Secure and governed access to all applications and resources
In this guide, we describe how to configure Microsoft Entra Suite products for a scenario in which the fictional organization, Contoso has strict default internet access policies and wants to control internet access according to business requirements.
In an example scenario for which we describe how to configure its solution in this guide, a Marketing department user requires access to social networking sites that Contoso prohibits for all users. Users can request access in My Access. Upon approval, they become a member of a group that grants them access to social networking sites.
In another example scenario and corresponding solution, a SOC analyst needs to access a group of high-risk internet destinations for a specific time to investigate an incident. The SOC analyst can make that request in My Access. Upon approval, they become a member of a group that grants them access to high-risk internet destinations.
You can replicate these high-level steps for the Contoso solution as described in this guide.
- Sign up for Microsoft Entra Suite. Enable and configure Microsoft Entra Internet Access for desired network and security settings.
- Deploy Microsoft Global Secure Access clients on users� devices. Enable Microsoft Entra Internet Access.
- Create a security profile and web content filtering policies with a restrictive baseline policy that blocks specific web categories and web destinations for all users.
- Create a security profile and web content filtering policies that allows access to social networking sites.
- Create a security profile that enables the Hacking web category.
- Use Microsoft Entra ID Governance to allow users requesting access to access packages such as:
- Marketing department users can request access to social networking sites with a quarterly access review.
- SOC team members can request access to high-risk internet destinations with a time limit of eight hours.
- Create and link two Conditional Access policies using the Global Secure Access security profile session control. Scope the policy to groups of users for enforcement.
- Confirm that traffic is appropriately granted with traffic logs in Global Secure Access. Ensure that Marketing department users can access the access package in the My Access portal.
These are the benefits of using these solutions together:
- Least privilege access to internet destinations. Reduce internet resource access to only what the user requires for their job role through the joiner/mover/leaver cycle. This approach reduces end user and device compromise risk.
- Simplified and unified management. Manage network and security functions from a single cloud-based console, reducing complexity and cost of maintaining multiple solutions and appliances.
- Enhanced security and visibility. Enforce granular and adaptive access policies based on user and device identity and context, as well as app and data sensitivity and location. Enriched logs and analytics provide gain insights into network and security posture to more quickly detect and respond to threats.
- Improved user experience and productivity. Provide fast and seamless access to necessary apps and resources without compromising security or performance
This section defines the requirements for the scenario solution.
Administrators who interact with Global Secure Access preview features require the Global Secure Access Administrator and Application Administrator roles.
Conditional Access (CA) policy configuration requires the Conditional Access Administrator or Security Administrator role. Some features may require additional roles.
Identity Governance configuration requires at least the Identity Governance Administrator role.
To implement all the steps in this scenario, you need Microsoft Entra ID P1 for Global Secure Access (while the product is in Public Preview) and Microsoft Entra Governance licenses. You can purchase licenses or obtain trial licenses.
To successfully deploy and test this scenario, configure for these prerequisites:
- Microsoft Entra tenant with Microsoft Entra ID P1 license. Configure Microsoft Entra ID P2 to test Identity Protection. Purchase licenses or obtain trial licenses.
- One user with at least Global Secure Access Administrator and Application Administrator roles to configure Microsoft's Security Service Edge
- At least one user as client test user in your tenant
- One Windows client device with this configuration:
- Windows 10/11 64-bit version
- Microsoft Entra joined or hybrid joined
- Internet connected
- Download and install Global Secure Access Client on client device. The Global Secure Access Client for Windows article describes prerequisites and installation.
In this section, we activate Global Secure Access through the Microsoft Entra admin center. We then set up the required initial configurations for the scenario.
- Sign in to the Microsoft Entra admin center with at least a Global Administrator role.
- Go to Global Secure Access > Get started > Activate Global Secure Access in your tenant. Select Activate to enable SSE features.
- Go to Global Secure Access > Connect > Traffic forwarding. Toggle on Private access profile. Traffic forwarding enables you to configure the type of network traffic to tunnel through Microsoft�s Security Service Edge Solution services. Set up traffic forwarding profiles to manage traffic types.
- The Microsoft access profile is for Microsoft 365 access.
- The Private access profile is for Microsoft Entra Private Access.
