Strengthening secure access to Microsoft 365: Microsoft Entra Global Secure Access provides encrypted access to Microsoft 365 services such as Exchange Online and SharePoint Online through the Microsoft traffic profile. All data traffic is routed through protected network paths, ensuring reliable protection against unauthorized access.

By combining access policies with network-based security mechanisms, Global Secure Access effectively mitigates attack vectors such as token theft and replay attacks. At the same time, this architecture supports compliance with regulatory requirements and organization-specific security standards.

In this article, you will learn how to configure the Microsoft traffic profile to enforce exclusive access to Microsoft 365 services through Global Secure Access.

Prerequisites and Licensing

Licensing

The Microsoft traffic profile in Microsoft Entra Global Secure Access requires the following license:

  • Microsoft Entra ID P1 or higher

An overview of Microsoft licensing plans and their associated features is available at https://m365maps.com/.

Devices

The following requirements apply to devices:

  • Operating System: Windows 10Windows 11 or Android
  • iOS and MacOS: Available in preview
  • Windows devices must be Microsoft Entra joined or Microsoft Entra hybrid joined. Microsoft Entra registered devices are not supported.

Roles Based on the Principle of Least Privilege

Microsoft Entra Global Secure Access can be configured and managed using the following Microsoft Entra roles.

RolePermission
Global Secure Access AdministratorConfigure and manage Microsoft Entra Global Secure Access
Conditional Access AdministratorConfigure and manage Microsoft Entra Conditional Access
Application AdministratorAdd or remove users from traffic profiles (in combination with the Global Secure Access Administrator role)

Microsoft Entra Global Secure Access: Configuring Traffic Forwarding

Enabling Microsoft Traffic Profile

Microsoft Entra Global Secure Access is enabled in the Microsoft Entra admin center at (https://entra.microsoft.com).

Enable the Microsoft traffic profile under Global Secure Access > Connect > Traffic forwarding.

Microsoft Entra Global Secure Access Traffic Forwarding

Enable or disable Microsoft traffic policies.
By default, traffic from the following applications is included:

  • Exchange Online
  • Skype for Business and Microsoft Teams
  • SharePoint Online and OneDrive for Business
  • Microsoft 365 Common and Office Online
Microsoft Entra Global Secure Access Microsoft Access Profile

If needed, traffic for each application can be managed granularly. To do so, expand the desired application:

Microsoft Entra Global Secure Access Policies & Rules

Assign Users and groups.
You can choose to assign all users (1), individual users or groups (2).
This action requires both the Global Secure Access Administrator and Application Administrator roles.

Microsoft Entra Global Secure Access User and Group Assignments

The Microsoft traffic profile is now configured.

Microsoft Entra Global Secure Access Microsoft Traffic Profile

Enable Adaptive Access

With Adaptive Access enabled, Conditional Access Signaling(CA Signaling) from Global Secure Access traffic can be processed in Microsoft Entra Conditional Access.

Navigate to Global Secure Access > Settings > Session management > Adaptive Access and enable Enable CA Signaling for Entra ID (covering all cloud apps).

Microsoft Entra Global Secure Access Session Management

Configuring Microsoft Entra Conditional Access for Microsoft 365 with Entra Global Secure Access

Conditional Access in Microsoft Entra ensures that access to Microsoft 365 services such as Exchange Online, SharePoint Online and Microsoft Teams is only possible through Global Secure Access.

Navigate to Microsoft Entra admin center (https://entra.microsoft.com) > Protection > Conditional Access > Create new policy

Microsoft Entra Conditional Access Overview

Assign a Name to the Microsoft Entra Conditional Access policy.
Naming conventions are outlined in the following documentation: Plan a Microsoft Entra Conditional Access deployment – Microsoft Entra ID | Microsoft Learn

Microsoft Entra Conditional Access Name

Select the Users to whom this policy will apply.
Be sure to exclude emergency access accounts.

Microsoft Entra Conditional Access Users

Select all Target resources that are routed through Global Secure Access as defined in the Microsoft 365 traffic profile, such as Exchange Online or Sharepoint Online.

Microsoft Entra Conditional Access Target Resources

Select Network and include Any network or location.

Microsoft Entra Conditional Access Network Include

Also under Network, exclude All Compliant Network Locations.
Traffic routed through the Global Secure Access network is considered compliant.

Microsoft Entra Conditional Access Network Exclude

If only specific device platforms, such as Windows or Android, should be included in the policy, this can be configured under Conditions > Device platforms.

Microsoft Entra Conditional Access Conditions Device Platforms

Under Grant, select the option Block access.

Microsoft Entra Conditional Access Grant Block Access

Enable the policy by setting it to On, then select Create to save it.

Microsoft Entra Conditional Access Enable Policy

The policy takes effect immediately and restricts access to the selected resources exclusively through Global Secure Access.

Microsoft Entra Conditional Access Policies

Deploying the Global Secure Access Client for Microsoft 365

The Global Secure Access Client, required for using the Microsoft traffic profile, is available for various operating systems. Deployment of the client software on Windows is described in the post Microsoft Entra Private Access: Onboard Client Software.

Once the Global Secure Access Client is successfully installed, the Microsoft traffic profile is connected.

Microsoft Entra Global Secure Access Client M365 Connected

Functionality Check

If access, such as to https://outlook.com attempted from a device that is not connected through Global Secure Access, the authentication process is interrupted with Error Code 53003 and the following message is displayed:

You cannot access this right now
Your sign-in was successful but does not meet the criteria to access this resource. For example, you might be signing in from a browser, app, or location that is restricted by your admin.

A comprehensive overview of AADSTS error codes and their descriptions is available here: Microsoft Entra authentication & authorization error codes – Microsoft identity platform | Microsoft Learn

Microsoft Entra Conditional Access You cannot access this right now Error Code 53003

If access is made through the Global Secure Access network, https://outlook.com loads as expected.

Microsoft Entra Conditional Access Outlook.com Successfull Sign-In

Troubleshooting

Log and diagnostic capabilities for Global Secure Access are described in more detail in the post Microsoft Entra Internet Access – Troubleshooting


Follow me on LinkedIn and Bluesky to always stay updated on my recent posts.

Was this post helpful to you? Show your enthusiasm with the delightful aroma of a freshly brewed coffee for me!

Buy me a coffee