Deep Dive on Microsoft Entra Internet Access

Sdílet
Vložit
  • čas přidán 22. 08. 2024

Komentáře • 54

  • @NTFAQGuy
    @NTFAQGuy  Před 8 měsíci

    Lets dive into the Entra secure web gateway solution, Microsoft Entra Internet Access! Please make sure to read the description for the chapters and key information about this video and others.
    ⚠ P L E A S E N O T E ⚠
    🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there!
    🕰 I don't discuss future content nor take requests for future content so please don't ask 😇
    🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc.
    👂 Translate the captions to your native language via the auto-translate feature in settings! czcams.com/video/v5b53-PgEmI/video.html for a demo of using this feature.
    Thanks for watching!
    🤙

  • @butztanx
    @butztanx Před 23 dny +1

    Listened to a podcast about GSE last week and knew it was going to be something I need to put in place within our business. I searched straight for Jon Savill knowing fine well that this quality content would be available. Another superb video Jon. Thanks as always!

  • @saeednrzadeh4754
    @saeednrzadeh4754 Před měsícem

    I just do not know what we should do without these very easy to understand videos , Microsoft documentation only make sense after watching John's video. I guess these days Microsoft documentation is too much talk and heavy to understand . Thanks John

  • @Semtx552
    @Semtx552 Před 7 měsíci +1

    what a successor vid to the first vid on global secure access!
    thanks so much John!

  • @christianpetrik7533
    @christianpetrik7533 Před 8 měsíci +3

    Waited for this. You never disappoint :)

  • @nerdegem
    @nerdegem Před 8 měsíci +3

    Looks like an interesting challenge to services such as CloudFlare Argo tunnels and Tailscale networks, as well as traditional VPNs with split tunnelling.

  • @davidgorman994
    @davidgorman994 Před 8 měsíci

    Very useful. You seem to be using an updated version of the client that I am. The version I used didn't really show if you were connected to the services or not. This is very welcome.

  • @ilannknochen
    @ilannknochen Před 14 dny

    Awesome as usual!

  • @NeilSearle
    @NeilSearle Před 8 měsíci +1

    Interesting tech, could solve some problems in my environment thanks for the walk through!

  • @Dikimkd
    @Dikimkd Před 8 měsíci +1

    Thanks for this, very fun demo and great overall video.

  • @HARPzC
    @HARPzC Před 8 měsíci

    Great Video John! Very interesting. I can see this possibly replacing our Forcepoint Web Filter Agents on our end user devices?!

  • @christianibiri
    @christianibiri Před 8 měsíci

    Awesome video!! lot of useful information!. Thank you!!!

  • @Lenaandyara
    @Lenaandyara Před 8 měsíci

    This is great! Wish it can go to all different browsers such as google chrome and Firefox

    • @NTFAQGuy
      @NTFAQGuy  Před 8 měsíci +4

      This is within the OS. Nothing to do with which browser you are using.

  • @antaskew7079
    @antaskew7079 Před 7 měsíci

    great content as always John, qq..does the 65000 weighted profile trump all/any other policy (possibly conflicting) setting ?
    thanks in advance and happy new year !

    • @NTFAQGuy
      @NTFAQGuy  Před 7 měsíci +3

      no its the lowest possible priority as I said in the video. Anything else overrides it.

  • @brandonhough4623
    @brandonhough4623 Před 5 měsíci

    This is wonderful, however this breaks internal applications causing a DNS issues that I am still trying to determine how to fix this.

  • @adelettouati4820
    @adelettouati4820 Před 8 měsíci

    ***Merci beaucoup*** Thanks John ***

  • @AzureCloudCowboy
    @AzureCloudCowboy Před 8 měsíci

    Thanks John

  • @cma9br
    @cma9br Před 8 měsíci

    Very clear! Thx

  • @ArchitectinginAzure
    @ArchitectinginAzure Před 7 měsíci

    Thanks for another great demo. I am assuming we can add block all rule to priority 6500 security profile to block any traffic that is outside the explicit rules.

    • @NTFAQGuy
      @NTFAQGuy  Před 7 měsíci +2

      Can add whatever you want but be careful you don't block things needed for authentication etc to function :-) You can easily break things if too agressive.