- The Internet access profile is for Microsoft Entra Internet Access. Microsoft's Security Service Edge solution only captures traffic on client devices with Global Secure Access Client installation.
Microsoft Entra Internet Access for Microsoft 365 and Microsoft Entra Private Access use the Global Secure Access client on Windows devices. This client acquires and forwards network traffic to Microsoft's Security Service Edge solution. Perform these installation and configuration steps:
-
Ensure that the Windows device is Microsoft Entra joined or hybrid joined.
-
Sign in to the Windows device with a Microsoft Entra user role with local admin privileges.
-
Sign in to the Microsoft Entra admin center with at least a Global Administrator role.
-
Go to Global Secure Access > Connect > Client Download. Select Download client. Complete the installation.
-
In the Window taskbar, the Global Secure Access Client first appears as disconnected. After a few seconds, when prompted for credentials, enter test user's credentials.
-
In the Window taskbar, hover over the Global Secure Access Client icon and verify Connected status.
In this guide, we use two security groups to assign security profiles using Conditional Access (CA) policies. In the Microsoft Entra Portal, create security groups with these names:
- Internet Access � Allow Social Networking sites
- Internet Access � Allow Hacking sites Don�t add any members to these groups. Later in this guide, we configure Identity Governance to add members on request.
In this section, we block access to inappropriate sites for all users in the organization with a baseline profile.
Create a web filtering policy
-
Sign in to the Microsoft Entra admin center. Go to Global Secure Access > Secure > Web content filtering policies > Create policy > Configure Global Secure Access content filtering.
-
On Create a web content filtering policy > Basics, complete these fields:
- Name: Baseline Internet Access Block Rule
- Description: Add a description
- Action: Block
-
Select Next.
-
On Create a web content filtering policy > Policy Rules, select Add Rule.
-
In Add Rule, complete these fields:
- Name: Baseline blocked web categories
- Destination type: webCategory
-
Search: Select the following categories. Confirm that they are in Selected items.
- Alcohol and Tobacco
- Criminal Activity
- Gambling
- Hacking
- Illegal Software
- Social Networking
-
Select Add.
-
On Create a web content filtering policy > Policy Rules, confirm your selections.
-
Select Next.
-
On Create a web content filtering policy > Review, confirm your policy configuration.
-
Select Create policy.
-
To confirm policy creation, view it in Manage web content filtering policies.
- Sign in to the Microsoft Entra admin center. Go to Global Secure Access > Secure > Security profiles.
- Select Baseline Profile.
- On Basics, set State to enabled.
- Select Save.
- On Edit Baseline Profile, select Link policies. Select Link a policy. Select Existing policy. Complete these fields:
- Link a policy: Select Policy name and Baseline Internet Access Block Rule
- Priority: 100
- State: Enabled
- Select Add.
- On Create a profile > Link policies, confirm Baseline Internet Access Block Rule is listed.
- Close the baseline security profile.
In this section, we create a security profile that allows access to social networking sites for users that request it.
-
Sign in to the Microsoft Entra admin center. Go to Global Secure Access > Secure > Web content filtering policies > Create policy > Configure Global Secure Access content filtering.
-
On Create a web content filtering policy > Basics, complete these fields:
- Name: Allow Social Networking sites
- Description: Add a description
- Action: Allow
-
Select Next.
-
On Create a web content filtering policy > Policy Rules, select Add Rule.
-
In Add Rule, complete these fields:
- Name: Social networking
- Destination type: webCategory
- Search: Social
-
Select Social Networking
-
Select Add.
-
On Create a web content filtering policy > Policy Rules, select Next.
-
On Create a web content filtering policy > Review, confirm your policy configuration.
-
Select Create policy.
-
To confirm policy creation, view it in Manage web content filtering policies.
-
Sign in to the Microsoft Entra admin center. Go to Global Secure Access> Secure > Security profiles. Select Create profile.
-
On Create a profile > Basics, complete these fields:
- Profile name: Allow Social Networking sites
- Description: Add a description
- State: Enabled
- Priority: 1000
-
Select Next.
-
On Create a profile > Link policies, select Link a policy.
-
Select Existing policy.
