Skip to content

Commit 61ce3a3

Browse files
author
Jill Grant
authored
Merge pull request #250814 from MicrosoftGuyJFlo/GlobalSecureAccessBrandingUpdates
[Microsoft Entra] Global Secure Access branding updates
2 parents cf71dcf + 6400218 commit 61ce3a3

23 files changed

+79
-78
lines changed

articles/global-secure-access/concept-global-secure-access-logs-monitoring.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,4 +44,4 @@ For more information, see [Enriched Office 365 logs](how-to-view-enriched-logs.m
4444

4545
## Next steps
4646

47-
- [Learn how to access, store, and analyze Azure AD activity logs](/azure/active-directory/reports-monitoring/howto-access-activity-logs)
47+
- [Learn how to access, store, and analyze activity logs](/azure/active-directory/reports-monitoring/howto-access-activity-logs)

articles/global-secure-access/concept-traffic-dashboard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,8 @@ Viewing the Global Secure Access dashboard requires a Reports Reader role in Mic
2727

2828
To access the dashboard:
2929

30-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
31-
1. Go to **Global Secure Access (preview)** > **Dashboard**.
30+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
31+
1. Browse to **Global Secure Access (preview)** > **Dashboard**.
3232

3333
:::image type="content" source="media/concept-traffic-dashboard/traffic-dashboard.png" alt-text="Screenshot of the Private access profile, with the view applications link highlighted." lightbox="media/concept-traffic-dashboard/traffic-dashboard-expanded.png":::
3434

articles/global-secure-access/how-to-access-audit-logs.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,15 @@ There are several ways to view the audit logs. For more information on the optio
3232

3333
### Access audit logs from the Microsoft Entra admin center
3434

35-
You can access the audit logs from **Global Secure Access** and from **Microsoft Entra ID Monitoring and health**.
35+
You can access the audit logs from **Global Secure Access** and from **Microsoft Entra ID Monitoring & health**.
3636

3737
**From Global Secure Access:**
38-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home) using one of the required roles.
39-
1. Go to **Global Secure Access** > **Audit logs**. The filters are pre-populated with the categories and activities related to Global Secure Access.
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) using one of the required roles.
39+
1. Browse to **Global Secure Access (preview)** > **Audit logs**. The filters are pre-populated with the categories and activities related to Global Secure Access.
4040

41-
**From Microsoft Entra ID Monitoring and health:**
42-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home) using one of the required roles.
43-
1. Go to **Identity** > **Monitoring and health** > **Audit logs**.
41+
**From Microsoft Entra ID Monitoring & health:**
42+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) using one of the required roles.
43+
1. Browse to **Identity** > **Monitoring & health** > **Audit logs**.
4444
1. Select the **Date** range you want to query.
4545
1. Open the **Service** filter, select **Global Secure Access**, and select the **Apply** button.
4646
1. Open the **Category** filter, select at least one of the available options, and select the **Apply** button.

articles/global-secure-access/how-to-assign-traffic-profile-to-remote-network.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,8 @@ To assign a remote network to a traffic forwarding profile to, you must have:
3333

3434
## Assign the Microsoft 365 traffic profile to a remote network
3535

36-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference).
37-
1. Go to **Global Secure Access (preview)** > **Devices** > **Remote network**.
36+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
37+
1. Browse to **Global Secure Access (preview)** > **Devices** > **Remote network**.
3838
1. Select a remote network.
3939
1. Select **Traffic profiles**.
4040
1. Select (or unselect) the checkbox for **Microsoft 365 traffic forwarding profile**.
@@ -44,7 +44,7 @@ To assign a remote network to a traffic forwarding profile to, you must have:
4444

4545
## Assign a remote network to the Microsoft 365 traffic forwarding profile
4646

47-
1. Go to **Global Secure Access** > **Connect** > **Traffic forwarding**.
47+
1. Browse to **Global Secure Access (preview)** > **Connect** > **Traffic forwarding**.
4848
1. Select the **Add/edit assignments** button for **Microsoft 365 traffic profile**.
4949

