Learn about Security Service Edge (SSE) coexistence with Microsoft and Zscaler

Microsoft and Zscaler’s Secure Access Service Edge (SASE) solution can be used together in a unified environment. When used together, you harness a robust set of capabilities from both platforms to elevate your SASE journey. The synergy between these platforms enhances security and provides seamless connectivity.

This document contains steps to deploy these solutions side by side, specifically, Microsoft Entra Global Secure Access for Internet Access and Microsoft 365 applications such as Exchange Online and SharePoint Online, and Zscaler Private Access for private applications. It also contains steps to deploy Entra Global Secure Access for Microsoft 365 applications and Zscaler Internet Access for Internet Access.

Configuration overview

Two configurations are covered in this article.

In the first configuration, you enable the Microsoft 365 and Internet Access traffic forwarding profiles in the Microsoft Entra admin center. You disable the Private Access traffic forwarding profile in the Microsoft Entra admin center. The Global Secure Access client captures Microsoft 365 and Internet traffic. The Zscaler client captures Private Access traffic.

Note

The clients must be installed on a Windows 10 or Windows 11 Microsoft Entra joined device or Microsoft Entra hybrid joined device.

In the second configuration, you enable the Microsoft 365 forwarding profile and disable the Internet Access and Private Access traffic forwarding profiles in the Microsoft Entra admin center. The Global Secure Access client captures Microsoft 365 traffic. The Zscaler client captures Internet Access traffic.

Note

The clients must be installed on Windows 10 or Windows 11 Microsoft Entra joined device, Microsoft Entra hybrid joined device, or a macOS Monterey device registered to Entra with Intune Company Portal.

Microsoft Entra Internet Access and Microsoft Entra Private Access configuration

Configure the traffic forwarding profiles for your Microsoft Entra tenant. For more information about enabling and disabling profiles, see Global Secure Access traffic forwarding profiles.

For the first configuration, enable the Microsoft 365 and Internet Access traffic forwarding profiles. For the second configuration, enable the Microsoft 365 traffic forwarding profile only.

Install and configure the Global Secure Access Client on end-user devices. For more information about clients, see Global Secure Access clients. To learn how to install the Windows client, see Global Secure Access client for Windows.

Zscaler configuration 1

Configure single sign-on (SSO) authentication for Zscaler Private Access (ZPA). For more information on configuring SSO, see https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad.

Configure and deploy Zscaler app connectors. For more information on Zscaler app connectors, see https://help.zscaler.com/zpa/app-connector-management/app-connectors.

  1. Navigate to ZPA admin portal > Configuration & Control > Private Infrastructure > App Connector Management > App Connectors > Add App Connector.
  2. Deploy App Connector on your supported platform by following the respective guide.
  3. Verify that the deployed App Connector is running and healthy.

Configure Zscaler application segments. For more information on Zscaler application segments, see https://help.zscaler.com/zpa/configuring-application-segments.

  1. Navigate to Resource Management > Application Management > Application Segments > Add Application Segment.
  2. Add Name, IP/FQDN of your private application, ports, and Segment Group.
  3. Create an access policy to allow access to your private application (By default, ZPA blocks access to applications and segment groups for users until you configure policy rules that explicitly allow access). Navigate to Policy > Access Policy > Add Rule.

Download Zscaler client from the Zscaler Client Connector App Store in the Zscaler Client Connector Portal.

  1. Navigate to ZPA admin portal > Client Connector > Administration > Client Connector App Store > New Releases > General Availability.
  2. Select Platform as Windows and download the executable (EXE) or Microsoft Software Installer (MSI) package.
  3. Enable build.

Add Forwarding Profile from the Client Connector Portal.

  1. Navigate to ZPA admin portal > Client Connector > Administration > Forwarding Profile > Add Forwarding Profile.
  2. Add a Profile Name such as PF Driver Tunnel.
  3. Select Packet Filter Based in Tunnel Driver Type.