-
In Link a policy, complete these fields:
- Policy name: Allow Social Networking
- Priority: 1000
- State: Enabled
-
Select Add.
-
On Create a profile > Link policies, confirm Allow Social Networking is listed.
-
Select Next.
-
On Create a profile > Review, confirm your profile configuration.
-
Select Create a profile.
In this section, we create a Conditional Access (CA) policy that enforces the Allow Social Networking security profile for users that have requested access.
- Sign in to the Microsoft Entra admin center. Go to Protection > Conditional Access. Select Create new policy.
- In New Conditional Access Policy, complete these fields:
- Name: Internet Access � Allow Social Networking sites
- Users or workload identities: Specific users included
- What does this policy apply to? Users and groups
- Include > Select users and groups > Select Users and groups
- Select your test group (such as Internet Access � Allow Social Networking sites). Select Select.
- Target resources
- Select what this policy applies to > Global Secure Access
- Select the traffic profiles this policy applies to > Internet traffic
- Leave Grant at its default settings to grant access so that your defined security profile defines block functionality.
- In Session, select Use Global Secure Access security profile.
- Select Allow Social Networking sites.
- In Conditional Access Overview > Enable policy, select On. Select Create.
In this section, we create a new security profile that allows access to hacking sites for users that request it. Users receive access for eight hours after which access is automatically removed.
-
Sign in to the Microsoft Entra admin center. Go to Global Secure Access > Secure > Web content filtering policies > Create policy > Configure Global Secure Access content filtering.
-
On Create a web content filtering policy > Basics, complete these fields:
- Name: Allow Hacking sites
- Description: Add a description
- Action: Allow
-
Select Next.
-
On Create a web content filtering policy > Policy Rules, select Add Rule.
-
In Add Rule, complete these fields:
- Name: Hacking
- Destination type: webCategory
- Search: Hacking, select Hacking
-
Select **Add
-
On Create a web content filtering policy > Policy Rules, select Next.
-
On Create a web content filtering policy > Review, confirm your policy configuration.
-
Select Create policy.
-
To confirm policy creation, view it in Manage web content filtering policies.
-
Sign in to the Microsoft Entra admin center. Go to Global Secure Access > Secure > Security profiles. Select Create profile.
-
On Create a profile > Basics, complete these fields:
- Profile name: Allow Hacking sites
- Description: Add a description
- State: Enabled
- Priority: 2000
-
Select Next.
-
On Create a profile > Link policies, select Link a policy.
-
Select Existing policy.
-
In the Link a policy dialog box, complete these fields:
- Policy name: Allow Hacking
- Priority: 2000
- State: Enabled
-
Select Add.
-
On Create a profile > Link policies, confirm Allow Hacking is listed.
-
Select Next.
-
On Create a profile > Review, confirm your profile configuration.
-
Select Create a profile.
In this section, we create a Conditional Access (CA) policy that enforces the Allow Hacking sites security profile for the users that have requested access.
- Sign in to the Microsoft Entra admin center. Go to Protection > Conditional Access. Select Create new policy.
- In the New Conditional Access Policy dialog box, complete these fields:
- Name: Internet Access � Allow Hacking sites
- Users or workload identities: Specific users included
- What does this policy apply to? Users and groups
- Include > Select users and groups > Select Users and groups
- Select your test group (such as Internet Access � Allow Hacking sites) > select Select.
- Target resources
- Select what this policy applies to > Global Secure Access
- Select the traffic profiles this policy applies to > Internet traffic
- Leave Grant at its default settings to grant access so that your defined security profile defines block functionality.
- In the Session dialog box, select Use Global Secure Access security profile.
- Select Allow Hacking sites.
- In Conditional Access Overview > Enable policy, select On. Select Create.
Follow these steps to create an Entitlement management catalog:
-
Sign in to the Microsoft Entra admin center as at least an Identity Governance Administrator.
-
Browse to Identity governance > Entitlement management > Catalogs.
-
Select New catalog
-
Enter a unique name for the catalog and provide a description. Requestors see this information in an access package's details (for example, Internet Access).
-
For this scenario, we create access packages in the catalog for internal users. Set Enabled for external users to No.
-
To add the resources, go to Catalogs and open the catalog to which you want to add resources. Select Resources. Select Add resources.
