Microsoft 365,  Microsoft Azure

Microsoft Entra Global Secure Access Troubleshooting Guide

Microsoft Entra Global Secure Access (GSA) enables secure access to Microsoft 365 services, internet resources, and private applications through a unified endpoint client combined with centrally managed configuration.

Issues in Microsoft Entra Global Secure Access can originate at multiple layers, including the client, traffic forwarding profile processing, name resolution, proxy configurations, or the interaction with authentication and Microsoft Entra Conditional Access. Effective Microsoft Entra Global Secure Access Troubleshooting therefore requires a structured approach to root cause analysis. This article outlines relevant troubleshooting steps on the client side and within the Microsoft Entra admin center, and explains how to systematically identify and resolve issues. Insights gained from real world deployments are continuously incorporated into this article.

Client-Side Troubleshooting

Basic Client Functionality Check

Check Client Status

Check the taskbar icon status: The icon reflects the current state of the Microsoft Entra Global Secure Access (GSA) client. Under normal conditions, it displays a green status indicator and shows the status Connected when hovered over.

If the icon appears grey or shows Disabled by your organization:

Ensure DNS Functionality

The Microsoft Entra Global Secure Access (GSA) client uses the DNS servers configured on the Windows network adapter for name resolution. Reliable DNS resolution is a prerequisite for the client to correctly identify and process FQDN based traffic.

nslookup microsoft.com
nslookup graph.microsoft.com

If name resolution fails, verify the following:

  • Ensure the configured DNS server is reachable (for example, ping <DNS-Server-IP>)
  • Verify that port 53 (UDP) to the DNS server is not blocked by a firewall

Check Services

The Global Secure Access Client Manager Service, Global Secure Access Engine Service, Global Secure Access Forwarding Profile Service, and Global Secure Access Tunneling Service must be in a Running state. The status can be verified using the command prompt:

sc query GlobalSecureAccessClientManagerService
sc query GlobalSecureAccessEngineService
sc query GlobalSecureAccessForwardingProfileService
sc query GlobalSecureAccessTunnelingService

Each service must return the status STATE: 4 RUNNING. If a service is stopped, it can be restarted using the Services console (services.msc). If a service fails to start, review the corresponding events in Event Viewer > Windows Logs > System.

Network Connectivity to Microsoft Entra Global Secure Access Endpoints

EndpointPurpose
login.microsoftonline.comMicrosoft Entra ID authentication
graph.microsoft.comDownload traffic forwarding profiles
*.globalsecureaccess.microsoft.comGSA Service Edge
*.edgediagnostic.globalsecureaccess.microsoft.comDiagnostic endpoints for traffic forwarding profiles

Test connectivity (PowerShell):

Test-NetConnection -ComputerName "login.microsoftonline.com" -Port 443
Test-NetConnection -ComputerName "graph.microsoft.com" -Port 443

Test diagnostic endpoints for Microsoft 365 and Private Access (PowerShell):

Invoke-WebRequest https://m365.edgediagnostic.globalsecureaccess.microsoft.com:6543/connectivitytest/ping
Invoke-WebRequest https://private.edgediagnostic.globalsecureaccess.microsoft.com:6543/connectivitytest/ping

If TcpTestSucceeded: False is returned or access to the diagnostic endpoints fails, verify the following:

  • Verify that no firewall is blocking outbound traffic (TCP 443 or port 6543) to the endpoints
  • Check whether TLS inspection is enabled
    Connections to the Microsoft Entra Global Secure Access endpoints must not be decrypted or modified
  • Verify whether a proxy is configured
    The Microsoft Entra Global Secure Access (GSA) client does not support outbound proxies
  • Ensure that the diagnostic endpoints are not blocked by network filters or web gateways

The Microsoft Entra Global Secure Access service uses Anycast networking. As a result, no static IP addresses are assigned per region, and restricting access to specific IP addresses or regions is not supported. Firewall rules must therefore allow the global Anycast IP ranges. The current ranges are documented in Microsoft Learn under Global Secure Access points of presence and IP addresses – Global Secure Access | Microsoft Learn

Verify Traffic Forwarding Profiles

Microsoft Entra Global Secure Access (GSA) uses three traffic forwarding profiles that define which network traffic is routed through the tunnel:

ProfilePurpose
Microsoft 365Exchange Online, SharePoint Online, and other Microsoft 365 services
Private AccessAccess to internal applications and resources
Internet AccessGeneral internet traffic and web content filtering

The Microsoft Entra Global Secure Access (GSA) client stores the traffic forwarding profiles as JSON entries in the Windows Registry and retrieves them via Microsoft Graph.