5050
![Screenshot of the add/edit assignment button on the Microsoft 365 traffic profile.](media/how-to-assign-traffic-profile-to-remote-network/microsoft-365-traffic-profile-remote-network-button.png)

articles/global-secure-access/how-to-compliant-network.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@ The compliant network is different than [IPv4, IPv6, or geographic locations](/a
4242

4343
To enable the required setting to allow the compliant network check, an administrator must take the following steps.
4444

45-
1. Sign in to the **Microsoft Entra admin center** as a Global Secure Access Administrator.
45+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
46+
1. Browse to **Global Secure Access (Preview)** > **Global settings** > **Session management** **Adaptive access**.
4647
1. Select the toggle to **Enable Global Secure Access signaling in Conditional Access**.
4748
1. Browse to **Microsoft Entra ID Conditional Access** > **Named locations**.
4849
1. Confirm you have a location called **All Compliant Network locations** with location type **Network Access**. Organizations can optionally mark this location as trusted.
@@ -56,8 +57,8 @@ To enable the required setting to allow the compliant network check, an administ
5657

5758
The following example shows a Conditional Access policy that requires Exchange Online and SharePoint Online to be accessed from behind a compliant network as part of the preview.
5859

59-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** as a Conditional Access Administrator or Security Administrator.
60-
1. Browse to **Microsoft Entra ID** > **Protection** > **Conditional Access**.
60+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/azure/active-directory/roles/permissions-reference#conditional-access-administrator).
61+
1. Browse to **Protection** > **Conditional Access**.
6162
1. Select **Create new policy**.
6263
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
6364
1. Under **Assignments**, select **Users or workload identities**.

articles/global-secure-access/how-to-configure-connectors.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -79,10 +79,10 @@ To use Private Access, install a connector on each Windows server you're using f
7979

8080
**To install the connector**:
8181

82-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** as a Global Administrator of the directory that uses Application Proxy.
82+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global Administrator of the directory that uses Application Proxy.
8383
- For example, if the tenant domain is contoso.com, the admin should be [email protected] or any other admin alias on that domain.
8484
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
85-
1. Go to **Global Secure Access (Preview)** > **Connect** > **Connectors**.
85+
1. Browse to **Global Secure Access (preview)** > **Connect** > **Connectors**.
8686
1. Select **Download connector service**.
8787

8888
![Screenshot of the Download connector service button in the App proxy page.](media/how-to-configure-connectors/app-proxy-download-connector-service.png)
@@ -107,8 +107,8 @@ You can use the Global Secure Access portal or your Windows server to confirm th
107107

108108
To confirm the connector installed and registered correctly:
109109

110-
1. Sign in to your tenant directory in the Microsoft Entra admin center.
111-
1. Go to **Global Secure Access (Preview)** > **Connect** > **Connectors**
110+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a Global Administrator of the directory that uses Application Proxy.
111+
1. Browse to **Global Secure Access (preview)** > **Connect** > **Connectors**
112112
- All of your connectors and connector groups appear on this page.
113113
1. View a connector to verify its details.
114114
- Expand the connector to view the details if it's not already expanded.
@@ -135,7 +135,7 @@ To confirm the connector installed and registered correctly:
135135

136136
To create as many connector groups as you want:
137137

138-
1. Go to **Global Secure Access (Preview)** > **Connect** > **Connectors**.
138+
1. Browse to **Global Secure Access (preview)** > **Connect** > **Connectors**.
139139
1. Select **New connector group**.
140140
1. Give your new connector group a name, then use the dropdown menu to select which connectors belong in this group.
141141
1. Select **Save**.

articles/global-secure-access/how-to-configure-per-app-access.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To configure a Global Secure Access app, you must have:
2626
To manage App Proxy connector groups, which is required for Global Secure Access apps, you must have:
2727

2828
- An **Application Administrator** role in Microsoft Entra ID
29-
- An Azure AD Premium P1/P2 license
29+
- Microsoft Entra P1 or P2 licenses
3030

3131
### Known limitations
3232

@@ -66,8 +66,8 @@ To create a new app, you provide a name, select a connector group, and then add
6666

