Microsoft Global Secure Access Deployment Guide for Microsoft Entra Internet Access
Microsoft Global Secure Access converges network, identity, and endpoint access controls for secure access to any app or resource from any location, device, or identity. It enables and orchestrates access policy management for corporate employees. You can continuously monitor and adjust, in real time, user access to your private apps, Software-as-a-Service (SaaS) apps, and Microsoft endpoints. This solution helps you to appropriately respond to permission and risk level changes as they occur.
With Microsoft Entra Internet Access, you can control and manage internet access for enterprise users with managed devices when they work locally or remotely. It helps you to:
- Protect your enterprise users and managed devices from malicious internet traffic and malware infection.
- Stop users from accessing sites based on web category or fully qualified domain name.
- Collect internet usage data for reports and support investigations.
The guidance in this article helps you to test and deploy Microsoft Entra Internet Access in your production environment. Microsoft Global Secure Access deployment guide introduction provides guidance on how to initiate, plan, execute, monitor, and close your Global Secure Access deployment project.
Identify and plan for key use cases
Before you enable Microsoft Entra Internet Access, plan for what you want it to do for you. Understand use cases, such as the following, to decide which features to deploy.
- Define a baseline policy that applies to all internet access traffic routed through the service.
- Prevent specific users and groups from using managed devices to access websites by category (such as Alcohol and Tobacco or Social Media). Microsoft Entra Internet Access provides more than 60 categories from which you can choose.
- Prevent users and groups from using managed devices to access specific fully qualified domain names (FQDN).
- Configure override policies to allow groups of users to access sites that your web filtering rules would otherwise block.
- Extend the capabilities of Microsoft Entra Internet Access to entire networks, including devices that are not running the Global Secure Access client
After you understand the capabilities you require in your use cases, create an inventory to associate your users and groups with these capabilities. Understand which users and groups to block or allow access to which web categories and FQDNs. Include rule prioritization for each user group.
Test and deploy Microsoft Entra Internet Access
At this point, you completed initiate and plan stages of your Secure Access Services Edge (SASE) deployment project. You understand what you need to implement for whom. You defined which users to enable in each wave. You have a schedule for each wave's deployment. You have met licensing requirements. You're ready to enable Microsoft Entra Internet Access.
- Complete the Global Secure Access prerequisites.
- Create a Microsoft Entra group that includes your pilot users.
- Enable the Microsoft Entra Internet access and Microsoft traffic forwarding profiles. Assign your pilot group to each profile.
Note
Microsoft traffic is a subset of internet traffic that has its own dedicated tunnel gateway. For optimal performance, enable Microsoft Traffic with Internet access traffic profile.
Create end user communications to set expectations and provide an escalation path.
Create a roll-back plan that defines the circumstances and procedures for when you remove Global Secure Access client from a user device or disable the traffic forwarding profile.
Send end user communications.
Deploy the Global Secure Access client for Windows on devices for your pilot group to test.
Configure web content filtering policies to allow or block categories or FQDNs based on the use cases that you defined during planning.
- Block by category: define a rule that blocks one of many predefined, managed categories
- Block by FQDN: define a rule that blocks an FQDN that you specify
- Override: define a rule that allows a web category or FQDN that you specify
Create security profiles that group and prioritize your web content filtering policies based on your plan.
- Baseline profile: use Baseline profile feature to group web content filtering policies that apply to all users by default.
- Security profiles: create security profiles to group web content filtering policies that apply to a subset of users.
Create and link Conditional Access policies to apply your security profiles to your pilot group. The default Baseline profile doesn't require a conditional access policy.
Have your pilot users test your configuration.
Confirm activity in the Global Secure Access Traffic logs.
Update your configuration to address any issues and repeat the test. Use roll-back plan if needed.
As needed, iterate changes to your end user communications and deployment plan.
After your pilot is complete, you have a repeatable process to understand how to proceed with each wave of users in your production deployment.
- Identify the groups that contain your wave of users.
- Notify the support team of the scheduled wave and its included users.
- Send prepared end user communications according to your plan.
- Assign the groups to the Microsoft Entra Internet Access traffic forwarding profile.
- Deploy the Global Secure Access Client on the devices the users in this wave.
- If needed, create and configure more web content filtering policies to allow or block categories or FQDNs based on the use cases that you defined in your plan.
- If needed, create more security profiles that group and prioritize your web content filtering policies based on your plan.
- Create Conditional Access policies to apply new security profiles to the relevant groups in this wave or add the new groups of users to existing Conditional Access policies for existing security profiles.
- Update your configuration. Test again to address issues. If needed, initiate roll-back plan.
- As needed, iterate changes in your end user communications and deployment plan.
Next steps
- Learn how to accelerate your transition to a Zero Trust security model with Microsoft Entra Suite and Microsoft's unified security operations platform
- Introduction to Microsoft Global Secure Access Deployment Guide
- Microsoft Global Secure Access Deployment Guide for Microsoft Entra Private Access
- Microsoft Global Secure Access deployment guide for Microsoft Traffic
- Simulate remote network connectivity using Azure Virtual Network Gateway - Global Secure Access
- Simulate remote network connectivity using Azure vWAN - Global Secure Access