What Azure Arc Actually Does

Azure Arc is a management bridge. It extends Azure Resource Manager — Microsoft's unified control plane — to infrastructure that lives outside Azure: on-premises physical servers, VMware vSphere VMs, Hyper-V clusters, Kubernetes environments across any cloud, and edge compute nodes. Once a resource is Arc-enabled, it becomes a first-class Azure citizen. You can apply Azure Policy, use Microsoft Defender for Cloud, run Azure Monitor, deploy extensions, and manage identities through Entra ID, regardless of where the workload physically runs.

In one engagement, a global energy firm deploying Azure Arc across 3,200 on-premises servers faced Microsoft's list pricing for Azure Arc-enabled servers at $46/server/month — an annual cost of $1.76M. Redress identified Azure Hybrid Benefit stacking rights and an EA amendment pathway that brought the effective rate to $18/server/month. Annual saving: $1.07M. The engagement fee was less than 4% of the first-year reduction.

For CIOs managing hybrid estates, the appeal is clear. One portal. One governance model. One billing surface. The promise is that you stop managing five different tools to govern five different environments and instead manage everything through Azure's native toolset.

The reality is more layered. Azure Arc does deliver on its core promise of unified management, but the journey from multi-tool chaos to single-pane clarity involves meaningful investment in connectivity, agent deployment, governance design, and — critically — licensing decisions that will shape your Microsoft spend for years.

Core Capabilities by Workload Type

Arc-enabled servers cover physical machines and VMs running Windows or Linux. Once the Connected Machine agent is installed, these servers appear in your Azure portal alongside your native Azure VMs. You gain inventory visibility, update management, vulnerability assessment via Defender for Cloud, and the ability to run VM extensions (Log Analytics, Dependency Agent, Custom Script) on non-Azure machines.

Arc-enabled Kubernetes extends governance to clusters on any platform — on-premises, GKE, EKS, or bare-metal distributions. GitOps-based deployment through Azure Arc allows configuration management at scale using Flux, with Azure Policy enforcing compliance without manual intervention per cluster.

Arc-enabled data services bring Azure SQL Managed Instance to any Kubernetes environment. This is the most commercially significant Arc component for organisations running substantial SQL Server estates on-premises, because it enables the consumption of SQL services with cloud-style elasticity and automatic updates without a data migration to Azure.

The Licensing Landscape: What You Actually Pay For

Microsoft markets Azure Arc as a free management service, and the base control plane — the ability to connect and view resources — is indeed available at no additional charge. But "free" is a narrow description of what Arc actually costs once you activate the capabilities that make it useful at enterprise scale.

What Is Genuinely Free

Onboarding servers, Kubernetes clusters, and SQL instances to Arc. Viewing inventory in the Azure portal. Basic policy assignment. The Connected Machine agent. These capabilities have no licensing charge, which is appropriate because they generate no billable consumption — they are Microsoft's mechanism for expanding its management surface.

What Triggers Billing

The billing reality begins when you activate services on Arc-connected resources. Microsoft Defender for Cloud costs $15 per server per month when Defender for Servers Plan 2 is enabled across Arc-connected machines. Azure Monitor Log Analytics charges apply when you stream telemetry from Arc agents to a workspace — costs scale with ingestion volume and retention. Microsoft Purview compliance scanning and data governance features carry separate licensing. Hotpatching for Windows Server Arc-enabled nodes will transition from free preview to $1.50 per core per month from mid-2025 onwards.

Pay-as-you-go Windows Server licensing through Arc (for scenarios where you're licensing in the cloud rather than using existing on-premises licenses) runs $73 per month for Standard edition and $273.75 per month for Enterprise edition. SQL Server pay-as-you-go through Arc is available for SQL Server 2012 and later, replacing upfront perpetual licensing with hourly consumption billing.

Extended Security Updates: The Often-Overlooked Cost

For organisations running Windows Server 2012/2012 R2 or SQL Server 2012 on-premises, Azure Arc unlocks Extended Security Updates without migrating workloads to Azure. ESUs through Arc provide up to three additional years of security patches for end-of-support servers. The Arc-delivered ESU mechanism is operationally simpler than per-server ESU deployment, but organisations must evaluate whether the cost — typically aligned with on-premises ESU pricing — is a better investment than modernisation or migration.

