{"id":8569,"date":"2024-01-11T09:00:13","date_gmt":"2024-01-11T17:00:13","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=8569"},"modified":"2024-01-11T09:06:13","modified_gmt":"2024-01-11T17:06:13","slug":"enhancing-vpn-performance-at-microsoft","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/enhancing-vpn-performance-at-microsoft\/","title":{"rendered":"Enhancing VPN performance at Microsoft"},"content":{"rendered":"
Modern workers are increasingly mobile and require the flexibility to get work done outside of the office. Here at Microsoft headquarters in the Puget Sound area of Washington State, every weekday an average of 45,000 to 55,000 Microsoft employees use a virtual private network (VPN) connection to remotely connect to the corporate network. As part of our overall Zero Trust Strategy<\/a>, we have redesigned our VPN infrastructure, something that has simplified our design and let us consolidate our access points. This has enabled us to increase capacity and reliability, while also reducing reliance on VPN by moving services and applications to the cloud.<\/p>\n Remote access at Microsoft is reliant on the VPN client, our VPN infrastructure, and public cloud services. We have had several iterative designs of the VPN service inside Microsoft. Regional weather events in the past required large increases in employees working from home, heavily taxing the VPN infrastructure and requiring a completely new design. Three years ago, we built an entirely new VPN infrastructure, a hybrid design, using Microsoft Azure Active Directory (Azure AD) load balancing and identity services with gateway appliances across our global sites.<\/p>\n Key to our success in the remote access experience was our decision to deploy a split-tunneled configuration for the majority of employees. We have migrated nearly 100% of previously on-premises resources into Microsoft Azure and Microsoft Office 365. Our continued efforts in application modernization<\/a> are reducing the traffic on our private corporate networks as cloud-native architectures allow direct internet connections. The shift to internet-accessable applications and a split-tunneled VPN design has dramatically reduced the load on VPN servers in most areas of the world.<\/p>\n We use Microsoft Endpoint Manager to manage our domain-joined and Microsoft Azure AD\u2013joined computers and mobile devices that have enrolled in the service. In our configuration, VPN profiles are replicated through Microsoft Intune and applied to enrolled devices; these include certificate issuance that we create in Configuration Manager for Windows 10 devices. We support Mac and Linux device VPN connectivity with a third-party client using SAML-based authentication.<\/p>\n We use certificate-based authentication (public key infrastructure, or PKI) and multi\u2011factor authentication solutions. When employees first use the Auto-On VPN connection profile, they are prompted to authenticate strongly. Our VPN infrastructure supports Windows Hello for Business and Multi-Factor Authentication. It stores a cryptographically protected certificate upon successful authentication that allows for either persistent or automatic connection.<\/p>\n For more information about how we use Microsoft Intune and Endpoint Manager as part of our device management strategy, see Managing Windows 10 devices with Microsoft Intune<\/a>.<\/p>\n We created VPN profiles that contain all the information a device requires to connect to the corporate network, including the supported authentication methods and the VPN gateways that the device should connect to. We created the connection profiles for domain-joined and Microsoft Intune\u2013managed devices using Microsoft Endpoint Manager.<\/p>\n For more information about creating VPN profiles, see VPN profiles in Configuration Manager<\/a> and How to Create VPN Profiles in Configuration Manager<\/a>.<\/p>\n The Microsoft Intune custom profile for Intune-managed devices uses Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings with XML data type, as illustrated below.<\/p>\nProviding a seamless remote access experience<\/h2>\n
Using VPN profiles to improve the user experience<\/h3>\n
Configuring and installing VPN connection profiles<\/h4>\n