Deploying Microsoft Entra Internet Access follows four core steps. Each step builds toward enforcing identity-aware internet access.
Step 1 – Enable Microsoft Traffic Forwarding Profile
Enabling the Microsoft traffic profile allows Global Secure Access to capture traffic destined for Microsoft services such as:
When enabled, this automatically creates:
This step ensures Microsoft traffic is evaluated against Global Secure Access and Conditional Access policies.
Step 2 – Deploy the Global Secure Access Client
The Global Secure Access client captures network traffic from end-user devices.
Deployment options include:
Once installed:
Step 3 – Configure Tenant Restrictions
Tenant restrictions control access to external tenants.
Administrators can:
Tenant restrictions are configured under cross-tenant access settings, moving control from network proxies to the identity plane.
Step 4 – Enable Enhanced Signaling and Conditional Access
Global Secure Access introduces the concept of a compliant network in Conditional Access.
This allows administrators to:
Continuous Access Evaluation (CAE) enhances this by enforcing policies during active sessions.