Need independent guidance on your Azure Arc business case?

We analyse Arc licensing costs against your actual estate — before you commit to Microsoft's pricing.
Speak to an Advisor →

Azure Hybrid Benefit: The Single Biggest Lever

If your organisation holds Windows Server or SQL Server licenses with active Software Assurance, Azure Hybrid Benefit (AHB) is the most powerful cost optimisation tool available to you. The savings are not marginal — they are structural. Windows Server VMs running in Azure with AHB are priced up to 80 percent below pay-as-you-go rates. SQL Server carries equivalent discounts of up to 85 percent.

The mechanism is straightforward: each physical core license with active SA provides two Azure virtual cores. An organisation with 100 Windows Server Datacenter core licenses and active SA can cover 200 Azure virtual cores under AHB, eliminating the Windows licensing component of those VMs entirely.

The AHB opportunity extends to Arc-enabled scenarios as well. SQL Server licenses with SA can be applied to Arc-connected SQL deployments, including Arc-enabled SQL Managed Instance, reducing or eliminating the pay-as-you-go SQL billing for on-premises workloads enrolled in Arc's data services.

Common AHB Mistakes to Avoid

Many organisations underutilise AHB because license tracking is decentralised. On-premises SA licences are managed by procurement or IT Asset Management teams, while Azure consumption is managed by cloud operations — the two often do not communicate effectively about which on-premises licenses are available for cloud offloading. A cross-functional license audit before your EA renewal or Azure Arc deployment is essential.

A second common error is failing to apply AHB centrally. Microsoft's Cost Management tools allow administrators to assign AHB benefits at subscription or billing account scope rather than individually per resource. Centralised assignment reduces the likelihood that some VMs are inadvertently billed at pay-as-you-go rates when SA coverage is available.

Enterprise Agreement Negotiation: Where CIOs Leave Money on the Table

Azure Arc sits within the broader Microsoft EA/Azure commercial relationship. Understanding how Arc-related spending interacts with your Enterprise Agreement is essential to getting the best commercial outcome.

How Arc Spend Flows Through the EA

Azure Arc consumption — Defender charges, Log Analytics, Arc-enabled SQL services — appears on your Azure bill and draws down your Microsoft Azure Consumption Commitment (MACC) if you have one. Any Azure Consumption Discounts negotiated in your EA apply to Arc-eligible services. This means organisations with strong Azure volume commitments can extend their negotiated discounts to Arc-related workloads without separate negotiation.

The key implication is that Arc should be part of your Azure spend forecasting during EA negotiation, not treated as a separate product conversation. Underestimating Arc's contribution to your total Azure bill can cause you to negotiate a MACC commitment that is either too low (and you miss discount thresholds) or too high (and you face shortfall penalties).

Negotiation Leverage Points

Microsoft prices Azure Arc services within the broader Azure pricing framework, which means the standard EA negotiation variables apply. Volume commitment level determines your baseline Azure Consumption Discount. Strategic value to Microsoft — whether you are running competitive workloads on AWS or Google Cloud that you are willing to migrate — is a significant lever that most organisations fail to use effectively.

CIOs negotiating Azure Arc deployments should come to the table with documented alternatives. AWS Outposts and Google Anthos are credible competing offerings. Organisations that arrive at EA negotiations without documented AWS/GCP analysis are treated differently by Microsoft's enterprise sales teams than those who can demonstrate genuine optionality.

The timing of the negotiation matters as much as the content. Microsoft's fiscal year ends June 30. Enterprise sales teams face quarterly acceleration targets, which means the final six weeks of Q4 (May–June) and Q2 (November–December) are periods of heightened willingness to offer improved terms. Aligning your EA renewal or expansion conversations with these windows is a structural advantage.

"Most organisations treat Arc as a technology decision and leave the commercial conversation to a separate team. That split costs them materially in every EA negotiation cycle."

