Deep Dive on Microsoft Entra Internet Access

  Рет қаралды 31,879

John Savill's Technical Training

John Savill's Technical Training

Күн бұрын

Пікірлер: 55
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Lets dive into the Entra secure web gateway solution, Microsoft Entra Internet Access! Please make sure to read the description for the chapters and key information about this video and others. ⚠ P L E A S E N O T E ⚠ 🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there! 🕰 I don't discuss future content nor take requests for future content so please don't ask 😇 🤔 Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc. 👂 Translate the captions to your native language via the auto-translate feature in settings! kzbin.info/www/bejne/rGbFZmZjhcx4o6s for a demo of using this feature. Thanks for watching! 🤙
@saeednrzadeh4754
@saeednrzadeh4754 5 ай бұрын
I just do not know what we should do without these very easy to understand videos , Microsoft documentation only make sense after watching John's video. I guess these days Microsoft documentation is too much talk and heavy to understand . Thanks John
@butztanx
@butztanx 4 ай бұрын
Listened to a podcast about GSE last week and knew it was going to be something I need to put in place within our business. I searched straight for Jon Savill knowing fine well that this quality content would be available. Another superb video Jon. Thanks as always!
@NTFAQGuy
@NTFAQGuy 4 ай бұрын
Thank you
@Semtx552
@Semtx552 11 ай бұрын
what a successor vid to the first vid on global secure access! thanks so much John!
@christianpetrik7533
@christianpetrik7533 Жыл бұрын
Waited for this. You never disappoint :)
@davidgorman994
@davidgorman994 Жыл бұрын
Very useful. You seem to be using an updated version of the client that I am. The version I used didn't really show if you were connected to the services or not. This is very welcome.
@NeilSearle
@NeilSearle Жыл бұрын
Interesting tech, could solve some problems in my environment thanks for the walk through!
@NTFAQGuy
@NTFAQGuy Жыл бұрын
You bet!
@Dikimkd
@Dikimkd Жыл бұрын
Thanks for this, very fun demo and great overall video.
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Glad you enjoyed it!
@nerdegem
@nerdegem Жыл бұрын
Looks like an interesting challenge to services such as CloudFlare Argo tunnels and Tailscale networks, as well as traditional VPNs with split tunnelling.
@webclanka4490
@webclanka4490 20 күн бұрын
Thanks for the great explanation!
@HARPzC
@HARPzC Жыл бұрын
Great Video John! Very interesting. I can see this possibly replacing our Forcepoint Web Filter Agents on our end user devices?!
@christianibiri
@christianibiri Жыл бұрын
Awesome video!! lot of useful information!. Thank you!!!
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Glad you enjoyed it!
@Lenaandyara
@Lenaandyara Жыл бұрын
This is great! Wish it can go to all different browsers such as google chrome and Firefox
@NTFAQGuy
@NTFAQGuy Жыл бұрын
This is within the OS. Nothing to do with which browser you are using.
@ArchitectinginAzure
@ArchitectinginAzure 11 ай бұрын
Thanks for another great demo. I am assuming we can add block all rule to priority 6500 security profile to block any traffic that is outside the explicit rules.
@NTFAQGuy
@NTFAQGuy 11 ай бұрын
Can add whatever you want but be careful you don't block things needed for authentication etc to function :-) You can easily break things if too agressive.
@ArchitectinginAzure
@ArchitectinginAzure 11 ай бұрын
@@NTFAQGuy I was thinking more along the lines of traditional firewall rules where we explicitly allow traffic and then block everything else via default deny all rule in the end. I will look for the documentation on traffic/ports/rules needed for authentication.
@NTFAQGuy
@NTFAQGuy 11 ай бұрын
Remember most firewalls are stateful so a response to an outbound works. Here you are blocking access to sites hence you need to give a lot more consideration.
@antaskew7079
@antaskew7079 11 ай бұрын
great content as always John, qq..does the 65000 weighted profile trump all/any other policy (possibly conflicting) setting ? thanks in advance and happy new year !
@NTFAQGuy
@NTFAQGuy 11 ай бұрын
no its the lowest possible priority as I said in the video. Anything else overrides it.
@PatrickMPatrickm
@PatrickMPatrickm Жыл бұрын
Signing out of the agent gives unfiltered internet access? I assume sign out capability will be restricted for standard users?
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Right, roadmap item.
@butztanx
@butztanx 4 ай бұрын
At time of me writing this, the "Sign in as another user" option doesn't exist for me.
@CGRealStudios
