Tag Archives: Microsoft

Rethinking Network Access: A Deep Dive into Microsoft Entra Global Secure Access Diagnostics & Troubleshooting

Modern network access has evolved, and Microsoft Entra Global Secure Access (GSA) is leading the transformation. Whether users are accessing private resources, Microsoft 365 services, or the internet, every request is now routed through an identity aware, Zero Trust-aligned infrastructure. This shift introduces new troubleshooting paradigms and this guide is here to help.

Why Global Secure Access Exists

Global Secure Access combines multiple security layers to deliver robust protection and optimized routing:

  • Zero Trust enforcement for all traffic
  • Unified identity, device, and network controls
  • VPN replacement for private apps
  • Secure outbound internet access
  • Optimized Microsoft 365 routing

Traffic Profiles Explained

GSA categorizes traffic into three distinct profiles:

  • Internet Access → Secure outbound browsing
  • Microsoft 365 Access → Optimized, identity-aware routing
  • Private Access → Zero Trust access to internal apps

For architectural flow diagrams and examples (e.g., Synology NAS), refer to my previous blog.

Continue reading

From Home to Zero Trust: A Hands-On Guide to Microsoft Entra Private Access

In today’s hybrid work environment, secure access to internal resources without relying on traditional VPNs is a key requirement. Microsoft Entra Private Access, part of the Global Secure Access suite, enables Zero Trust-based connectivity to private applications hosted on-premises or in private networks.

In this demo, we’ll walk through setting up a home lab using an Azure tenant, installing the Entra connector, and configuring access to a Synology NAS as a private application—all from a personal laptop and home network.

Before starting, make sure you have:

  • Microsoft Entra ID tenant with Global Secure Access enabled.
  • Microsoft Entra Global Secure Access license (Private Access feature).
  • Windows 11 Pro device (required for advanced networking and policy support).
  • Device joined to Microsoft Entra ID (Azure AD joined or Hybrid joined).
  • Intune-managed device for policy enforcement and NRPT configuration.
  • Administrative access to your Azure tenant and local machine.
  • Microsoft Entra Connector installer downloaded from the Entra Admin Center.
  • Global Secure Access Client installer for Windows.
  • Internal resource (Synology NAS or similar) reachable on your home network.
  • Internal IP address of the resource (e.g., 10.0.x.x).
  • Optional DNS setup:
    • Private DNS zone or hosts file entry for FQDN (e.g., demo.synology.me).
  • Self-signed certificate (optional) for HTTPS access.
  • Internet connectivity for connector registration and client sign-in.
Continue reading

Exploring Microsoft Entra Agent ID (Preview): Identity, Governance & Zero‑Trust for AI Agents

Note: Features are in Preview and may change.

As organizations lean into AI assistants and autonomous workflows, one challenge keeps coming up in every SOC and IAM conversation: agent sprawl. Agents show up in multiple teams and builder platforms, and before you know it, you’ve got non‑human actors touching sensitive data without a clear inventory, lifecycle, or policy boundary.

Microsoft Entra Agent ID and the Agent Registry (Preview) are designed to solve exactly that bringing identities, governance, and Zero Trust controls to AI agents, so you can securely discover, organize, and manage them easily in your directory.


What Agent Registry Adds (and Why You’ll Care)

Agent Registry is an Microsoft Entra integrated metadata repository that gives you a unified view of agents built on Microsoft platforms (e.g., Copilot Studio, Azure AI Foundry) and those from other ecosystems. It separates operational records (Agent Instances) from discoverability metadata (Agent Card Manifests) and introduces Collections to govern which agents can discover and collaborate with each other. Think discovery before access a crucial shift for reducing exposure.


A Quick Look at the Tenant Experience

Agent ID Overview (Preview) dashboard showing agent counts, status, types, and blueprints: high-level posture of agents, identities, blueprints, and collections

Continue reading

Navigating DORA with Microsoft Purview: A compliance blueprint for Microsoft 365

Digital Operational Resilience Act (DORA) is reshaping how EU financial entities manage ICT risk, resilience testing, incident reporting, and third‑party risk. If you run Microsoft 365, Microsoft Purview Compliance Manager gives you a practical way to translate DORA requirements into actions, evidence, and measurable progress. This guide walks through a clean, step‑by‑step implementation flow from setting up a DORA assessment to assigning improvement actions and tracking your score, so you can be audit ready without drowning in spreadsheets.

