SC‑300 Study Portal Path 3

Unit 3: Deploy and Configure Microsoft Entra Internet Access

Deploying Microsoft Entra Internet Access follows four core steps. Each step builds toward enforcing identity-aware internet access.

Step 1 – Enable Microsoft Traffic Forwarding Profile

Enabling the Microsoft traffic profile allows Global Secure Access to capture traffic destined for Microsoft services such as:

When enabled, this automatically creates:

This step ensures Microsoft traffic is evaluated against Global Secure Access and Conditional Access policies.

Step 2 – Deploy the Global Secure Access Client

The Global Secure Access client captures network traffic from end-user devices.

Deployment options include:

Once installed:

Step 3 – Configure Tenant Restrictions

Tenant restrictions control access to external tenants.

Administrators can:

Tenant restrictions are configured under cross-tenant access settings, moving control from network proxies to the identity plane.

Step 4 – Enable Enhanced Signaling and Conditional Access

Global Secure Access introduces the concept of a compliant network in Conditional Access.

This allows administrators to:

Continuous Access Evaluation (CAE) enhances this by enforcing policies during active sessions.