@CGRealStudios Жыл бұрын
This is really interesting, can this be used to access Azure SQL databases? We have an issue at our company where we need to VPN to our office to access SQL databases and this causes performance issues
@NTFAQGuy
@NTFAQGuy Жыл бұрын
you are mixing up internet and private access.
@그냥-b2e4i
@그냥-b2e4i Жыл бұрын
This is a great video. I was wondering about the If MDE(Defender for Endpoint)'s webfiltering and Entra GSA's webfiltering policies collide, who wins?
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Guess would be most restrictive. Think layers of blocking. If any blocks you can’t get to the target.
@cartman71847
@cartman71847 8 ай бұрын
That's not the case. Endpoint would have first dibs since it's hooked into the browser. the SSE client doesn't do anything until the edgeSWG has access to the connection.@@NTFAQGuy
@ilannknochen
@ilannknochen 4 ай бұрын
Awesome as usual!
@brandonhough4623
@brandonhough4623 9 ай бұрын
This is wonderful, however this breaks internal applications causing a DNS issues that I am still trying to determine how to fix this.
@OffTheBucketList
@OffTheBucketList Жыл бұрын
How the machine is going to recover if the global admin accidently applied Entra ID Conditional Access Policy with Block control? Because now local client is set up to Block Internet Access app.
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Well you saw me undo it in the demo.
@OffTheBucketList
@OffTheBucketList Жыл бұрын
@@NTFAQGuy thanks for prompt response and covering this issue, asked my question too fast :) still watching.
@OffTheBucketList
@OffTheBucketList Жыл бұрын
So in case the user got accidently blocked by Entra ID CA policy, all need to be done is to sign out and GA to fix Entra ID CA applied to Internet access
@noah98parker
@noah98parker Жыл бұрын
Is Entra Edge = Microsoft’s Security Service Edge (SSE) solution ?
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Yes, I do mention that in the video.
@adelettouati4820
@adelettouati4820 Жыл бұрын
***Merci beaucoup*** Thanks John ***
@eliotmansfield
@eliotmansfield Жыл бұрын
surprised it doesn’t issue a ‘sorry/denied’ page
@NTFAQGuy
@NTFAQGuy Жыл бұрын
It does if http. You see that in demo. This is not a browser extension so tls is encrypted which means more difficult to inject a message from the OS into a browser page I suspect.
@rob805
@rob805 Жыл бұрын
I guess authentication to Entra is required for the whole thing to work then. Shame we still authenticate to on-premise DCs
@YannCabaret
@YannCabaret Жыл бұрын
Feels like OpenDNS 18 years after?
@krammitman188
@krammitman188 Жыл бұрын
OpenDNS only in the sense of traffic filtering. OpenDNS manages filtering on a single IP and can be skirted by users updating their DNS server. This is far more advanced than OpenDNS. This can be used to manage traffic granularly by machine across your entire enterprise.
@cartman71847
@cartman71847 8 ай бұрын
it's really web filtering 1.0. back when the internet was flat and single purposed.
@AzureCloudCowboy
@AzureCloudCowboy Жыл бұрын
Thanks John
@cma9br
@cma9br Жыл бұрын
Very clear! Thx
@NTFAQGuy
@NTFAQGuy Жыл бұрын
You're welcome!
@chaminda512
@chaminda512 Жыл бұрын
Thank you!
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Welcome!
@unfriendm3
@unfriendm3 Жыл бұрын
Huge news!
@michaelsoutherland3023
@michaelsoutherland3023 Жыл бұрын
I was view #1
@NTFAQGuy
@NTFAQGuy Жыл бұрын
ROFL. Congrats
Deep Dive on Microsoft Entra Private Access
1:01:08
John Savill's Technical Training
Рет қаралды 46 М.
Microsoft Azure Managed Identity Deep Dive
48:40
John Savill's Technical Training
Рет қаралды 90 М.
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 148 МЛН
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
Session Vs JWT: The Differences You May Not Know!
7:00
ByteByteGo
Рет қаралды 291 М.
Protecting Against Credential and Token Theft
52:32
John Savill's Technical Training
Рет қаралды 23 М.
Identity Governance with Microsoft Entra ID Governance
1:17:10
Formula5
Рет қаралды 2,1 М.
10 Mistakes that a Microsoft 365 Admin Must NEVER Make!
33:06
Andy Malone MVP
Рет қаралды 47 М.
Azure AD App Proxy Deep Dive
51:58
John Savill's Technical Training
Рет қаралды 35 М.
Goodbye VPN! Hello Microsoft Global Secure Access
19:40
Andy Malone MVP
Рет қаралды 160 М.
Microsoft Entra Security Service Edge Overview
1:05:58
John Savill's Technical Training
Рет қаралды 23 М.
Active Directory Access with Microsoft Entra Private Access
21:52
John Savill's Technical Training
Рет қаралды 26 М.
OAuth 2.0 and OpenID Connect (in plain English)
1:02:17
OktaDev
Рет қаралды 1,8 МЛН
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН