portal, PowerShell, and CLI. Earlier versions of ARM templates (or tools like Terraform that can specify older versions) will continue to set defaultOutboundAccess as null, which implicitly allows outbound access.
0 commit comments