Blog Post from Cloud Trooper: Azure Firewall and Service Endpoints

Azure Firewall serves as a critical tool for inspecting traffic to Azure services, even when using VNet Service Endpoints. As detailed in [this blog series](/2025/02/17/private-link-reality-bites-service-endpoints-vs-private-link), Private Link is usually Microsoft’s recommended approach, yet many enterprises still opt for Service Endpoints due to their own operational preferences. Inspecting these endpoints via Azure Firewall, however, comes with its own set of complexities and potential costs related to high-bandwidth and increased latency.

The post provides a comprehensive guide on configuring Service Endpoints for inspection using Azure Firewall by setting up the source as the Azure Firewall subnet. This ensures traffic is funneled through the firewall prior to reaching the Azure service. The guide also covers leveraging both Network and Application Rules, highlighting the benefits of Application Rules for preventing data exfiltration to unintended destinations.

Whether to use VNet Service Endpoints or Private Link can depend on various factors like cost. If opting for Service Endpoints, the post offers step-by-step guidance on configuring Azure Firewall for inspecting VNet traffic. This setup allows monitoring and security auditing, with practical tips and illustrations to optimize its implementation.

News: Azure Firewall and Service Endpoints
Documentation: VNet Service Endpoints Overview


Hi, I’m Oskar!

Cloud architect by day, tech tinkerer by night, and a proud father all the time. Born in 1990 in Poland and now based in Germany, I spend my days diving deep into cloud, Azure, and all things technology. But my passions go beyond the digital world – I love DIY projects, home automation, biking, gardening, and cooking (because good food fuels great ideas).

This little blog is where I share my insights, experiments, and thoughts on cloud tech – because let’s be honest, the internet can always use one more tech enthusiast’s perspective.