πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-700 Domain 4
Domain 4 β€” Module 3 of 3 100%
21 of 26 overall

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)
Domain 4: Private Access to Azure Services Premium ⏱ ~10 min read

Service Endpoints: When and How

Compare service endpoints with private endpoints, configure service endpoint policies, and know when to choose each approach for securing Azure PaaS access.

Service Endpoints: When and How

Service endpoints provide a simpler, free way to secure traffic between your VNet and Azure PaaS services. They don’t give you a private IP β€” instead, they optimise the route and enable service firewalls to restrict access to your VNet only.

🎬 Video coming soon

Service Endpoints vs Private Endpoints

Service Endpoints vs Private Endpoints

~10:00
β˜• Simple explanation

Service endpoints create a shortcut from your VNet to Azure services β€” traffic takes the fast lane (Microsoft backbone) instead of the internet. The service keeps its public IP but recognises traffic from your VNet. Simpler than Private Link but less secure.

VNet service endpoints extend your VNet’s identity to Azure services via an optimised route over the Azure backbone. The service uses its public IP but recognises traffic as coming from your VNet. You configure the service’s firewall to allow only VNet traffic.

Service Endpoints vs Private Endpoints

Service Endpoints vs Private Endpoints
FeatureService EndpointsPrivate Endpoints
IP address usedPublic IP of the service (optimised route)Private IP in your VNet
DNS changes neededNo β€” same FQDN, same public IPYes β€” must configure private DNS zone
On-premises accessNo β€” only from VNet subnetsYes β€” via VPN/ER with proper DNS
Cross-regionNo β€” same region as VNetYes β€” PE can be in different region
CostFreePer-hour + per-GB processed
Setup complexitySimple β€” enable on subnet + configure service firewallMedium β€” PE, DNS zone, DNS links
Service firewallRestrict to specific VNet/subnetCan disable public access entirely
NSG filteringService tag-based onlyFull NSG support on PE traffic
Data exfiltration protectionLimited (service endpoint policies for Storage)Better β€” PE maps to specific resource
Supported servicesStorage, SQL, Key Vault, Cosmos DB, Service Bus, Event Hubs, etc.Broader β€” almost all Azure PaaS services
πŸ’‘ When to Choose Service Endpoints vs Private Endpoints

Use this decision shortcut for the exam:

Choose Service Endpoints when:

  • All access is from Azure VNets only (no on-premises)
  • Cost sensitivity is high (service endpoints are free)
  • You need a quick, simple setup with minimal DNS changes
  • The service supports service endpoints (Storage, SQL, Key Vault, etc.)

Choose Private Endpoints when:

  • On-premises servers need to reach the Azure service
  • You need zero-trust: no public IP exposure at all
  • Data exfiltration protection per-resource is required
  • Cross-region or cross-tenant access is needed

Exam shortcut: If the question mentions on-premises access or β€œno public IP,” the answer is always private endpoint. If it mentions β€œfree” or β€œsimple Azure-only,” it is likely service endpoint.

Exam Tip β€” When to Choose Which:

  • Private endpoints when: you need on-premises access, cross-region access, full private IP, or compliance requires no public IP exposure.
  • Service endpoints when: you want a simple, free solution for VNet-to-PaaS traffic without on-premises access needs, and the service supports it.

Private endpoints are the strategic direction. Service endpoints are a valid, simpler option for less demanding scenarios.

Creating Service Endpoints

Step 1: Enable on the subnet Select which services to enable (e.g., Microsoft.Sql, Microsoft.Storage, Microsoft.KeyVault). This adds an optimised route for traffic to that service β€” traffic goes over Microsoft’s backbone instead of the internet.

Step 2: Configure the service firewall On the Azure service (e.g., Storage Account), add a virtual network rule allowing traffic from the specific VNet/subnet. Optionally deny all other traffic.

πŸͺ Sam’s scenario: Harbour Retail has a Storage Account used by VMs in the workload subnet. Sam:

  1. Enables the Microsoft.Storage service endpoint on the workload subnet
  2. On the Storage Account, adds a virtual network rule for that subnet
  3. Sets the default action to β€œDeny” β€” only the workload subnet can access the storage

Now VMs in the subnet reach Storage over the backbone, and all other access (internet, other VNets) is blocked.

Service Endpoint Policies

Service endpoint policies restrict which specific resources a subnet can access through service endpoints. Without policies, a service endpoint to Microsoft.Storage allows access to all storage accounts β€” including ones in other subscriptions.

Data exfiltration scenario: An attacker compromises a VM and uses the service endpoint to copy data to their own storage account (which is also an Azure Storage account). Service endpoint policies prevent this by restricting access to named accounts only.

Current limitations:

  • Only supported for Azure Storage
  • You specify allowed resource IDs (storage account resource IDs)
  • Traffic to unlisted resources is denied through the service endpoint

Example policy: β€œVMs in subnet-workload can only access storageaccount1 and storageaccount2 via the Microsoft.Storage service endpoint. Traffic to any other storage account is denied.”

Exam Tip: Service endpoint policies are limited to Azure Storage. If the exam asks about restricting which specific resources a subnet can access via service endpoints, and the service isn’t Storage, the answer is β€œnot supported β€” use private endpoints instead.”

Key Takeaways

  • Service endpoints provide optimised routing and service firewall integration β€” no private IP
  • They’re free and simple but don’t support on-premises access
  • Private endpoints give you a private IP, DNS-based resolution, and on-premises access
  • Service endpoint policies prevent data exfiltration but only for Azure Storage
  • Private endpoints are the strategic direction; service endpoints are valid for simple scenarios

Test Your Knowledge

Question

What is the main difference between service endpoints and private endpoints?

Click or press Enter to reveal answer

Answer

Service endpoints: traffic uses the public IP of the service via an optimised route. Free, simple, no on-prem access. Private endpoints: traffic uses a private IP in your VNet via DNS. Paid, more setup, supports on-prem access.

Click to flip back

Question

What do service endpoint policies do?

Click or press Enter to reveal answer

Answer

They restrict which specific Azure resources (by resource ID) a subnet can access through a service endpoint. This prevents data exfiltration to unauthorized resources. Currently only supported for Azure Storage.

Click to flip back

Question

Can on-premises servers access Azure services through service endpoints?

Click or press Enter to reveal answer

Answer

No. Service endpoints only work from within the VNet subnet where they're enabled. On-premises access requires private endpoints with proper DNS and VPN/ExpressRoute connectivity.

Click to flip back


Knowledge Check

Sam wants to secure his Storage Account so only VMs in a specific subnet can access it, but he doesn't need on-premises access and wants a free solution. What should he use?

Knowledge Check

Aisha needs on-premises servers to access Azure SQL Database privately. Should she use a service endpoint or private endpoint?


Next up: NSGs and Application Security Groups β€” Start Domain 5 with the fundamental building blocks of Azure network security.

← Previous

Private Endpoint DNS

Next β†’

NSGs and Application Security Groups

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.