The registry key ForwardingProfileTimestamp indicates when the profile was last updated by the service (UTC). This allows verification of whether changes to Microsoft Entra Global Secure Access profiles have already been applied on the client. After a change, it can take up to one hour for the client to apply the updated profile.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Global Secure Access Client\ForwardingProfile

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Global Secure Access Client\ForwardingProfileTimestamp

Alternatively, the status can be verified directly in the Microsoft Entra Global Secure Access (GSA) client:
Microsoft Entra Global Secure Access Client > right click the taskbar icon > Advanced Diagnostics > Overview
The Forwarding profile last checked field indicates when the client last queried the service (UTC).

If no traffic forwarding profile is available or the timestamp is outdated, verify the following:

  • Ensure network connectivity to Microsoft Graph
  • Verify profile assignment to users:
    Microsoft Entra admin center > Global Secure Access > Connect > Traffic forwarding
  • Users must be direct members of the assigned group, nested group memberships are not supported
  • Manually reload the traffic forwarding profiles:
    Delete the ForwardingProfileTimestamp registry key and restart the GlobalSecureAccessForwardingProfileService service

Device Status and Primary Refresh Token (PRT)

The device must be Microsoft Entra joined or Microsoft Entra hybrid joined. This is a prerequisite for using Microsoft Entra Global Secure Access. Scenarios with Microsoft Entra registered devices (BYOD) are supported for Microsoft Entra Private Access in public preview. Further details are available in the following article: Microsoft Entra Private Access BYOD: Access Internal Resources with Entra Registered Devices – cloudcoffee.ch

Check device status and Primary Refresh Token (PRT):

dsregcmd.exe /status

Relevant fields in the output:

AttributeExpected valueMeaning
AzureAdJoinedYesDevice is Microsoft Entra joined
DomainJoinedYes (for hybrid)Device is Microsoft Entra hybrid joined
AzureAdPrtYesPrimary Refresh Token is present
TenantIdTenant GUIDIndicates the connected tenant

If AzureAdPrt: NO is shown, no valid Primary Refresh Token (PRT) is present and the Microsoft Entra Global Secure Access (GSA) client cannot authenticate. Typical causes include an improperly joined device, missing network connectivity to Microsoft Entra authentication endpoints, or Microsoft Entra Conditional Access policies blocking the sign in.

Check Proxy Configuration

If a proxy is configured, the Microsoft Entra Global Secure Access endpoints must be defined as exceptions. The required endpoints and IP ranges are documented in the following Microsoft Learn article: Global Secure Access points of presence and IP addresses – Global Secure Access | Microsoft Learn

Check proxy configuration:

netsh winhttp show proxy

Advanced Diagnostics Tools

The Microsoft Entra Global Secure Access (GSA) client includes Advanced Diagnostics, an integrated analysis environment. It enables validation of connectivity, policy processing, DNS behavior, and actual network traffic directly on the client. The tool can be accessed via the Microsoft Entra Global Secure Access client icon in the taskbar:

Microsoft Entra Global Secure Access Client > Right-click on the icon in the taskbar > Advanced Diagnostics

The following sections describe the tool’s capabilities and how they are used for troubleshooting.

Health Check

The Health Check in Advanced Diagnostics performs automated validation of connectivity and overall functionality of the Microsoft Entra Global Secure Access (GSA) client. Some checks are interdependent, so issues should be addressed in sequence. Always resolve the first detected error before rerunning the evaluation using Refresh.

Forwarding Profile

The Forwarding profile tab displays all active rules of the Microsoft Entra Global Secure Access (GSA) client, grouped by the traffic forwarding profiles Microsoft 365, Private Access, and Internet Access.

Each rule includes the destination (IP address or FQDN), protocol, port, and the applied action (Tunnel or Bypass).

The Policy tester can be used to determine which rule applies to a specific destination. After entering a target (FQDN or IP address), the client indicates whether the traffic is tunneled or routed directly.

Use Refresh details to update the displayed data from the client cache if the traffic forwarding profile has changed since the last refresh.

Hostname Acquisition

The Hostname acquisition tab provides real time visibility into which FQDNs are captured by the Microsoft Entra Global Secure Access (GSA) client. This is based on the FQDN rules defined in the traffic forwarding profiles.