6767
### Choose name and connector group
6868

69-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** with the appropriate roles.
70-
1. Go to **Global Secure Access (preview)** > **Applications** > **Enterprise applications**.
69+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) with the appropriate roles.
70+
1. Browse to **Global Secure Access (preview)** > **Applications** > **Enterprise applications**.
7171
1. Select **New application**.
7272

7373
![Screenshot of the Enterprise apps and Add new application button.](media/how-to-configure-per-app-access/new-enterprise-app.png)
@@ -83,8 +83,8 @@ The **Add application segment** process is where you define the FQDNs and IP add
8383

8484
You can add fully qualified domain names (FQDN), IP addresses, and IP address ranges.
8585

86-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)**.
87-
1. Go to **Global Secure Access** > **Applications** > **Enterprise applications**.
86+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
87+
1. Browse to **Global Secure Access (preview)** > **Applications** > **Enterprise applications**.
8888
1. Select **New application**.
8989
1. Select **Add application segment**.
9090

@@ -115,8 +115,8 @@ You can add fully qualified domain names (FQDN), IP addresses, and IP address ra
115115

116116
You need to grant access to the app you created by assigning users and/or groups to the app. For more information, see [Assign users and groups to an application.](/azure/active-directory/manage-apps/assign-user-or-group-access-portal)
117117

118-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)**.
119-
1. Go to **Global Secure Access** > **Applications** > **Enterprise applications**.
118+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
119+
1. Browse to **Global Secure Access (preview)** > **Applications** > **Enterprise applications**.
120120
1. Search for and select your application.
121121
1. Select **Users and groups** from the side menu.
122122
1. Add users and groups as needed.
@@ -128,8 +128,8 @@ You need to grant access to the app you created by assigning users and/or groups
128128

129129
You can add or update the FQDNs and IP addresses included in your app at any time.
130130

131-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)**.
132-
1. Go to **Global Secure Access** > **Applications** > **Enterprise applications**.
131+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
132+
1. Browse to **Global Secure Access (preview)** > **Applications** > **Enterprise applications**.
133133
1. Search for and select your application.
134134
1. Select **Network access properties** from the side menu.
135135
- To add a new FQDN or IP address, select **Add application segment**.
@@ -146,16 +146,16 @@ You can enable or disable access to the Global Secure Access app using the Globa
146146
Conditional Access policies for Per-app Access are configured at the application level for each app. Conditional Access policies can be created and applied to the application from two places:
147147

148148
- Go to **Global Secure Access (preview)** > **Applications** > **Enterprise applications**. Select an application and then select **Conditional Access** from the side menu.
149-
- Go to **Microsoft Entra ID** > **Protection** > **Conditional Access** > **Policies**. Select **+ Create new policy**.
149+
- Go to **Protection** > **Conditional Access** > **Policies**. Select **+ Create new policy**.
150150

151151
For more information, see [Apply Conditional Access policies to Private Access apps](how-to-target-resource-private-access-apps.md).
152152

153153
## Enable Microsoft Entra Private Access
154154

155155
Once you have your app configured, your private resources added, users assigned to the app, you can enable the Private access traffic forwarding profile. You can enable the profile before configuring a Global Secure Access app, but without the app and profile configured, there's no traffic to forward.
156156

157-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)**.
158-
1. Go to **Global Secure Access** > **Connect** > **Traffic forwarding**.
157+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
158+
1. Browse to **Global Secure Access (preview)** > **Connect** > **Traffic forwarding**.
159159
1. Select the checkbox for **Private access profile**.
160160

161161
![Screenshot of the traffic forwarding page with the Private access profile enabled.](media/how-to-configure-per-app-access/private-access-traffic-profile.png)

articles/global-secure-access/how-to-configure-quick-access.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ To configure Quick Access, you must have:
2525
To manage App Proxy connector groups, which is required for Quick Access, you must have:
2626

2727
- An **Application Administrator** role in Microsoft Entra ID
28-
- An Azure AD Premium P1/P2 license
28+
- Microsoft Entra P1 or P2 licenses
2929

3030
### Known limitations
3131

@@ -67,8 +67,8 @@ On the Quick Access page, you provide a name for the Quick Access app, select a
6767