    • @ArchitectinginAzure
      @ArchitectinginAzure Před 7 měsíci

      @@NTFAQGuy I was thinking more along the lines of traditional firewall rules where we explicitly allow traffic and then block everything else via default deny all rule in the end. I will look for the documentation on traffic/ports/rules needed for authentication.

    • @NTFAQGuy
      @NTFAQGuy  Před 7 měsíci +1

      Remember most firewalls are stateful so a response to an outbound works. Here you are blocking access to sites hence you need to give a lot more consideration.

  • @user-vs4hz5ss2j
    @user-vs4hz5ss2j Před 8 měsíci +1

    Signing out of the agent gives unfiltered internet access? I assume sign out capability will be restricted for standard users?

    • @NTFAQGuy
      @NTFAQGuy  Před 8 měsíci +6

      Right, roadmap item.

    • @butztanx
      @butztanx Před 23 dny

      At time of me writing this, the "Sign in as another user" option doesn't exist for me.

  • @chaminda512
    @chaminda512 Před 8 měsíci

    Thank you!

  • @CGRealStudios
    @CGRealStudios Před 8 měsíci

    This is really interesting, can this be used to access Azure SQL databases? We have an issue at our company where we need to VPN to our office to access SQL databases and this causes performance issues

    • @NTFAQGuy
      @NTFAQGuy  Před 8 měsíci +4

      you are mixing up internet and private access.

  • @unfriendm3
    @unfriendm3 Před 8 měsíci

    Huge news!

  • @rob805
    @rob805 Před 8 měsíci

    I guess authentication to Entra is required for the whole thing to work then. Shame we still authenticate to on-premise DCs

  • @OffTheBucketList
    @OffTheBucketList Před 8 měsíci

    How the machine is going to recover if the global admin accidently applied Entra ID Conditional Access Policy with Block control? Because now local client is set up to Block Internet Access app.

    • @NTFAQGuy
      @NTFAQGuy  Před 8 měsíci +1

      Well you saw me undo it in the demo.

    • @OffTheBucketList
      @OffTheBucketList Před 8 měsíci

      @@NTFAQGuy thanks for prompt response and covering this issue, asked my question too fast :) still watching.

    • @OffTheBucketList
      @OffTheBucketList Před 8 měsíci

      So in case the user got accidently blocked by Entra ID CA policy, all need to be done is to sign out and GA to fix Entra ID CA applied to Internet access

  • @night777777
    @night777777 Před 8 měsíci +4

    Feels like OpenDNS 18 years after?

    • @krammitman188
      @krammitman188 Před 8 měsíci +3

      OpenDNS only in the sense of traffic filtering. OpenDNS manages filtering on a single IP and can be skirted by users updating their DNS server. This is far more advanced than OpenDNS. This can be used to manage traffic granularly by machine across your entire enterprise.

    • @cartman71847
      @cartman71847 Před 4 měsíci

      it's really web filtering 1.0. back when the internet was flat and single purposed.

  • @noah98parker
    @noah98parker Před 8 měsíci

    Is Entra Edge = Microsoft’s Security Service Edge (SSE) solution ?

    • @NTFAQGuy
      @NTFAQGuy  Před 8 měsíci +2

      Yes, I do mention that in the video.

  • @eliotmansfield
    @eliotmansfield Před 8 měsíci

    surprised it doesn’t issue a ‘sorry/denied’ page

    • @NTFAQGuy
      @NTFAQGuy  Před 8 měsíci +3

      It does if http. You see that in demo. This is not a browser extension so tls is encrypted which means more difficult to inject a message from the OS into a browser page I suspect.

  • @michaelsoutherland3023
    @michaelsoutherland3023 Před 8 měsíci +1

    I was view #1

  • @user-zx6fo4wi6r
    @user-zx6fo4wi6r Před 8 měsíci +1

    This is a great video. I was wondering about the
    If MDE(Defender for Endpoint)'s webfiltering and Entra GSA's webfiltering policies collide, who wins?

    • @NTFAQGuy
      @NTFAQGuy  Před 8 měsíci +3

      Guess would be most restrictive. Think layers of blocking. If any blocks you can’t get to the target.

    • @cartman71847
      @cartman71847 Před 4 měsíci

      That's not the case. Endpoint would have first dibs since it's hooked into the browser. the SSE client doesn't do anything until the edgeSWG has access to the connection.@@NTFAQGuy