Skip to content

Latest commit

 

History

History
62 lines (45 loc) · 4.16 KB

File metadata and controls

62 lines (45 loc) · 4.16 KB
title Microsoft traffic Conditional Access policies
description Learn how to apply Conditional Access policies to the Global Secure Access traffic.
ms.subservice entra-internet-access
ms.topic how-to
ms.date 03/13/2026
ms.reviewer alexpav
ai-usage ai-assisted

Apply Conditional Access policies to Global Secure Access traffic

You apply Conditional Access policies to Global Secure Access traffic. With Conditional Access, you can require multifactor authentication and device compliance for accessing Microsoft resources.

This article describes how to apply Conditional Access policies to your Global Secure Access internet traffic.

Prerequisites

Create a Conditional Access policy targeting Global Secure Access internet traffic

The following example policy targets all users except for your break-glass accounts and guest/external users, requiring multifactor authentication, device compliance, or a Microsoft Entra hybrid joined device for Global Secure Access internet traffic.

  1. Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.

  2. Browse to Entra ID > Conditional Access.

  3. Select Create new policy.

  4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

  5. Under Assignments, select the Users and groups link.

    1. Under Include, select All users.
    2. Under Exclude:
      1. Select Users and groups and choose your organization's emergency access or break-glass accounts.
      2. Select Guest or external users and select all checkboxes.
  6. Under Target resources > Resources (formerly cloud apps).

    1. Choose All internet resources with Global Secure Access.

    :::image type="content" source="media/how-to-target-resource-microsoft-profile/target-resource-traffic-profile.png" alt-text="Screenshot showing a Conditional Access policy targeting a traffic profile.":::

    [!NOTE] To only enforce the Internet Access traffic forwarding profile and not the Microsoft traffic forwarding profile then choose Select resources and select Internet resources from the app picker and configure a security profile.

  7. Under Access controls > Grant.

    1. Select Require multifactor authentication, Require device to be marked as compliant, and Require Microsoft Entra hybrid joined device
    2. For multiple controls select Require one of the selected controls.
    3. Select Select.

After administrators confirm the policy settings using report-only mode, an administrator can move the Enable policy toggle from Report-only to On.

User exclusions

[!INCLUDE entra-policy-exclude-user]

Next steps

The next step for getting started with Microsoft Entra Internet Access is to review the Global Secure Access logs.

For more information about traffic forwarding, see the following articles: