Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Threat intelligence empowers you to protect your users from accessing malicious destinations on the internet, based on real-time data on current threats.
You can configure a threat intelligence policy to block users from high-severity known malicious internet destinations. In this policy, Microsoft Entra Internet Access blocks traffic based on domain and URL indicators from both Microsoft and third-party threat intelligence providers. With the threat intelligence rule engine, you can also configure allow lists for handling false positives. All of these policies can become context-aware with the Security Profile framework, linking Global Secure Access (GSA) security policies to Conditional Access.
Prerequisites
- Administrators who interact with Global Secure Access features must have one or more of the following role assignments depending on the tasks they're performing.
- The Global Secure Access Administrator role role to manage the Global Secure Access features.
- The Conditional Access Administrator to create and interact with Conditional Access policies.
- Complete the Get started with Global Secure Access guide.
- Install the Global Secure Access client on end user devices.
- You must disable Domain Name System (DNS) over HTTPS (Secure DNS) to tunnel network traffic. Use the rules of the fully qualified domain names (FQDNs) in the traffic forwarding profile. For more information, see Configure the DNS client to support DoH.
- Disable built-in DNS client on Chrome and Microsoft Edge.
- IPv6 traffic isn't acquired by the client and is therefore transferred directly to the network. To enable all relevant traffic to be tunneled, set the network adapter properties to IPv4 preferred.
- User Datagram Protocol (UDP) traffic (that is, QUIC) isn't supported in the current preview of Internet Access. Most websites support fallback to Transmission Control Protocol (TCP) when QUIC can't be established. For an improved user experience, you can deploy a Windows Firewall rule that blocks outbound UDP 443:
@New-NetFirewallRule -DisplayName "Block QUIC" -Direction Outbound -Action Block -Protocol UDP -RemotePort 443
- (Optional) Configure Transport Layer Security (TLS) inspection in order for URL indicators to be evaluated against HTTPS traffic.
High level steps
There are several steps to configuring threat intelligence. Take note of where you need to configure a Conditional Access policy.
- Enable internet traffic forwarding.
- Create a threat intelligence policy.
- Configure your allow list (optional).
- Create a security profile.
- Link the security profile to a Conditional Access policy.
Enable internet traffic forwarding
The first step is to enable the Internet Access traffic forwarding profile. To learn more about the profile and how to enable it, see How to manage the Internet Access traffic forwarding profile.
You can scope the Internet Access profile to specific users and groups. To learn more about user and group assignment, see How to assign and manage users and groups with traffic forwarding profiles.
Create a threat intelligence policy
- Browse to Global Secure Access > Secure > Threat Intelligence Policies.
- Select Create policy.
- Enter a name and description for the policy and select Next.
- The default action for threat intelligence is "Allow". This means that if traffic doesn't match a rule in the threat intelligence policy, the policy engine will allow the traffic to go to the next security control.
- Select Next and Review your new threat intelligence policy.
- Select Create
Important
This policy is created with a rule blocking access to destinations where high severity threats are detected. Microsoft defines high severity threats as domains or URLs associated with active malware distribution, phishing campaigns, command-and-control (C2) infrastructure, and other threads, identified by Microsoft and third-party threat intelligence feeds with high confidence.
Configure your allow list (optional)
If you're aware of sites that may be business-critical or are labeled as false positives, you can configure rules that allow these sites. Note the security risks involved with this action, as the internet threat landscape is ever-changing.
- Under Global Secure Access > Secure > Threat Intelligence Policies, select your chosen threat intelligence policy.
- Select Rules.
- Select Add rule.
- Enter a name, description, priority, and status for the rule.
- Edit Destination FQDNs and select the list of domains for your allow list. You can enter these FQDNs as comma-separated domains.
- Select Add.
Create a security profile or configure the baseline profile
Security profiles are a grouping of security controls like web content filtering and threat intelligence policies. You can assign, or link, security profiles with Microsoft Entra Conditional Access policies. One security profile can contain a policy of each type.
In this step, you create a security profile to group filtering policies like web content filtering and/or threat intelligence. Then you assign, or link, the security profiles with a Conditional Access policy to make them user or context aware.
Since threat intelligence is critical for users' basic security posture, you can alternatively link your threat intelligence policy to the baseline security profile, which applies policy to all users' traffic in your tenant.
Note
You can only configure threat intelligence policy per security profile. Rule priorities within each security control handle exceptions, and security controls follow the ordering, (1) TLS inspection > (2) Web content filtering > (3) Threat intelligence > (4) File type > (5) Data loss prevention > (6) Third-party
- Browse to Global Secure Access > Secure > Security profiles.
- Select Create profile.
- Enter a name and description for the profile and select Next.
- Select Link a policy and then select Existing threat intelligence policy.
- Select the threat intelligence policy you already created and select Add.
- Select Next to review the security profile and associated policy.
- Select Create profile.
- Select Refresh to view the new profile.
Create and link Conditional Access policy
Create a Conditional Access policy for end users or groups and deliver your security profile through Conditional Access Session controls. Conditional Access is the delivery mechanism for user and context awareness for Internet Access policies.
- Browse to Identity > Protection > Conditional Access.
- Select Create new policy.
- Enter a name and assign a user or group.
- Select Target resources and All internet resources with Global Secure Access.
- Select Session > Use Global Secure Access security profile and choose a security profile.
- Select Select.
- In the Enable policy section, ensure On is selected.
- Select Create.
Note
Applying a new security profile can take up to 60-90 minutes because security profiles are enforced via access tokens.
Verify end user policy enforcement
Use a Windows device with the Global Secure Access client installed. Sign in as a user that is assigned the Internet traffic acquisition profile. Test that navigating to malicious websites is blocked as expected.
Note
After configuring a threat intelligence policy, you may need to clear your browser's cache to validate policy enforcement.
- Right-click on the Global Secure Access client icon in the task manager tray and open Advanced Diagnostics > Forwarding profile. Ensure that the Internet access acquisition rules are present.
- Navigate to a known malicious site (for example,
entratestthreat.comorsmartscreentestratings2.net). Ensure that you're blocked and that the Threat Type field is nonempty in the traffic logs. Traffic logs may take up to 5 minutes to appear in the portal. - If blocked by Windows Defender or Smart screen, override and access the site to test the Global Secure Access block message. You can do this by choosing "Continue to the unsafe site (not recommended)" under "More information."
- To test allow-listing, create a rule in the Threat Intelligence policy to allow access to the site. Within 2 minutes, you should be able to access it. (You may need to clear your browser cache.)
- Evaluate the rest of the threat feed against your known threat indicators.

Caution
Testing with real malicious sites should be performed in a sandbox or test environment to protect your device and enterprise.