Add App Profile from the Client Connector Portal.

  1. Navigate to ZPA admin portal > Client Connector > App Profile > Platform > Windows > Add Windows Policy.
  2. Add Name, set Rule Order such as 1, select Enable, select User(s) to apply this policy, and select the Forwarding Profile. For example, select PF Driver Tunnel.
  3. Scroll down and add these Microsoft SSE service Internet Protocol (IP) addresses and Fully Qualified Domain Names (FQDNs) in
    “HOSTNAME OR IP ADDRESS BYPASS FOR VPN GATEWAY” field. IPs: 150.171.19.0/24, 150.171.20.0/24, 13.107.232.0/24, 13.107.233.0/24, 150.171.15.0/24, 150.171.18.0/24, 151.206.0.0/16, 6.6.0.0/16. FQDNs: internet.edgediagnostic.globalsecureaccess.microsoft.com, m365.edgediagnostic.globalsecureaccess.microsoft.com, private.edgediagnostic.globalsecureaccess.microsoft.com, aps.globalsecureaccess.microsoft.com, <tenantid>.internet.client.globalsecureaccess.microsoft.com, <tenantid>.m365.client.globalsecureaccess.microsoft.com, <tenantid>.private.client.globalsecureaccess.microsoft.com.

After the client is installed, users are prompted to sign in. After users sign in, the connection icon turns blue and by right clicking the icon and opening Zscaler client will show the Authentication status as Authenticated and Service Status as ON.

Open the system tray to check that Global Secure Access and Zscaler clients are enabled.

Verify configurations for clients.

  1. Right-click on Global Secure Access Client > Advanced Diagnostics > Forwarding Profile and verify that Microsoft 365 and Internet Access rules are applied to this client.
  2. Navigate to Advanced Diagnostics > Health Check and ensure no checks are failing.
  3. Right-click on Zscaler Client > Open Zscaler > More. Verify App Policy matches configurations in the earlier steps. Validate that it's up to date or update it.
  4. Navigate to Zscaler Client > Private Access. Verify Service Status is ON and Authentication Status is Authenticated.

Test traffic flow

  1. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. Select the Traffic tab and select Start collecting.
  2. Access these websites from the browsers: bing.com, salesforce.com, Instagram.com, Outlook Online (outlook.com, outlook.office.com, outlook.office365.com), SharePoint Online (<yourtenantdomain>.sharepoint.com).
  3. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs. Validate traffic related to these sites is captured in the Global Secure Access traffic logs.
  4. Access your private application. For example, using Secure Shell (SSH).
  5. Sign in to ZPA Admin Console and browse to Dashboard > Applications and Dashboard > Users or Analytics > Diagnostics > Logs. Validate traffic related to the private application is present in the Dashboard or traffic logs.
  6. Validate traffic related to Microsoft 365 and Internet Traffic such as Instagram.com, Outlook Online, and SharePoint Online is missing from ZPA logs in Analytics > Diagnostics > Logs.
  7. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. In the network traffic dialog box, select Stop collecting.
  8. Scroll to observe that the Global Secure Access client isn't capturing traffic from the private application. Also, observe that the Global Secure Access client is capturing traffic for Microsoft 365 and other internet traffic.

Zscaler configuration 2

Configure Zscaler Internet Access. To learn more about configuring Zscaler, see https://help.zscaler.com/zia/step-step-configuration-guide-zia.

Configure user authentication and provisioning methods such as Security Assertion Markup Language (SAML) for authentication and System for Cross-domain Identity Management (SCIM) for provisioning.

Download Zscaler client from the Zscaler Client Connector App Store in the Zscaler Client Connector Portal.

  1. Navigate to ZIA admin portal > Policy > Zscaler Client Connector Portal > Administration > Client Connector App Store > New Releases > General Availability.
  2. Select Platform as Windows or macOS and download the EXE or MSI package.
  3. Enable build.

Add Forwarding Profile from the Client Connector Portal.