-
Add the two security groups that you previously created earlier (such as Internet Access � Allow Social Networking sites and Internet Access � Allow Hacking sites).
In this section, we create access packages that allow users to request access to the internet site categories that each security profile defines. Follow these steps to create an access package in Entitlement management:
-
Sign in to the Microsoft Entra admin center with at least an Identity Governance Administrator role.
-
Go to Identity governance > Entitlement management > Access package.
-
Select New access package.
-
For Basics, give the access package a name (such as Internet Access � Allow Social Networking sites). Specify the catalog that you previously created.
-
For Resource roles, select the security that you previously added (such as Internet Access � Allow Social Networking sites).
-
In Role, select Member.
-
For Requests, select For users in your directory.
-
To scope the users that can request access to social networking sites, select Specific users and groups and add an appropriate group of users. Otherwise, select All members.
-
On Requests, select Yes for Enable new requests.
-
Optional: In Approval, specify whether approval is required when users request this access package.
-
For Lifecycle, specify when a user's assignment to the access package expires. Specify whether users can extend their assignments. For Expiration, set Access package assignments expiration to On date, Number of days, Number of hours, or Never.
-
Repeat the steps to create a new access package that allows access to hacking sites. Configure these settings:
- Resource: Internet Access � Allow Hacking sites
- Who can request: SOC team members
- Lifecycle: Set Number of hours to 8 hours
In this section, we validate that the user can�t access sites that the baseline profile blocks.
-
Sign in to the device where you have installed the Global Secure Access client.
-
In a browser, go to sites that the baseline profile blocks and verify blocked access. For example:
- hackthissite.org is a free, safe, and legal training ground for security professionals to test and expand ethical hacking skills. This site is classified as Hacking.
- YouTube.com is a free video sharing platform. This site is classified as Social Networking.
In this section, we validate that a Marketing department user can request access to social networking sites.
-
Sign in to the device where you have installed the Global Secure Access client with a user that is a member of the Marketing team (or a user that has authorization to request access to the example Internet Access � Allow Social Networking sites access package).
-
In a browser, validate blocked access to a site in the Social Networking category that the baseline security profile blocks. For example, try accessing youtube.com.
-
Browse to https://myaccess.microsoft.com. Select Access packages. Select Request for the Internet Access � Allow Social Networking sites access package.
-
Select Continue. Select Request.
-
If you configured approval for the access package, sign in as an approver. Browse to https://myaccess.microsoft.com. Approve the request.
-
Sign in as a Marketing department user. Browse to https://myaccess.microsoft.com. Select Request history. Validate your request status to Internet Access � Allow Social Networking sites is Delivered.
-
New settings may take a few minutes to apply. To speed up the process, right-click the Global Secure Access icon in the system tray. Select Log in as a different user. Sign in again.
-
Try accessing sites in the social networking category that the baseline security profile blocks. Validate that you can successfully browse them. For example, try browsing youtube.com.
In this section, we validate that a SOC team user can request access to hacking sites.
-
Sign in to the device where you have installed the Global Secure Access client with a user that is a member of the SOC team (or a user that has authorization to request access to the example Internet Access � Allow Hacking sites access package).
-
In a browser, validate blocked access to a site in the hacking category that the baseline security profile blocks. For example, hackthissite.org.
-
Browse to https://myaccess.microsoft.com. Select Access packages. Select Request for the Internet Access � Allow Hacking sites access package.
-
Select Continue. Select Request.
-
If you configured approval for the access package, sign in as an approver. Browse to https://myaccess.microsoft.com. Approve the request.
-
Sign in as a SOC team user. Browse to https://myaccess.microsoft.com. Select Request history. Validate your request status to Internet Access � Allow Hacking sites is Delivered.
-
New settings may take a few minutes to apply. To speed up the process, right-click the Global Secure Access icon in the system tray. Select Log in as a different user. Sign in again.
-
Try accessing sites in the hacking category that the baseline security profile blocks. Validate that you can successfully browse them. For example, try browsing hackthissite.org.
-
If you configured hacking site access with Lifecycle > Number of hours set to 8 in previous steps, after eight hours elapses, verify blocked access to hacking sites.