Type something to search...
End of implicit internet access for new Azure VNets

End of implicit internet access for new Azure VNets


Introduction

Starting March 31, 2026, Microsoft is making a major change to Azure’s default network behavior. New Virtual Networks (VNet) will no longer have implicit outbound internet access. All internet connectivity will now need to be explicitly configured, for example, via an Azure NAT Gateway, a firewall, or a load balancer with outbound rules. This change marks the end of a long-standing, often overlooked, but widely used Azure behavior.


How did Azure work until now ?

Historically, when a virtual machine was deployed in a VNet without a public IP address, without a NAT Gateway, and without an explicit outbound rule, Azure still provided automatic outbound internet access. This mechanism is called Default Outbound Access (DOA) :

  • Azure assigned a Microsoft-managed public IP address in the background
  • This IP address could change without notice
  • Outbound traffic was largely invisible, difficult to control, and unauditable

What exactly changes

Starting March 31, 2026 :

  • All new VNets created in Azure will be private by default
  • Subnets will have the property defaultOutboundAccess = false
  • No outbound internet access will be available without explicit configuration

In practice, a VM deployed in a new VNet will no longer have internet access by default and will need to use an explicit solution :

  • Azure NAT Gateway (recommended)
  • Azure Firewall / third-party firewall (Fortinet, Checkpoint, etc.)
  • Load balancer with egress rules
  • Public IP address (not recommended in production)

image

note

Existing VNets are not impacted and will continue to function, including for new VMs deployed in these existing VNets.

Why is Microsoft making this change ?

Microsoft justifies this decision with several strategic objectives :

Security

Implicit internet access goes against the Zero Trust principles. A resource should never have external connectivity without an explicit decision.


Governance and auditing

  • Implicit outgoing IPs :

    • Do not belong to you
    • Can change
    • Are difficult to trace
  • With a NAT Gateway or firewall :

    • IPs are static
    • Traffic is logged
    • Flows are predictable and controlled

Who is actually impacted ?

No impact for :

  • Existing VNets (created before March 31, 2026)
  • VMs already in production
  • New VMs deployed in existing VNets

Direct impact for :

  • Any new VNet created after March 31, 2026
  • Development / test environments created “on the fly”
  • Automated deployments that assume implicit internet access

Azure NAT Gateway : The preferred solution

Microsoft clearly recommends Azure NAT Gateway as the default method for restoring outbound connectivity, with key advantages including :

  • Static public IP address (or IP prefix)
  • Automatic SNAT port management
  • Built-in high availability
  • Simplified deployment (subnet association)

image

Today, this is the simplest and cleanest option to replace Default Outbound Access, especially for SMEs and environments without a central firewall.


How much does Azure NAT Gateway cost ?

Billing starts when the resource is created. Data processing charges for NAT Gateway include outbound and return data.

Azure NAT Gateway offers 2 SKUs, Standard and StandardV2. Standard provides single availability zone support, whereas StandardV2 provides zone redundancy. Both are matched in price. There is no cost difference between the two SKUs.

  • Resource hours : 0,06158$ per hour
  • Data processed : 0,06158$ per GB

Conclusion

The change introduced by Microsoft on March 31, 2026, marks a significant milestone in the evolution of Azure’s network model. By ending implicit outbound internet access for new Virtual Networks, Azure is definitively abandoning a “it just works” approach in favor of a secure, explicit, and controlled one.

While this change won’t disrupt existing environments, it does impose a new design discipline for all future deployments. From now on, all outbound connectivity must be intentionally planned, documented, and configured.

Beyond the technical constraints, this is primarily an opportunity to regain control over network traffic, improve governance, strengthen security, and finally align Azure architectures with the principles of secure by default and Zero Trust.


Sources

Microsoft - Techcommunity

Microsoft Learn - Default outbound access in Azure

Microsoft Learn - Azure NAT Gateway

Microsoft - Azure NAT Gateway pricing


Did you enjoy this post ? If you have any questions, comments or suggestions, please feel free to send me a message from the contact form.

Don’t forget to follow us and share this post.

Related Posts

How I resolved dropped Teams calls

How I resolved dropped Teams calls

Introduction A customer contacted me to tell me that he was having an issue with his Microsoft Teams telephony. Outgoing calls are being cut off even before the audio connection is establ

Read More
How to convert a public IP to Standard in Azure

How to convert a public IP to Standard in Azure

Introduction Microsoft has officially announced the retirement of Azure Basic public IP addresses, with a target date of September 30, 2025. This decision marks a significant step in the

Read More
Entra Private Access for Domain Controllers

Entra Private Access for Domain Controllers

Introduction Microsoft has announced the Public Preview of Microsoft Entra Private Access for Active Directory Domain Controllers, a major step forward in strengthening the security of

Read More
Extend Zero Trust to AI agent identities in Entra ID

Extend Zero Trust to AI agent identities in Entra ID

Introduction AI agents are becoming increasingly widespread in businesses (incident summaries, log analysis, flow execution, etc.), and it is crucial that their access is continuously evalu

Read More
External MFA is now available in Entra ID

External MFA is now available in Entra ID

Introduction Microsoft has announced the General Availability of External MFA, in Microsoft Entra ID, formerly known as External Authentication Methods. This feature allows the use

Read More