
Solutions Architect, YouTuber, Team Lead
The newsroom reviewed a YouTube video by Sean Astrakhan (Untethered 365) titled "VNet for Dataverse - How to not get your data stolen | Super understandable Explanation." The video lays out risks and fixes when Dataverse integrations communicate with external services, using clear language and a practical sequence of examples. Along the way, Sean uses a simple mall analogy and step‑by‑step Azure setup notes to make the ideas tangible for both architects and IT teams. Consequently, the video serves as both an intro and a pragmatic guide to securing traffic from Power Platform components.
Sean timestamps the video so viewers can jump to topics such as data risk, Azure setup, a mall analogy, Power Automate, malicious plug‑ins, data theft scenarios, the VNet solution, secure tunnels, connector limits, and an email exception. Therefore, the structure helps teams assess which sections apply to their environment and where they should focus first. Importantly, the piece aims to reduce common mistakes like sharing API keys or trying to whitelist dynamic service IPs. Overall, the video emphasizes a network‑first approach to protecting business data handled by Microsoft services.
Sean explains that the core idea is to route outbound calls from Dataverse and related services through a delegated Azure subnet so traffic never traverses the public internet. In practice, you delegate a subnet to Power Platform and then link the environment so plug‑ins and connectors use that internal path to reach resources like Azure SQL, Storage, and Key Vault. As a result, resources can be protected behind private endpoints and governed by your network controls rather than being exposed to broad firewall rules or IP whitelists.
He clarifies that this setup leverages existing Azure controls such as Network Security Groups and Private Links, so administrators can apply corporate policies consistently. Thus, the deployment converts what used to be ephemeral, public access into an auditable, internal connection. However, the video also notes that some orchestration—such as handling OAuth token refreshes in specific scenarios—may still require custom handling when endpoints sit behind private access methods.
Despite strong benefits for security, Sean points out tradeoffs that teams must weigh before adopting this pattern. For example, while VNet integration eliminates the need to maintain brittle IP whitelists, it increases configuration complexity, requires coordination with networking teams, and can raise costs for private endpoints and NAT or firewall appliances. Furthermore, tight network controls can complicate troubleshooting because telemetry that once passed through public routes must now be observed inside the private network.
Moreover, the solution currently favors Azure targets and may not fully cover third‑party or on‑prem appliances without additional bridging technologies. In addition, some connectors have limits or behavior changes when routed through the delegated subnet, and services such as automated email connectors may present exceptions that require alternate designs. Therefore, organizations should balance security gains against added operational effort and potential impacts on developer productivity.
In practical terms, Sean walks through creating and delegating a subnet, associating it with a Power Platform environment, and configuring private endpoints for your target services. He recommends testing each connector and plug‑in in a staging environment so you can find token or network rule issues early rather than after rollout. Consequently, phased rollout and strong change management are key best practices highlighted in the video.
He also warns about common pitfalls: assigning wrong NSG rules that block needed outbound calls, forgetting to provision DNS for private endpoints, and misunderstanding which connectors support in‑VNet routing. Because of these traps, the video encourages collaboration between cloud networking, security, and application teams to map expected traffic flows and to build monitoring that captures both network and application telemetry. By doing so, teams reduce surprises during production cutover.
Ultimately, the video argues that routing Power Platform traffic through a controlled VNet materially reduces the attack surface and the risk of data exfiltration from workflows or plug‑ins. Consequently, organizations with compliance or high‑sensitivity data will likely find the additional expense and complexity justified by improved security posture. At the same time, less regulated teams may prefer simpler mitigations while planning for eventual hardening.
For news readers considering action, Sean’s practical advice is to start with a clear inventory of connectors and plug‑ins, map their destinations, and pilot a delegated subnet for a small environment. Then, expand in phases while tracking operational costs and any connector limitations encountered. By following that measured path, teams can secure their data without disrupting essential automations or overburdening support staff.
Azure VNet Dataverse, Dataverse VNet integration, Secure Dataverse networking, Dataverse private endpoint, Prevent Dataverse data theft, Dataverse network isolation, Azure private link Dataverse, Power Platform VNet security