Securing Flexibility for Arc Evolution

Azure Arc's capability set is expanding rapidly. Capabilities that are in preview today — including Arc-enabled VMware vSphere management, Arc-enabled SCVMM, and hotpatching — will move to general availability with associated billing. EA terms that locked in pricing in 2022 may not adequately cover the Arc capabilities organisations will be consuming in 2024 and 2025.

CIOs should negotiate price protection clauses for Arc-related services that are in preview at the time of EA signing, securing the right to consume GA versions at specified price points. This is a negotiable term that Microsoft's enterprise teams can accommodate in custom contract schedules, but only if you ask for it explicitly.

Deployment Realities: What the Sales Deck Omits

Azure Arc deployments encounter predictable failure modes that Microsoft's documentation addresses at a technical level but rarely frames from a CIO's programme risk perspective.

Network Connectivity: The Most Common Failure Point

The Connected Machine agent requires outbound HTTPS connectivity to a specific set of Azure endpoints. In organisations with restrictive egress firewall policies — particularly in regulated industries or environments with legacy network architecture — this connectivity is not guaranteed and may require significant network change management. Firewall rules, proxy configuration, and in some cases dedicated connectivity paths need to be established before Arc onboarding can succeed at scale.

The problem compounds in environments where different teams own different layers of the network stack. Cloud operations may be unaware of the firewall policies that will block Arc connectivity, and the network team may not understand why Azure endpoints need to be allowlisted for on-premises agents. Programme plans that do not budget for this coordination typically encounter arc agent registration failures that delay the project by weeks.

Governance Design Before Onboarding

Azure Arc's value proposition depends on applying consistent governance — Azure Policy, RBAC, tagging, and compliance assignments — across all connected resources. Organisations that onboard Arc-enabled servers without first designing their governance model end up with thousands of resources in Azure that are visible but ungoverned, creating compliance risk rather than compliance assurance.

The governance design decision that most commonly causes downstream problems is the security boundary question. Arc-enabled servers are accessible through Azure RBAC, which means Azure administrators with the right permissions can effectively manage on-premises servers through the cloud plane. In organisations where on-premises security governance is separate from cloud security governance, this creates a gap that needs explicit resolution before deployment.

Skills and Training Investment

Arc administration requires familiarity with Azure Policy, the Azure CLI, PowerShell DSC, and Kubernetes tooling (for cluster scenarios). Most organisations deploying Arc at scale find that their on-premises operations teams have limited Azure skills and their cloud operations teams have limited on-premises context. A dedicated Arc training programme covering both audiences is a prerequisite for sustainable operations, not an optional investment.

Preparing for an Azure EA renewal?

We negotiate directly alongside your team — with documented leverage and pricing benchmarks.
Request a Negotiation Review →

Optimisation Framework: Five Levers for CIOs

Based on our advisory work across enterprises running hybrid Microsoft environments, the following five levers consistently deliver the strongest combination of cost reduction and operational improvement for Arc deployments.

1. Audit Your SA Coverage Before Deploying Arc-Billed Services

Before activating any billable Arc service — Defender for Cloud, Log Analytics streaming, Arc-enabled SQL — map your existing Software Assurance coverage against the workloads you intend to Arc-enable. Azure Hybrid Benefit availability, ESU eligibility, and the applicability of existing enterprise agreements all depend on this mapping. Organisations that deploy first and optimise later consistently overpay during the first year of Arc operations.

2. Sequence Your Governance Design Ahead of Onboarding

Define your Azure Policy assignments, RBAC model, and resource tagging taxonomy before connecting a single Arc resource. The cost of retrofitting governance onto thousands of ungoverned Arc-enabled resources — re-tagging, re-assigning policies, resolving compliance drift — is consistently underestimated. A week spent on governance design before onboarding saves a month of remediation after it.

3. Build Arc Spend Into Your MACC Commitment Modelling

If you are negotiating or renewing a Microsoft Azure Consumption Commitment, model Arc-related consumption explicitly. Include projected Defender for Cloud charges, Log Analytics ingestion volumes, Arc-enabled SQL billing, and any anticipated hotpatching costs once it moves to GA. Understating Arc contribution in your MACC model means negotiating a commitment that leaves available discount headroom unclaimed.