  1. Navigate to ZIA admin portal > Policy > Zscaler Client Connector Portal > Administration > Forwarding Profile > Add Forwarding Profile.
  2. Add a Profile Name such as ZIA Tunnel 2.0.
  3. Select Packet Filter Based in Tunnel Driver Type.
  4. Select forwarding profile action as Tunnel, and select tunnel version. For example, Z-Tunnel 2.0.

Add App Profile from the Client Connector Portal.

  1. Navigate to ZIA admin portal > Policy > Zscaler Client Connector Portal > Administration > App Profiles > Platforms > Windows (or macOS) > Add Windows Policy (or macOS).
  2. Add Name, set Rule Order such as 1, select Enable, select User(s) to apply this policy, and select the Forwarding Profile. For example, select ZIA Tunnel 2.0.
  3. Scroll down and add these Microsoft SSE Service IPs and FQDNs in
    HOSTNAME OR IP ADDRESS BYPASS FOR VPN GATEWAY field. IPs: 150.171.19.0/24, 150.171.20.0/24, 13.107.232.0/24, 13.107.233.0/24, 150.171.15.0/24, 150.171.18.0/24, 151.206.0.0/16, 6.6.0.0/16. FQDNs: internet.edgediagnostic.globalsecureaccess.microsoft.com, m365.edgediagnostic.globalsecureaccess.microsoft.com, private.edgediagnostic.globalsecureaccess.microsoft.com, aps.globalsecureaccess.microsoft.com, <tenantid>.internet.client.globalsecureaccess.microsoft.com, <tenantid>.m365.client.globalsecureaccess.microsoft.com, <tenantid>.private.client.globalsecureaccess.microsoft.com.

After the client is installed, users are prompted to sign in. After users sign in, the connection icon turns blue and by right clicking the icon and opening Zscaler client will show the Authentication status as Authenticated and Service Status as ON.

Go to the system tray to check that Global Secure Access and Zscaler clients are enabled.

Verify configurations for clients.

  1. Right-click on Global Secure Access Client > Advanced Diagnostics > Forwarding Profile and verify that Microsoft 365 and Internet Access rules are applied to this client.
  2. Navigate to Advanced Diagnostics > Health Check and ensure no checks are failing. IPV4 preferred check can be ignored. You can resolve the error by creating a registry key. For more information about the registry key and installing the client, see Global Secure Access client for Windows.
  3. Right-click on Zscaler Client > Open Zscaler > More. Verify App Policy matches configurations in the earlier steps. Validate that it's up to date or update it.
  4. Navigate to Zscaler Client > Private Access. Verify Service Status is ON and Authentication Status is Authenticated.

Test traffic flow

  1. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. Select the Traffic tab and select Start collecting.
  2. Access these websites from the browsers: bing.com, salesforce.com, Instagram.com.
  3. In the system tray, right-click Global Secure Access Client and select Advanced Diagnostics > Traffic tab.
  4. Scroll to observe that the Global Secure Access client isn't capturing traffic from these websites.
  5. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs. Validate traffic related to these sites is missing from the Global Secure Access traffic logs.
  6. Sign in to Zscaler Internet Access (ZIA) admin portal and browse to Analytics > Web Insights > Logs.
  7. Validate traffic related to these sites is present in Zscaler logs.
  8. Access Outlook Online (outlook.com, outlook.office.com, outlook.office365.com), SharePoint Online (<yourtenantdomain>.sharepoint.com).
  9. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. In the Traffic dialog box, select Stop collecting.
  10. Scroll to confirm the Global Secure Access client handled Microsoft 365 traffic.
  11. You can also validate that the traffic is captured in the Global Secure Access traffic logs. In the Microsoft Entra admin center, navigate to Global Secure Access > Monitor > Traffic logs.
  12. Validate traffic related to Outlook Online and SharePoint Online is missing from Zscaler logs in Analytics > Web Insights > Logs.

Next steps