{"id":20360,"date":"2025-09-25T09:00:00","date_gmt":"2025-09-25T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=20360"},"modified":"2025-10-02T09:16:30","modified_gmt":"2025-10-02T16:16:30","slug":"transforming-our-vpn-with-global-secure-access-at-microsoft","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/","title":{"rendered":"Transforming our VPN with Global Secure Access at Microsoft"},"content":{"rendered":"\n
Ensuring safe and secure access to resources in the enterprise has always been a delicate balance. Protecting corporate assets from intrusions and misuse is paramount. But a system that neglects usability for employees creates frustration and inefficiencies.<\/p>\n\n\n\n
At Microsoft, we\u2019re in the midst of a major transformation in how we manage access to our corporate resources. The cornerstone of this change is Microsoft Global Secure Access (GSA), a security service edge (SSE) solution that replaces traditional VPNs with a modern, identity-centric model. GSA provides three core services integrated into a unified framework: Microsoft 365 Access, Internet Access, and Private Access. This approach not only strengthens our enterprise security posture but also simplifies connectivity for both users and administrators.<\/p>\n\n\n\n \u201cYears ago, the concept of a VPN was simple: a single virtual private network gave employees access to the company\u2019s entire internal network. Today, this model presents serious risks.<\/p>\nPete Apple, principal cloud network engineer, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n Over 158,000 of our employees are already using the GSA client and Microsoft 365, with full rollout of private and internet access planned in the coming months. Here\u2019s how we\u2019re building a more secure, seamless, and future-ready access experience across Microsoft\u2019s ecosystems.<\/p>\n\n\n\n The idea that an internal network is inherently safer than the open internet has always been risky, and modern threats make that assumption dangerous. This is why we\u2019ve embraced the Zero Trust model, shifting away from blanket access and moving toward least-privilege access\u2014ensuring users only get what they need, when they need it, and nothing more.<\/p>\n\n\n\n Adopting a Zero Trust approach across the enterprise makes moving beyond traditional VPNs imperative. For years, we\u2019ve relied on Microsoft VPN and Azure VPN to access internal resources. While effective, these traditional models operate on an \u201call-or-nothing\u201d basis: once connected, employees gain broad access, regardless of role or security context.<\/p>\n\n\n\n \u201cYears ago, the concept of a VPN was simple: a single virtual private network gave employees access to the company\u2019s entire internal network,\u201d says Pete Apple, a principal cloud network engineer in Microsoft Digital, the company\u2019s IT organization. \u201cToday, this model presents serious risks. If a user\u2019s identity or device is compromised\u2014or if a man-in-the-middle attack occurs\u2014the attacker can connect through the VPN and gain broad access to sensitive data, soft targets, and critical systems.\u201d<\/p>\n\n\n\n \u201cOne of the primary reasons for this shift to GSA is that we get more granularity within this identity-based security solution that we can control access on a very fine level.\u201d<\/p>\nGary Triv, principal network engineer, Microsoft Digital<\/em><\/cite><\/blockquote>\n\n\n\n This creates challenges for organizations like ours\u2014and yours.<\/p>\n\n\n\n That\u2019s where GSA can help.<\/p>\n\n\n\n It shifts the paradigm by introducing fine-grained, identity-based controls. Through deep integration with Microsoft Entra, administrators can enforce policies that adapt in real time, ensuring only the right users, devices, and conditions grant access to sensitive resources.<\/p>\n\n\n\n \u201cOne of the primary reasons for this shift to GSA is that we get more granularity within this identity-based security solution that we can control access on a very fine level,\u201d says Gary Triv, a principal network engineer in Microsoft Digital.<\/p>\n\n\n\n Our focus on security is built into everything we do.<\/p>\n\n\n\n \u201cConditional access, identity-centric controls, and other core elements of Zero Trust are built directly into the solution,\u201d says Lalitha Mahajan, global technical program manager for Global Secure Access.<\/p>\n\n\n\n At the heart of GSA are four foundational security features:<\/p>\n\n\n\n Together, these pillars make GSA a secure and adaptive solution, fully aligned with the principles of Zero Trust.