  • Select Start collecting
  • Trigger the desired behavior or scenario
  • Select Stop

For each captured hostname, the following information is displayed:

  • Timestamp: Time of capture
  • FQDN: Requested hostname
  • Generated IP address: Internally generated IP address
  • Acquired (Yes/No): Indicates whether the hostname was matched by a rule in the traffic forwarding profile
  • Original IP address: Original IPv4 address returned by DNS

Traffic

The Traffic tab provides real time visibility into established connections and how they are processed.

For analysis, data collection can be started and a specific scenario can be reproduced:

  • Apply filters to the traffic as needed
  • Select Start collecting
  • Trigger the desired behavior
  • Select Stop

For each connection, the following information is available:

  • Timestamp: Time of the connection
  • Connection status: Current state of the connection
  • Protocol: Protocol used (TCP/UDP)
  • Destination FQDN / IP: Target address of the connection
  • Destination port: Target port
  • Correlation vector ID: Unique identifier for end to end traceability

The collected data can be exported as a CSV file for further analysis.

Advanced Log Collection

Advanced Log Collection enables the capture of detailed diagnostic data from the Microsoft Entra Global Secure Access (GSA) client. The collected data is used to analyse complex scenarios and can support further investigation or escalation to support.

Procedure:

  • Select Start recording
  • Reproduce the issue or wait for it to occur again
  • Select Stop recording

The recorded data is saved as a ZIP file under: C:\Program Files\Global Secure Access Client\Logs.
The contents of the ZIP file are described in the following Microsoft Learn article: Troubleshoot the Global Secure Access Client for Windows: Advanced Diagnostics – Global Secure Access | Microsoft Learn

Typical contents of the ZIP file:

  • GSA specific ETL logs
  • Output of dsregcmd /status
  • JSON policy data
  • NRPT table and latency test results
  • System information
  • DNS client logs
  • Installed applications and IP configuration
  • Network capture
  • Health Check results

Analyze Event Viewer

Windows Event Viewer provides detailed logs for the Microsoft Entra Global Secure Access (GSA) client. The logs are available under the following path:

Event Viewer > Applications and Services Logs > Microsoft > Windows > Global Secure Access Client

Two log types are available:

  • Operational: Client-side events such as connection failures, authentication issues, and status changes
  • Kernel: Events generated by the kernel mode driver

TraceRT Analysis on the Client

Starting with version 2.24.117, the Microsoft Entra Global Secure Access (GSA) client includes a built-in traceroute tool for analysing network paths and latency. In addition to standard hop analysis, it identifies the latency bottleneck (RTT bottleneck) and the Global Secure Access Edge location (PoP location) used.
Location: C:\Program Files\Global Secure Access Client\GSATracert\GsaTracert.exe

The tool supports the following parameters:

  • –app-id: Tests a specific Microsoft Entra Private Access application using its Application ID
  • –host: Target system specified as hostname or IP address, including an optional port
  • –count: Number of iterations (1 to 10)
  • –log: Output path for the log file
  • –preview-speedtest: Enables an experimental throughput measurement between the client and the service edge

Troubleshooting in the Microsoft Entra Admin Center

Traffic Logs

Traffic logs provide visibility into network traffic processed by the Microsoft Entra Global Secure Access (GSA) service. They support connection analysis and provide insights into how requests are handled by the service.

Microsoft Entra admin center (https://entra.microsoft.com) > Global Secure Access > Monitor > Traffic logs

Authentication and Conditional Access

Microsoft Entra sign-in logs enable analysis of authentication events. They provide detailed information on successful and failed sign-ins, as well as insights into the evaluation of Microsoft Entra Conditional Access policies.

The sign-in logs are available in the Microsoft Entra admin center (https://entra.microsoft.com) > Entra ID > Monitoring and health > Sign-in logs:

Network Compliance for Conditional Access

To ensure that traffic routed through Microsoft Entra Global Secure Access is recognized as a Compliant Network in Microsoft Entra Conditional Access policies, Conditional Access signaling must be enabled.

Microsoft Entra admin center (https://entra.microsoft.com) > Global Secure Access > Settings > Session management > Adaptive Access > Enable Conditional Access signaling for Microsoft Entra ID

Conclusion

Microsoft Entra Global Secure Access provides diagnostic capabilities for targeted analysis of unexpected behavior. Common causes include unreachable endpoints, inconsistent traffic forwarding profiles, authentication issues, and misconfigured proxy settings. Advanced Diagnostics, along with traffic logs and sign-in logs in the Microsoft Entra admin center, provide the necessary data to systematically identify root causes.