🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-700 Domain 4
Domain 4 — Module 1 of 3 33%
19 of 26 overall

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)
Domain 4: Private Access to Azure Services Premium ⏱ ~13 min read

Private Link and Private Endpoints

Secure access to Azure PaaS services through private endpoints — how they work, planning considerations, configuring access, and Private Link service for custom services.

Private Link and Private Endpoints

By default, Azure PaaS services (SQL Database, Storage, Key Vault) are accessed over the internet using public endpoints. Private endpoints bring those services into your VNet with a private IP address — traffic never leaves Microsoft’s network.

🎬 Video coming soon

Private Link and Private Endpoints

Private Link and Private Endpoints

~13:00
☕ Simple explanation

Private Link brings Azure services inside your VNet — instead of connecting to Azure SQL over the internet, you connect over a private IP in your own network. Azure builds a private tunnel directly into your building. You never leave your network.

Azure Private Link enables access to Azure PaaS services over a private endpoint — a NIC with a private IP from your VNet. Benefits: no public internet exposure, data exfiltration protection (maps to specific resource), cross-region support, works with on-premises via ExpressRoute/VPN.

How Private Endpoints Work

🔒 Aisha’s scenario: Sentinel Banking’s compliance team says Azure SQL Database must not be accessible from the internet — only from within the corporate VNet.

Aisha creates a private endpoint for her SQL Database:

  1. A network interface (NIC) is created in her subnet with a private IP (e.g., 10.20.5.4)
  2. This NIC is mapped to a specific resource (her SQL Database instance)
  3. When applications connect to sentinel-db.database.windows.net, DNS resolves to 10.20.5.4 instead of the public IP
  4. Traffic stays on Microsoft’s backbone — never touches the internet

What a private endpoint creates:

  • A NIC with a private IP in your chosen subnet
  • A network-level mapping to a specific Azure resource (or sub-resource type like blob, file, queue, or table for Storage)
  • The private endpoint NIC gets a private IP — the PaaS resource itself does not move into your VNet

Planning Considerations

FactorDetail
Subnet sharingPrivate endpoints can share a subnet with other resources (VMs, other PEs). No dedicated subnet required.
NSG supportNSG rules now apply to private endpoint traffic (this was not always the case — exam may reference it).
One resource per PEEach private endpoint maps to one specific resource or sub-resource.
Cross-regionYou can create a PE in a different region than the target resource.
Cross-subscriptionPE can be in a different subscription than the target resource (with approval).
ApprovalAuto-approved if you own the resource. Manual approval required if created by a different tenant.
DNSCritical — without proper DNS, the FQDN resolves to the public IP, bypassing the PE.

Exam Tip: Private endpoints now support NSG rules — you can control traffic to private endpoints with network security groups. This is a feature that was added later and the exam tests that you know it’s supported.

Configuring Access

After creating a private endpoint, you should also restrict the public endpoint:

ConfigurationEffect
Disable public accessOnly private endpoint connections are accepted. No internet access at all.
Restrict public accessAllow only specific IPs or VNets via service firewall, plus private endpoints.
Keep bothPublic and private endpoints both work. Not recommended for sensitive resources.

🔒 Aisha’s approach: She creates the private endpoint for SQL Database, verifies connectivity from her VNet works, then disables public access on the SQL Server. Now the database is only reachable through the private endpoint.

Private Link Service

Private Link service is the provider side — it lets you expose your own service (behind a Standard Load Balancer) to other subscriptions or tenants through Private Link.

How it works:

  1. Provider (you) deploys a service behind a Standard Internal Load Balancer
  2. Provider creates a Private Link service resource linked to the LB
  3. Consumer (another team, subscription, or tenant) creates a private endpoint pointing to your Private Link service
  4. Traffic flows: Consumer’s VNet → Private Endpoint → Microsoft backbone → Private Link service → Your Load Balancer → Your backend

Use cases:

  • SaaS providers offering services to customers’ VNets
  • Internal shared services exposed to other business units’ subscriptions
  • Partner integrations without public internet exposure

🏢 Ravi’s scenario: Pinnacle Financial’s shared services team runs an internal API behind a Standard Internal Load Balancer. They create a Private Link service so the Finance and HR teams (in different subscriptions) can create private endpoints to access the API without any public internet exposure.

ℹ️ Private Endpoint vs Private Link Service

These are two sides of the same coin:

AspectPrivate EndpointPrivate Link Service
Who creates itThe consumer (accessing the service)The provider (exposing the service)
What it doesCreates a private IP to reach a serviceExposes a service for PE consumption
Works withAzure PaaS services AND custom Private Link servicesYour own services behind Standard Internal LB
DirectionConsumer creates PE to access providerProvider creates PLS to be accessed

For Azure PaaS (SQL, Storage, Key Vault), you only need a private endpoint — Microsoft has already created the Private Link service on their side.

For your own custom services, you create both: the Private Link service (provider side) and consumers create private endpoints (consumer side).

Private Endpoint vs Service Endpoint
FeaturePrivate EndpointService Endpoint
IP typePrivate IP in your VNet (NIC created in subnet)Service keeps its public IP (optimised route)
DNS changesRequired — must configure private DNS zone for resolutionNone — same FQDN resolves to same public IP
On-premises accessYes — reachable over VPN or ExpressRoute with DNSNo — only works from within VNet subnets
CostPer-hour charge plus per-GB data processedFree
Data exfiltration protectionStrong — PE maps to a specific resource instanceLimited — service endpoint policies for Azure Storage only
Cross-region supportYes — PE can be in a different region than the serviceNo — same region as the VNet only
Setup complexityMedium — PE resource, DNS zone, VNet linksSimple — enable on subnet, add VNet rule on service firewall

Key Takeaways

  • Private endpoints bring Azure services into your VNet with a private IP
  • NSG rules are supported on private endpoints
  • Always configure DNS correctly — without it, the PE is bypassed
  • Disable public access after verifying PE connectivity
  • Private Link service lets you expose your own services for PE consumption

Test Your Knowledge

Question

What does a private endpoint create in your VNet?

Click or press Enter to reveal answer

Answer

A network interface (NIC) with a private IP address in your chosen subnet, mapped to a specific Azure resource. Applications connect to the resource's FQDN, which DNS resolves to this private IP.

Click to flip back

Question

Can you apply NSG rules to private endpoint traffic?

Click or press Enter to reveal answer

Answer

Yes. NSG rules now apply to private endpoint traffic. This feature was added to Azure and is a common exam topic.

Click to flip back

Question

What is a Private Link service?

Click or press Enter to reveal answer

Answer

The provider-side resource that exposes your own service (behind a Standard Internal Load Balancer) for consumption via private endpoints. Consumers in other subscriptions or tenants create PEs to reach your service privately.

Click to flip back


Knowledge Check

Aisha creates a private endpoint for Azure SQL Database but doesn't configure DNS. What happens when she connects to sentinel-db.database.windows.net?

Knowledge Check

Ravi wants to expose his internal API (behind a Standard Internal LB) to other subscriptions via Private Link. What does he need to create?


Next up: Private Endpoint DNS — The critical DNS configuration that makes private endpoints actually work.

← Previous

Choosing the Right Load Balancer

Next →

Private Endpoint DNS

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.