<\/p>\n\n\n\n \u201cWith the Zero Trust model, our goal is to enforce least-privilege access. That means locking down internal resources, improving segmentation, and using firewalls and other controls so users can\u2019t reach everything by default,\u201d Apple says. \u201cInstead of relying on a blanket VPN network, we\u2019re moving to the Entra Global Secure Access model, which combines network and identity. Instead of granting broad visibility into the entire internal network, access can now be scoped to a user\u2019s identity\u2014so employees only connect to the resources defined for them.\u201d<\/p>\n\n\n\n \u201cUnlike traditional VPNs, GSA delivers both client-side and server-side insights, all of which we own. This gives us deeper visibility and allows us to make the data more actionable for our use cases.\u201d<\/p>\nLalitha Mahajan, program manager, Microsoft Digital<\/em><\/cite><\/blockquote>\n\n\n\n A perfect example is a Microsoft developer\u2014one of our most common employee roles.<\/p>\n\n\n\n Our developers may need access to specific source code, certain labs, and designated file shares. With GSA, we can grant access only to those resources\u2014and nothing else. This shift from a blanket “once connected, you can see everything” approach, to a tightly defined, identity-based model is a major security improvement and one of the most exciting reasons we’re moving forward with this product.<\/p>\n\n\n\n A key differentiator and critical Zero Trust enabler is GSA\u2019s rich telemetry, which provides real-time visibility into user activity, device health, and network traffic. This continuous stream of data enables early detection of threats, anomaly detection, and precise policy enforcement\u2014strengthening Zero Trust in practice.<\/p>\n\n\n\n \u201cUnlike traditional VPNs, GSA delivers both client-side and server-side insights, all of which we own,\u201d Mahajan says. \u201cThis gives us deeper visibility and allows us to make the data more actionable for our use cases.\u201d<\/p>\n\n\n\n Private Access is just one of three offerings that make up GSA. Together, these offerings are unified under a single client that creates three dedicated tunnels\u2014one for each service\u2014while administrators centrally define routing and policy rules. GSA consists of:<\/p>\n\n\n\n For Internet Access, GSA supports two deployment models: branch connectivity, where IPSec tunnels secure traffic from devices without a client (like printers), and client connectivity, where the GSA client routes laptop or desktop traffic directly to the GSA Edge. Both approaches enforce consistent policies, differing only in how traffic reaches the framework.<\/p>\n\n\n\n Unlike fragmented VPN and firewall logs, GSA provides consistent visibility through unified logging, which consolidates session data\u2014including user identity, device, source, destination, and applied policies\u2014into a single view. We can now easily validate whether security features are working as intended and forward logs to Microsoft Sentinel for extended monitoring.<\/p>\n\n\n\n This holistic view provides us with a major advantage against cyber threats, enabling faster investigations and clearer correlations between user behavior and network activity.<\/p>\n\n\n\n Our rollout of GSA is well underway internally at Microsoft. With more than 158,000 GSA client and Microsoft 365 users already onboard, the next phase will expand private access company-wide, followed by broader adoption of internet access. Early pilots have demonstrated strong results, with positive feedback on both usability and the ability to solve unique access challenges.<\/p>\n\n\n\n By delivering a complete, identity-based secure access solution\u2014spanning Microsoft 365, internet, and private connectivity\u2014Microsoft is redefining enterprise access for the cloud-first era. The result is a future where connectivity is not only seamless but also secure, adaptive, and tightly aligned with user identity and context.<\/p>\n\n\n\n Key takeaways<\/p>\n<\/div>\n\n\n\n Our experience transitioning to GSA Private Access has left us with several key insights that other enterprises can apply to their own efforts to modernize remote access:<\/p>\n\n\n\n Try it out<\/p>\n<\/div>\n\n\n\n Sign up for a free trial of Microsoft Entra Private Access.<\/a><\/p>\n<\/div>\n\n\n\n Related links<\/p>\n<\/div>\n\n\n\n
<\/figure>\n\n\n\n\n
Beyond VPNs: the future of secure access<\/h2>\n\n\n\n
<\/figure>\n\n\n\n\n
The four pillars of GSA security<\/h2>\n\n\n\n
\n
<\/figure>\n\n\n\n\n
The key components of GSA<\/h2>\n\n\n\n
\n
Advanced features and monitoring<\/h2>\n\n\n\n
<\/figure>\n\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n\n