Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
Hi @ $@chin,
Private Endpoints vs VNet Rules in Azure Storage
A lot of people assume that once you add a private endpoint to a storage account, it’s fully locked down—but that’s not exactly how it works.
Yes, a private endpoint gives your storage account a private IP inside your VNet, so traffic flows over Microsoft’s backbone instead of the public internet. That part is good from a security perspective.
But here’s the catch: it doesn’t automatically disable the public endpoint.
So unless you explicitly block it, your storage account is still accessible from the public internet. Even if all your applications are using the private endpoint, the public endpoint is technically still open.
That’s why Advisor or Defender keeps flagging it. From the platform’s point of view, public access is still possible, so it raises a warning.
What you should do about it
If your goal is to fully lock it down, you have two options:
Disable public network access completely
Or restrict it using firewall / VNet rules
In most secure setups, we just disable public access altogether and rely only on private endpoints.
How to think about it (practical view)
Private endpoint → secures your private path only
Public endpoint → still exists unless you explicitly block it
So just adding a private endpoint is not equal to locking down the storage account.
Design choices (what I’ve seen work in real setups)
Private endpoint only Use this when you want strict isolation. Everything goes through private connectivity. Downside: you need proper VNet connectivity everywhere (no direct public access).
VNet rules only This is easier to set up. You’re still using the public endpoint but restricting who can reach it. Good for simpler or transitional setups, but not as secure.
Combination of both This is actually quite common.
Critical workloads → private endpoints
Specific allowed access → controlled via firewall/VNet rules
About the Defender/Advisor warning
If you’ve already completely blocked public access, you can safely ignore it (it’s just being overly cautious sometimes)
If public access is still open → then the warning is valid, and you should fix it
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.