Category Archives: SSE

Entra Global Secure Access Content Policies + Purview Scan (Preview) – A First Look at the New Integration Ahead of General Availability

Microsoft Entra’s Secure Web Gateway (SWG) capabilities under Global Secure Access (GSA) are expanding rapidly. One of the newest additions visible in the portal is the “Scan with Purview (Preview)” action inside Content Policies.

This feature represents a major step forward:

Inline, real time file upload scanning using Microsoft Purview’s classification engine directly inside Entra Secure web gateway (SWG). This helps organizations better protect sensitive files in transit.

By integrating Entra Secure Web Gateway with Purview, organizations gain the ability to inspect file transfers at the network layer and enforce DLP rules in real time. This prevents sensitive data from leaving the organization through untrusted cloud apps, regardless of whether the upload happens via a browser, desktop application, API, or add‑in

This feature as it appears today in preview, based entirely on observable behavior in a Microsoft 365 E5 tenant.
Because this is a preview feature, some components are still evolving, and full functionality is expected to be available by mid June when the feature reaches General Availability (GA) and when the tenant gets this feature completely enabled.

Continue reading

Rethinking Network Access: A Deep Dive into Microsoft Entra Global Secure Access Diagnostics & Troubleshooting

Modern network access has evolved, and Microsoft Entra Global Secure Access (GSA) is leading the transformation. Whether users are accessing private resources, Microsoft 365 services, or the internet, every request is now routed through an identity aware, Zero Trust-aligned infrastructure. This shift introduces new troubleshooting paradigms and this guide is here to help.

Why Global Secure Access Exists

Global Secure Access combines multiple security layers to deliver robust protection and optimized routing:

  • Zero Trust enforcement for all traffic
  • Unified identity, device, and network controls
  • VPN replacement for private apps
  • Secure outbound internet access
  • Optimized Microsoft 365 routing

Traffic Profiles Explained

GSA categorizes traffic into three distinct profiles:

  • Internet Access → Secure outbound browsing
  • Microsoft 365 Access → Optimized, identity-aware routing
  • Private Access → Zero Trust access to internal apps

For architectural flow diagrams and examples (e.g., Synology NAS), refer to my previous blog.

Continue reading