4. Use Competitive Alternatives as Negotiating Anchors

AWS Outposts provides on-premises deployment of native AWS compute and storage, with unified management through the AWS Console. Google Anthos (now Google Distributed Cloud) offers Kubernetes management across hybrid and multicloud environments with comparable policy enforcement capabilities. Neither is a perfect substitute for Azure Arc in a Microsoft-heavy environment, but their existence — and your genuine willingness to evaluate them — is the most effective negotiating anchor available to CIOs when discussing Azure Arc commercial terms with Microsoft.

5. Time Commercial Conversations with Microsoft's Sales Calendar

Microsoft enterprise sales teams operate under quarterly and annual targets. The end of Microsoft's fiscal quarters — September, December, March, June — represents periods of elevated commercial flexibility. Organisations that align their EA negotiations, MACC renewals, or Arc expansion conversations with these windows consistently secure better terms than those that renew on autopilot at the contract anniversary date.

The CIO Decision Framework: When Arc Delivers Clear ROI

Azure Arc is not a universal recommendation. The ROI case is clear in specific scenarios and less compelling in others.

Arc Delivers Strong ROI When

Your organisation has a substantial on-premises estate that you are not planning to migrate to Azure within the next three years, but you want to apply Azure governance, security, and monitoring consistently across that estate. Arc's management value is proportional to the scale of the hybrid footprint it governs.

You hold Windows Server or SQL Server licenses with active SA that are underutilised on-premises. Arc unlocks Azure Hybrid Benefit for cloud workloads and enables ESU coverage for end-of-support systems, converting dormant SA value into tangible cost savings.

You are running multiple Kubernetes clusters across different environments and need consistent policy enforcement and deployment tooling. Arc's Kubernetes management capabilities are genuinely differentiated and operationally valuable at scale.

Arc ROI Is Less Compelling When

Your on-premises estate is scheduled for full migration to Azure within eighteen months. The management investment in Arc deployment and governance may not be recovered before the estate is consumed into native Azure management. In these scenarios, the migration programme itself often provides sufficient governance improvement without Arc.

You are not a Microsoft-heavy shop. Arc's value depends heavily on the existing Microsoft ecosystem — Azure Policy integration, Entra ID governance, Defender for Cloud. In environments where on-premises workloads are predominantly Linux-based with non-Microsoft identity and security tooling, Arc's integration advantages are reduced and alternatives like HashiCorp Consul, Rancher, or Anthos may deliver better operational fit.

Microsoft Licensing Intelligence — Free Monthly Briefing

Negotiation updates, pricing changes, and EA renewal strategies from Redress Compliance advisors with 20+ years in Microsoft licensing.

Summary: Ten Things Every CIO Should Know About Azure Arc

Azure Arc's base control plane is free — billing begins when you activate Defender for Cloud, Log Analytics, or Arc-enabled data services on connected resources. Azure Hybrid Benefit is the most powerful cost lever available for organisations with SA-covered Windows Server and SQL Server licences, delivering up to 80–85 percent savings. Pay-as-you-go Windows Server licensing through Arc runs from $73 to $273 per month per server depending on edition.

Arc consumption draws down your MACC commitment and qualifies for negotiated Azure Consumption Discounts — model this explicitly when sizing your MACC. Competitive alternatives (AWS Outposts, Google Distributed Cloud) are genuine negotiating anchors that Microsoft responds to. Network connectivity is the most common deployment failure point — budget for firewall rule changes and proxy configuration before onboarding at scale. Governance design must precede onboarding to prevent compliance drift across thousands of ungoverned resources.

Microsoft fiscal quarter ends — September, December, March, June — are the optimal windows for EA and MACC commercial conversations. Arc-enabled Kubernetes delivers strong ROI for organisations managing clusters across heterogeneous environments. Arc delivers strongest ROI for organisations with large on-premises estates, existing SA coverage, and no imminent full migration to Azure.