Why use Microsoft Purview Compliance Manager for DORA ?

  • Prebuilt assessments: DORA assessment templates map regulatory articles to actionable controls you can assign and track.
  • Control mapping: Microsoft‑managed baselines and customer‑managed controls provide clarity on shared responsibility.
  • Improvement actions: Structured tasks with owners, due dates, and recommended steps create accountability.
  • Evidence management: Centralized artifacts (documents, links, screenshots) simplify audit preparation.
  • Real‑time scoring: Compliance scores help prioritize high‑risk gaps and demonstrate progress.

Prerequisites and approach

  • Access: Ensure you have appropriate roles in Microsoft Purview (e.g., Compliance Manager Admin or similar).
  • Scope: Decide which services to cover first; start with Microsoft 365 for a focused rollout.
  • Vanilla setup: Use a fresh assessment group to avoid inherited noise and control drift.

Quick Tip

Can also use the default user access options available from the Assesment option in the Compliance Manager Portal

Step‑by‑step setup in Compliance Manager

Create and configure your DORA assessment

  • Open Purview: Go to Microsoft Purview portal → Compliance Manager – Navigate to assessment – Select Regulation
  • Find templates: Search for “Digital” under assessment templates. (I was not able to find with DORA :))
Continue reading

Top 10 Browser Security Controls that can be Enforced with Microsoft Intune

In today’s enterprise landscape, most applications are accessed through modern browsers like Microsoft Edge and Google Chrome, especially on Windows devices. While these browsers come with built-in security features, organizations must go a step further to enforce consistent and robust browser security policies across all endpoints.

If your organization uses Microsoft Intune, you have powerful tools at your disposal to configure and enforce browser security settings. In this blog, we’ll walk through 10 essential browser security controls you can implement using Intune’s Settings Catalog to enhance protection against web-based threats.

1. Enable Windows Defender SmartScreen

SmartScreen helps protect users from phishing attacks and malicious websites or downloads.

Recommended Settings:

  • Enable Windows Defender SmartScreen
  • Don’t allow SmartScreen warning overrides for unverified files
  • Don’t allow SmartScreen warning overrides
Continue reading

Creating Your First AI Agent with Azure AI Agent Service

Introduction

Azure AI Agent Service allows you to create, deploy, and manage AI agents that can perform various tasks. This service leverages powerful AI models to enable agents to perform a wide range of tasks, from answering queries to automating complex workflows. With its user-friendly interface and robust infrastructure, Azure AI Agent Service makes it easy for developers to build intelligent agents that can enhance applications and improve productivity.

This guide will walk you through the steps to set up and run your first agent with the help of Azure AI agent service.

Prerequisites:

  • An Azure subscription.
  • You need a GitHub Account.
  • Basic knowledge of PowerShell and Python.

So first step is to setup your workspace in the GitHUb

GitHub Codespaces: A Convenient Cloud-Based Development Environment

GitHub Codespaces offers a virtual machine in the cloud, providing a clean environment with all necessary prerequisites pre-installed. This makes it incredibly easy to set up and run your code, even on a standard laptop without high-end specifications.

Key Features:

  • Cloud-Based Computation: All computations are performed in the cloud, allowing you to work efficiently on a standard laptop.
  • Easy Setup: Setting up Codespaces is straightforward and quick, making it accessible for developers of all levels.
Continue reading

Microsoft Exchange UPDATES Released

Microsoft Exchange UPDATES Released :

Microsoft has released Exchange 2013 CU7, Exchange 2010 SP3 RU8 and Exchange 2007 SP3 RU15.

Exchange 2013 Cumulative Update 7 can be downloaded –https://www.microsoft.com/en-us/download/details.aspx?id=45221
Issues that Exchange 2013 CU8 resolves –http://support.microsoft.com/kb/2986485

Exchange 2010 Update rollup 8 up can be downloaded =http://www.microsoft.com/en-us/download/details.aspx?id=45225
Issues that Exchange 2010 update rollup 8 resolves –http://support2.microsoft.com/default.aspx?kbid=2986475

Exchange 2007 Update rollup 15 up can be downloadedhttp://www.microsoft.com/en-us/download/details.aspx?id=45269
Issues that update rollup 15 resolves –http://support2.microsoft.com/default.aspx?kbid=2996150

Thanks

Sathish Veerapandian

MVP – Exchange Server