News Azure Security & Compliance Infrastructure

Outbound Internet Access Will Retire in September 2025: Are You Ready?

Save the date: September 30, 2025, marks a massive change to a new method of internet access in Azure, affecting all customers and regions worldwide.  

Microsoft is retiring default outbound internet access for new VMs after this date. 

Any new VM in your Azure tenant from the date forward will require an explicit outbound access method to reach the internet. 

If you haven’t started preparing, you’re already behind

Niels Kroeze

Author

Niels Kroeze IT Business Copywriter

Reading time 5 minutes Published: 21 August 2025

In this article, we’ll discuss: 

  • Why Microsoft is ending default outbound internet access and what this means for your network security 
  • How to get your environment ready before the deadline (September 30) 
  • A comparison of outbound access options (Public IPs, NAT Gateway, etc.) 

 

What is Microsoft doing now?? 

Since Azure’s early days, Microsoft has been giving newly created VMs and VMSS (Virtual Machine Scale Set) a hidden public IP address – even though you never asked for it. 

At first glance, it seems that this VM has no public IP, right? 

Screenshot of an Azure VM

However, when you go into that VM and open a web browser, you can reach the internet without issue. That access comes through a pool of source network address translation (SNAT) IP addresses, a setup that Microsoft calls default outbound internet access.  

After September 2025, Azure will no longer assign a default implicit IP for VMs to reach the internet.  

If you deploy compute resources in Azure, you'll need to be aware of this change, as it will have a huge impact. 

 

Why is Microsoft bringing this change? 

After all these years, why is Microsoft doing this now? With today’s default outbound access, Azure VMs can bypass security controls, such as content filtering, leaving egress traffic unmonitored and vulnerable to data exfiltration.  

For example: Azure Virtual Desktop hosts could access the internet directly, ignoring security policies.  

Hence, Azure is moving towards a secure-by-default model, motivated by these three reasons:  

  • Zero Trust security principles recommend against having a virtual network open to the internet by default. 
  • Connectivity should be explicit, not implicit. You should only grant access where required, which reduces network risk. 
  • Default outbound IPs will change over time. Anything dependent on them will eventually break. 

With this configuration change, the issues mentioned above will be resolved, thereby improving your network security. 

 

Will it affect existing deployments? 

The good news is that existing deployments will continue to work as long as they don’t require new VMs. Only new VMs or new subnets will need explicit connectivity. 

Microsoft has said that this change will not impact existing virtual networks and subnets.” 

In general, default outbound access was never recommended for production workloads, as it provides administrators with limited control over a VM’s internet access.  

 

Don’t forget your PaaS services 

As you know, Azure is more than just VMs on networks. There are platform services, such as storage accounts, databases, AI, and cognitive services, among others, all designed with internet-facing endpoints. With new private subnets, these services become inaccessible from your VMs.

Private endpoints solve this by connecting your VMs directly to Azure services over Microsoft's private backbone, eliminating the need for the public internet. 

 

How do you prepare for this change? 

Fortunately, you don’t have to rebuild internet access from scratch for your existing Azure VMs. However, you’ll need to: 

  • Redesign and update your current network policies and procedures for new deployments. 
  • Create a plan for existing deployments.  

 

What to do if you still need internet access? 

If your setup requires explicit outbound connectivity, you’ll need to choose how your newly deployed VMs access the internet. You can choose from a range of options: 

Available Azure Access Options 

Options after September 2025 for configuring explicit outbound connectivity include: 

  • Public IPs for VMs: Don’t scale as networks grow. Additionally, it will expose your VM to inbound threats from the internet, as it’s directly accessible to the world. Only Network Security Groups (NSGs) can protect it. 
  • Load balancers with outbound rules: Suitable for multiple VMs that do the same job. It's a significantly lower cost than a firewall, but the downside here is that it doesn't scale well and requires additional configuration and overhead. 
  • NAT Gateway: Optimal outbound connectivity solution gives you a static IP address for all outbound connectivity to the internet, and can have loads of VMs behind it. 
  • Firewalls: If you need secure (inbound and outbound) access from the internet, security filtering, TLS inspection, a firewall is a great option. The downsides are its higher cost and the way it manages your outbound ports (limited to 2,496 SNAT ports for every public IP address that's attached to your firewall, with a limit of up to 250 IPs.) 

As you can see, each option has different features and cost trade-offs. Often, an Azure firewall and the Azure NAT gateway are the best options. Which one is actually best depends.  

A NAT Gateway is often the simplest and most cost-effective choice, as it provides a static outbound IP for multiple VMs on a subnet. It offers a simpler outbound internet access option that is similar to today’s default outbound access. 

You can also combine a firewall and a NAT gateway for even greater scalability. 

Note:

If you have multiple VNETs that aren't peered, and you don't route traffic to a firewall, you will actually need a gateway per VNET. That's a current limitation on the gateway side. Also, note that Azure NAT Gateways don’t inspect egress traffic, leaving your outbound traffic vulnerable to data exfiltration. 

Closing thoughts 

The key takeaways are: 

  • Start now or never; the deadline is approaching, so be ready before the retirement goes live. 
  • Existing VMs won’t be affected, but new deployments require explicit configuration. 
  • Evaluate security and cost when selecting your outbound access method. 

The change to Azure VM internet access reflects Microsoft's ongoing effort to enhance security, now adopting a secure-by-default model. It provides the perfect opportunity to strengthen your Azure environment.

You can now redesign for stronger network security if you haven’t already.

Ensure you review the available Azure options and select the best fit for your organisation. 

Marc Bosgoed

Are you prepared for this change?

Feel free to schedule a call with our Azure experts to assess your specific needs or ask any questions regarding this update!