Generated on: December 13, 2025 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 1 items
Published: December 12, 2025 11:30:27 UTC Link: Update: The retirement date for default outbound access has been extended to March 31, 2026.
Update ID: 515484 Data source: Azure Updates API
Categories: Compute, Batch, Retirements
Summary:
What was updated
The retirement date for the default outbound access feature in Azure Virtual Network has been extended.
Key changes or new features
The original retirement date of September 30, 2025, has been postponed to March 31, 2026. This extension provides additional time for users to adapt their network configurations before default outbound access is fully retired. After the new retirement date, newly created resources will no longer have default outbound access enabled.
Target audience affected
Developers and IT professionals managing Azure Virtual Networks, especially those relying on default outbound access for outbound connectivity in their virtual machines and other resources.
Important notes if any
Organizations should use this extension period to review and update their network architecture, explicitly configuring outbound connectivity through NAT gateways, load balancers, or other means. Planning ahead will help avoid connectivity disruptions once default outbound access is retired. Stay informed on further updates as the March 2026 deadline approaches.
Details:
The Azure update extends the retirement date for default outbound access on Azure Virtual Network (VNet) resources from the original deadline of September 30, 2025, to March 31, 2026, providing customers additional time to transition to explicit outbound connectivity configurations. This extension reflects Microsoft’s commitment to enhancing network security and control while aligning with broader VNet modernization efforts.
Background and Purpose
Default outbound access is a legacy feature in Azure VNets that allows resources without assigned public IPs or load balancers to initiate outbound connections to the internet via a platform-managed NAT (Network Address Translation) IP. While convenient, this implicit outbound access model limits granular control over outbound traffic, posing security and compliance challenges. Microsoft’s initiative to retire default outbound access encourages customers to adopt explicit outbound connectivity patterns using Azure NAT Gateway, Public IPs, or Load Balancers, which provide improved scalability, reliability, and security.
Specific Features and Detailed Changes
Originally slated for retirement on September 30, 2025, the default outbound access feature’s deprecation date has been postponed to March 31, 2026. After this date, Azure will disable default outbound access for new VNets and resources, requiring explicit outbound configurations. Existing VNets will need to migrate to supported outbound mechanisms before the deadline to avoid connectivity disruptions. This update does not affect existing explicit outbound configurations.
Technical Mechanisms and Implementation Methods
Default outbound access operates by automatically assigning a platform-managed NAT IP to outbound connections from VMs or instances without public IPs or load balancers. Post-retirement, this automatic assignment will cease, and outbound traffic will require explicit NAT Gateway or public IP association. Implementation involves:
Administrators should audit existing VNets to identify resources relying on default outbound access and plan migration accordingly.
Use Cases and Application Scenarios
This update primarily impacts scenarios where VMs or PaaS resources initiate outbound internet connections without explicit public IPs or NAT configurations, such as:
Transitioning to explicit outbound access improves security posture by enabling IP whitelisting, auditing, and consistent outbound IP usage, which is critical for compliance and integration with external services requiring fixed IPs.
Important Considerations and Limitations
Integration with Related Azure Services
This update ties closely with Azure NAT Gateway, Azure Firewall, Azure Monitor, and Azure Policy:
In summary, the extension of the default outbound access retirement date to March 31, 2026, allows IT professionals additional time to plan and implement explicit outbound connectivity solutions, leveraging Azure NAT Gateway and related services to
This report was automatically generated - 2025-12-13 03:01:20 UTC