6868
### Name and connector group
6969

70-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** with the appropriate roles.
71-
1. Go to **Global Secure Access (preview)** > **Applications** > **Quick access**.
70+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) with the appropriate roles.
71+
1. Browse to **Global Secure Access (preview)** > **Applications** > **Quick access**.
7272
1. Enter a name. *We recommend using the name Quick Access*.
7373
1. Select a Connector group from the dropdown menu.
7474

@@ -83,8 +83,8 @@ The **Add Quick Access application segment** portion of this process is where yo
8383

8484
You can add fully qualified domain names (FQDN), IP addresses, and IP address ranges.
8585

86-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)**.
87-
1. Go to **Global Secure Access** > **Applications** > **Quick Access**.
86+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
87+
1. Browse to **Global Secure Access (preview)** > **Applications** > **Quick Access**.
8888
1. Select **Add Quick Access application segment**.
8989

9090
![Screenshot of the Add Quick Access application segment button.](media/how-to-configure-quick-access/add-quick-access-application-segment.png)
@@ -134,8 +134,8 @@ You can view the properties from **Quick Access** or navigate to **Enterprise ap
134134

135135
You can add or update the FQDNs and IP addresses included in your Quick Access app at any time.
136136

137-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)**.
138-
1. Go to **Global Secure Access** > **Applications** > **Quick Access**.
137+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
138+
1. Browse to **Global Secure Access (preview)** > **Applications** > **Quick Access**.
139139
- To add an FQDN or IP address, select **Add Quick Access application segment**.
140140
- To edit an FQDN or IP address, select it from the **Destination type** column.
141141

@@ -149,8 +149,8 @@ Creating a Conditional Access policy is covered in detail in [How to create a Co
149149

150150
Once you have your Quick Access app configured, your private resources added, users assigned to the app, you can enable the Private access profile from the **Traffic forwarding** area of Global Secure Access. You can enable the profile before configuring Quick Access, but without the app and profile configured, there's no traffic to forward.
151151

152-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)**.
153-
1. Go to **Global Secure Access** > **Connect** > **Traffic forwarding**.
152+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
153+
1. Browse to **Global Secure Access (preview)** > **Connect** > **Traffic forwarding**.
154154
1. Select the checkbox for **Private access profile**.
155155

156156
![Screenshot of the traffic forwarding page with the Private access profile enabled.](media/how-to-configure-quick-access/private-access-traffic-profile.png)

articles/global-secure-access/how-to-create-remote-networks.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,8 @@ To configure remote networks, you must have:
4141

4242
Before you can set up remote networks, you need to onboard your tenant information with Microsoft. This one-time process enables your tenant to use remote network connectivity.
4343

44-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** as a Global Secure Access Administrator.
45-
1. Go to **Global Secure Access (preview)** > **Devices** > **Remote network**.
44+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
45+
1. Browse to **Global Secure Access (preview)** > **Devices** > **Remote network**.
4646
1. Select the link to the **Onboarding form** in the message at the top of the page.
4747

4848
![Screenshot of the onboarding form link.](media/how-to-create-remote-networks/create-remote-network-onboarding-form-link.png)
@@ -71,8 +71,8 @@ Remote networks are configured on three tabs. You must complete each tab in orde
7171
### Basics
7272
The first step is to provide the name and location of your remote network. Completing this tab is required.
7373

74-
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** as a Global Secure Access Administrator.
75-
1. Go to **Global Secure Access (preview)** > **Devices** > **Remote network**.
74+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
75+
1. Browse to **Global Secure Access (preview)** > **Devices** > **Remote network**.
7676
1. Select the **Create remote network** button and provide the following details:
7777
- **Name**
7878
- **Region**

articles/global-secure-access/how-to-install-windows-client.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ There are several other limitations based on the traffic forwarding profile in u
4545

4646
The most current version of the Global Secure Access Client can be downloaded from the Microsoft Entra admin center.
4747

48-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference).
48+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
4949
1. Browse to **Global Secure Access (Preview)** > **Devices** > **Clients**.
5050
1. Select **Download**.
5151

0 commit comments

Comments
 (0)