Skip to content

Commit 87be552

Browse files
updates
1 parent 93e9ef5 commit 87be552

File tree

4 files changed

+426
-104
lines changed

4 files changed

+426
-104
lines changed
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
---
2+
sidebar_position: 9
3+
title: "Block access using Baseline profile"
4+
---
5+
6+
## Sample PoC scenario: Create a baseline policy applying to all internet access traffic routed through the service
7+
8+
Microsoft Internet Access baseline policy allows to configure filtering policies that apply to all traffic without linking to a Conditional Access policy.
9+
You can use the baseline profile to block web categories that no user in the organization should be allowed to browse, for example inappropriate sites.
10+
11+
Complete the following tasks to create this baseline policy to block an FQDN:
12+
13+
- Configure a block rule for a risky web category by [creating a web filtering policy](#create-a-web-filtering-policy).
14+
- Group and prioritize your web filtering policies by [configuring the baseline profile](#configure-the-baseline-profile).
15+
- Use your test user to [attempt to access the blocked site](#attempt-to-access-blocked-sites) to confirm application of your rule.
16+
- [View activity in the traffic log](#view-activity-in-the-traffic-log).
17+
18+
### Create a web filtering policy
19+
20+
1. In the **Microsoft Entra admin center**, go to **Global Secure Access** \> **Secure** \> **Web content filtering policies** \> **Create policy** \> **[Configure Global Secure Access content filtering](https://learn.microsoft.com/entra/global-secure-access/how-to-configure-web-content-filtering)**.
21+
22+
1. On **Create a web content filtering policy** \> **Basics**, provide the following details.
23+
* **Name**: Baseline Internet Access block rule.
24+
* **Description**: Add a description.
25+
* **Action**: Block.
26+
27+
2. Select **Next**.
28+
3. On **Create a web content filtering policy** \> **Policy Rules**, select **Add Rule**.
29+
4. In the **Add Rule** dialog box, provide the following details.
30+
* **Name**: Baseline blocked web categories.
31+
* **Destination type:** webCategory.
32+
* **Search**: Select a few risky categories, confirm they are in the Selected items list.
33+
5. Select **Add**.
34+
6. On **Create a web content filtering policy** \> **Policy Rules**, confirm your selections.
35+
7. Select **Next**.
36+
8. On **Create a web content filtering policy** \> **Review**, confirm your policy configuration.
37+
9. Select **Create policy**.
38+
10. To confirm policy creation, view it in the **Manage web content filtering policies** list.
39+
40+
### Configure the baseline profile
41+
42+
1. In the **Microsoft Entra admin center**, go to **Global Secure Access** \> **Secure** \> **Security profiles**. Select **Baseline profile**.
43+
2. Click **Edit Profile**, and complete the following information on the **Basics** page.
44+
* **Profile name**: Baseline Internet Access Block Profile.
45+
* **Description:** Add a description.
46+
* **State**: enabled.
47+
3. Select the **Link policies** page.
48+
4. Select **Link a policy**. Select **Existing policy**.
49+
* In the **Link a policy** dialog box, select **Policy name** and select **Baseline Internet Access block rule**.
50+
* **Priority**: 100.
51+
* **State**: Enabled.
52+
5. Select **Add**.
53+
6. On **Link policies**, confirm **Baseline Internet Access Block Rule** is in the list.
54+
7. Close the baseline profile.
55+
56+
### Attempt to access blocked sites
57+
58+
1. Sign in to the test device where you installed the global secure access (GSA) agent.
59+
2. To confirm blocked access, attempt to open the FQDN you blocked. It can take up to 20 minutes for the policy to apply to your client device.
60+
61+
62+
### View activity in the traffic log
63+
64+
1. In the **Microsoft Entra admin center** \> **Global Secure Access** \> **Monitor**, select [**Traffic logs**](https://learn.microsoft.com/entra/global-secure-access/how-to-view-traffic-logs). If needed, select **Add filter**. Filter when **User principal name** contains *testuser* and **Action** set to **Block**.
65+
2. Observe the entries for your target FQDN that show traffic as blocked and then allowed. There may be a delay of up to 20 minutes for entries to appear in the log.

0 commit comments

Comments
 (0)