Threats on the open internet change fast. You don’t want users wandering into phishing kits, malware droppers, or C2 infrastructure. Global Secure Access (GSA) Threat intelligence (preview) adds a safety net: it blocks access to high-severity, known-bad destinations using Microsoft and third-party intel feeds. You wire it up once, scope it with Conditional Access, and watch blocked hits roll into your traffic logs.
I’ll walk through prerequisites, setup, testing, and a few gotchas I’ve learned to avoid.What you’ll need (5-minute checklist)
- Roles: Global Secure Access Administrator for GSA tasks; Conditional Access Administrator to bind the policy to users.
- Licensing: GSA lives under Microsoft Entra Internet Access (part of the Entra Suite or standalone). You also need Entra ID P1/P2.
- Client: Global Secure Access desktop client installed on the test device(s).
- Traffic acquisition basics:
- Disable Secure DNS/DoH on endpoints and browsers or align it to your forwarding rules (DoH can bypass acquisition).
- Prefer IPv4 and block QUIC (UDP/443) to avoid HTTPS bypass via HTTP/3:
- TLS inspection is optional but needed if you want URL indicators evaluated over HTTPS (without it, you match on domains). Ref: TLS Inspection in Microsoft Entra GSA Internet Access – Complete Configuration Guide
The setup at a glance
- Turn on Internet traffic forwarding
- Create the Threat intelligence policy
- (Optional) Add an allow list rule for known business exceptions
- Link it into a Security profile (or use the baseline profile)
- Deliver it with Conditional Access
Step 1 Enable Internet traffic forwarding
In the Microsoft Entra admin center, go to Global Secure Access → Connect → Traffic forwarding → Internet access.Enable it and scope to a pilot group first (use a small test group).
Confirm the GSA client shows the Internet profile is active on the test device.
Step 2 Create the Threat intelligence policy
Go to Global Secure Access → Secure → Threat intelligence policies → Create policy.Step 3 (Optional) Add an allow list rule
If you have a business site that’s mis-flagged, add an allow rule:Open your Threat intelligence policy → Rules → Add rule.
Step 4 Put it in a Security profile (or the Baseline)
A Security profile is the wrapper that groups GSA controls (TLS inspection, web filtering, threat intelligence, etc.). You can attach one TI policy per profile. Control order matters when multiple controls apply:
TLS inspection → 2) Web content filtering → 3) Threat intelligence → 4) File type → 5) DLP → 6) Third-party.Create it:
Global Secure Access → Secure → Security profiles → Create profile.Link → Existing threat intelligence policy → pick the one you created.
Save.
Shortcut: if you want tenant-wide coverage later, you can link TI to the Baseline profile (applies to all users’ traffic). Start with a pilot first.
Step 5 Deliver with Conditional Access
Threat intelligence becomes user/context-aware when you ship it through Conditional Access as a Session control:
Entra ID → Conditional Access → New policy.Assign your pilot group.
Target resources → All internet resources with Global Secure Access.
Session → Use Global Secure Access security profile → select your profile.
Enable = On → Create.
Enforcement of a new security profile can take 60–90 minutes to propagate.
We already configured the CA policy so will use the same for Testing. My Blog How to Configure Microsoft Entra Global Secure Access Internet Access with Web Filtering Policies includes the CA policy creation steps
(Optional) Turn on TLS inspection before testing URLs
If you want the engine to evaluate URL indicators (not just domains) inside HTTPS, enable TLS inspection and deploy the trusted root cert to devices (Intune makes this easy). Do this in a lab/pilot first and validate certificates in the browse
Refer my Blog TLS Inspection in Microsoft Entra GSA Internet Access – Complete Configuration Guide for more details
Test the policy
On a Windows device with the GSA client:Confirm the Internet forwarding profile is active in the client diagnostics.
Troubleshooting cheat sheet
1. Nothing is blocked:
- Is the CA policy assigned to the right users and enabled?
- Did you select “All internet resources with Global Secure Access” and the Session control?
2. Client seems to bypass:
- Check DoH/secure DNS in OS and browsers.
- Block QUIC (UDP/443); confirm browser falls back to TCP
3. HTTPS URLs aren’t matched:
- Turn on TLS inspection and deploy the root cert to devices.
- Give it up to 5 minutes. Verify Diagnostic settings if exporting to LAW.
5. False positive:
- Add a narrow allow rule for that FQDN and report it as a false positive per Microsoft’s process.
0 Comments