Event banner
Introducing Microsoft Entra Private Access
Event Ended
Thursday, Jul 20, 2023, 08:30 AM PDTEvent details
Microsoft Entra Private Access helps secure access to all private apps and resources, for users anywhere, with an identity-centric Zero Trust Network Access (ZTNA) solution. Join us to learn how this solution can help you remove the risk and operational complexity of legacy virtual private networks (VPNs) while boosting user productivity and lowering cost. This event takes what we announced at Reimagine secure access with Microsoft Entra on July 11th and goes further into the technical details you need to get started today!
Once we’ve walked you through some demos and details, we’ll switch to an open Ask Microsoft Anything (AMA) format to answer all your questions about Microsoft Entra Private Access and Internet Access!
This session is part of the Microsoft Entra Tech Accelerator. RSVP for event reminders, add it to your calendar, and post your questions and comments below! This session will also be recorded and available on demand shortly after conclusion of the live event. |
While you wait, read Identity Management: A Foundation for Zero Trust Security to learn how a modern identity management solution can provide a strong foundation for your overall security strategy.
Heather_Poulsen
Updated Dec 27, 2024
- KshitijM1988Copper Contributor
How does the Global Access Client work as compared to VPN clients form the OS perspective ? I mean do you install another Virtual Adapter that will basically route all traffic to this adapter (Similar to VPN) OR Is it like some Tap/Traffic filter that you will leverage ?
- KshitijM1988Copper ContributorYou mentioned that it supports 3rd party SSE in parallel for Internet access. Can you please elaborate on what you mean exactly ? Do you mean You support compatibility with SSE agents like Zscaler ZIA Client ? OR something else ? Can you point me to some document ?
- Char_CheesmanBronze Contributor
That concludes this session of Microsoft Entra Tech Accelerator. Thanks for joining! We'll continue to answer questions in the chat. Up next: Ask Microsoft Anything: Azure AD is being renamed.
Note: The Comments section will be open up to questions for 24 hours and we'll reply as promptly as possible.
In addition to the questions posted on this page, we also answer questions posted in reply to the event on LinkedIn and Twitter. Here are the questions we answered today:
- SkyukCopper ContributorWhen creating a network/application rule is it possible to add multiple network ports to a single IP/IP Range. Can you mix UDP and TCP in the same rule?
- Anupma_Sharma
Microsoft
We will support a hierarchy of rules to enable admins to define appropriate policies. Full 5-tuple cloud firewall support including ports and protocols granularity is being actively worked upon and you will see it coming out in preview in upcoming months. Short answer - yes - to your question 🙂
- Ma-tthBrass ContributorIn the Demo we saw login using private access with ip. If in my onpremise network i have enforced kerberos login do i have to use a valid Host name or does it work with ip in entra privat access ?
- Ian_Parramore
Microsoft
There'll be a few factors here including: - Are you allowing access to a KDC through Private Access - Can the client obtain a Kerberos ticket from the KDC using IP address Generally, Kerberos is going to work better using FQDN's.
- Richard_HicksCopper ContributorIs it possible to install the Application Proxy connector on Server Core? If not, are there plans to support this deployment model in the future?
- Gustavo_Mauler
Microsoft
Application Proxy connector requires Windows Server 2012 R2 or later and you also need .NET 4.8 for the new connectors. We are taking your feedback on Server Core supportability to our engineering teams.- Richard_HicksCopper ContributorThanks! This workload would seem to be an ideal candidate for Server Core as it requires little to no administration post-deployment. 🙂
- En111_Brass ContributorAre there any API integrations planned together with other security vendors as part of the solution? Some offers today have examples that go outside the scope of one vendor, like; "If CrowdStrike ZTA score > 80 then allow" "Check URL towards PA Wildfire for second verdict" "Send file download hash to Cisco Threat Intel for second verdict"
- tdetzner
Microsoft
We are working closely with 3rd Party vendors and look for integration opportunities going forward.
- SkyukCopper ContributorWill Internet Access support non-HTTP protocols such as FTP, SFTP etc..
- Ian_Parramore
Microsoft
This is part of our roadmap plan. We will share more as we progress.
- sarthakBrass ContributorCan Entra SASE \SSE work with 3rd party EDR solutions other than MDE?
- Anupma_Sharma
Microsoft
Yes we will be working on third party integrations with SIEM and EDR/XDR solutions in addition to first-part products like Sentinel and MDE.
- auberymooreCopper ContributorWill private access allow for a longer backend application timeout? Currently, the Application's Proxy's most extended setting only allows three minutes.
- tdetzner
Microsoft
Great Feedback. We will look into this. - Jeevan_Bisht
Microsoft
We will have supported for longer timeouts, also there is a current private preview for Azure AD App proxy which allows to go beyond the 3 minutes. - Char_CheesmanBronze Contributor
Thanks for participating in today's AMA: Microsoft Entra Internet Access and Microsoft Entra Private Access! For reference, the panel covered this topic at around 48:00.