Default outbound access for VMs in Azure will be retired—transition existing VMs to a new method of internet access

Rusydan (Dan) 161 Reputation points
2025-03-11T07:58:37.49+00:00

Hi All,

I have receive the above message from Azure Service Health, 'Default outbound access for VMs in Azure will be retired'.

All my VM is already using standard SKU and fronted by Azure Application gateway.

The service health also suggest to "utilize Azure Advisor and look for the “Add explicit outbound method to disable default outbound” recommendation in the “Operational excellence” section to show the specific virtual machine NICs using default outbound.

When I access Operational excellence in Azure Advisor, I dont see any list of my VM or workload that is exposed with default outbound access.

Question is, while my VM is already all on standard public IP address SKU (dynamic IP), is this not sufficient? or do I still need to setup a NAT gateway or a LB with outbound rules? As mention, I am already using Azure Application Gateway. Are there any other methods that I can detect which VM is the culprit because azure advisor does not provide me with anything. or can I simply disable the messahe above from service health?

Appreciate the help.

Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
9,041 questions
{count} votes

3 answers

Sort by: Most helpful
  1. Haim Alexander 0 Reputation points
    2025-03-11T09:20:07.2133333+00:00

    Hi,

    Got the same message today.

    I checked all recommendations in Azure Advisor and couldn't find anything about the "Add explicit outbound method to disable default out-bound"

    "
    In order to determine which virtual machines for your subscription are in scope, please utilize Azure Advisor and look for the “Add explicit outbound method to disable default outbound” recommendation in the “Operational excellence” section to show the specific virtual machine NICs using default outbound.
    "

    0 comments No comments

  2. Jeroen Bettens 0 Reputation points
    2025-03-11T11:16:13.23+00:00

    It seems like they've removed it from Advisor. I saw it being there yesterday, but today it's gone.


  3. Anonymous
    2025-03-17T18:44:10.7466667+00:00

    Hi Rusydan (Dan),

    The retirement of default outbound access for VMs in Azure. Since your VMs are already using Standard SKU public IP addresses, this meets the requirement for explicit outbound connectivity, provided each VM has an assigned public IP.

    However, as Azure Application Gateway handles inbound traffic, you still need to configure an explicit outbound method (e.g., NAT Gateway or Standard Load Balancer with outbound rules) if any VM relies on default outbound access.

    If Azure Advisor's "Operational Excellence" section does not show recommendations, it likely indicates no VMs are dependent on default outbound access. However, double-check your NICs and subnet configurations to confirm compliance. Service Health alerts cannot be disabled individually, but you can manage notifications via Azure Monitor.

    Please refer to the below documentation

    Default outbound access in Azure: https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/default-outbound-access

    Azure Advisor recommendations: https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-operational-excellence-recommendations

    If it was helpful, please click "Upvote" on this post to let us know.

    Thank You.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.