Microsoft has announced that it will discontinue Default Outbound Access in Azure – a previously implicit internet connectivity for newly instantiated virtual machines (VMs). This change will come into effect on September 30, 2025. From this date, new VMs that are to access the internet must use explicit methods for outbound connectivity, such as: Azure NAT Gateway, Azure Load Balancer egress rules, or directly assigned Azure public IP addresses.
Customer impact
Azure customers who previously relied on Default Outbound Access must implement an alternative solution by the effective date at the latest. Existing installations remain unaffected by the change, but explicit configuration is mandatory for new VMs.
Options for outgoing data traffic
Although Microsoft offers native options, such as the Azure NAT Gateway, which enable simple implementation, organizations with more complex requirements may have additional security and functionality requirements. This is where the use of a Palo Alto Networks VM Firewall comes in handy.
Advantages of a Palo Alto Networks VM Firewall
The Palo Alto Networks VM Firewall is a powerful and flexible solution for organizations, especially those running workloads in Azure.
It offers:
- Advanced security features compared to native Azure solutions
- Easy integration into hybrid environments
- Centralized management for network security policies
Call to action
Organizations that have not yet implemented a solution for explicit outbound connectivity should act early to ensure that their infrastructure will continue to function smoothly after September 30, 2025.
Contact our specialists today to evaluate suitable alternatives and take advantage of the Palo Alto Networks VM Firewall for your Azure environment.