|
| 1 | +--- |
| 2 | +sidebar_position: 9 |
| 3 | +title: "Block access using Baseline profile" |
| 4 | +--- |
| 5 | + |
| 6 | +## Sample PoC scenario: Create a baseline policy applying to all internet access traffic routed through the service |
| 7 | + |
| 8 | +Microsoft Internet Access baseline policy allows to configure filtering policies that apply to all traffic without linking to a Conditional Access policy. |
| 9 | +You can use the baseline profile to block web categories that no user in the organization should be allowed to browse, for example inappropriate sites. |
| 10 | + |
| 11 | +Complete the following tasks to create this baseline policy to block an FQDN: |
| 12 | + |
| 13 | +- Configure a block rule for a risky web category by [creating a web filtering policy](#create-a-web-filtering-policy). |
| 14 | +- Group and prioritize your web filtering policies by [configuring the baseline profile](#configure-the-baseline-profile). |
| 15 | +- Use your test user to [attempt to access the blocked site](#attempt-to-access-blocked-sites) to confirm application of your rule. |
| 16 | +- [View activity in the traffic log](#view-activity-in-the-traffic-log). |
| 17 | + |
| 18 | +### Create a web filtering policy |
| 19 | + |
| 20 | +1. In the **Microsoft Entra admin center**, go to **Global Secure Access** \> **Secure** \> **Web content filtering policies** \> **Create policy** \> **[Configure Global Secure Access content filtering](https://learn.microsoft.com/entra/global-secure-access/how-to-configure-web-content-filtering)**. |
| 21 | + |
| 22 | +1. On **Create a web content filtering policy** \> **Basics**, provide the following details. |
| 23 | + * **Name**: Baseline Internet Access block rule. |
| 24 | + * **Description**: Add a description. |
| 25 | + * **Action**: Block. |
| 26 | + |
| 27 | +2. Select **Next**. |
| 28 | +3. On **Create a web content filtering policy** \> **Policy Rules**, select **Add Rule**. |
| 29 | +4. In the **Add Rule** dialog box, provide the following details. |
| 30 | + * **Name**: Baseline blocked web categories. |
| 31 | + * **Destination type:** webCategory. |
| 32 | + * **Search**: Select a few risky categories, confirm they are in the Selected items list. |
| 33 | +5. Select **Add**. |
| 34 | +6. On **Create a web content filtering policy** \> **Policy Rules**, confirm your selections. |
| 35 | +7. Select **Next**. |
| 36 | +8. On **Create a web content filtering policy** \> **Review**, confirm your policy configuration. |
| 37 | +9. Select **Create policy**. |
| 38 | +10. To confirm policy creation, view it in the **Manage web content filtering policies** list. |
| 39 | + |
| 40 | +### Configure the baseline profile |
| 41 | + |
| 42 | +1. In the **Microsoft Entra admin center**, go to **Global Secure Access** \> **Secure** \> **Security profiles**. Select **Baseline profile**. |
| 43 | +2. Click **Edit Profile**, and complete the following information on the **Basics** page. |
| 44 | + * **Profile name**: Baseline Internet Access Block Profile. |
| 45 | + * **Description:** Add a description. |
| 46 | + * **State**: enabled. |
| 47 | +3. Select the **Link policies** page. |
| 48 | +4. Select **Link a policy**. Select **Existing policy**. |
| 49 | + * In the **Link a policy** dialog box, select **Policy name** and select **Baseline Internet Access block rule**. |
| 50 | + * **Priority**: 100. |
| 51 | + * **State**: Enabled. |
| 52 | +5. Select **Add**. |
| 53 | +6. On **Link policies**, confirm **Baseline Internet Access Block Rule** is in the list. |
| 54 | +7. Close the baseline profile. |
| 55 | + |
| 56 | +### Attempt to access blocked sites |
| 57 | + |
| 58 | +1. Sign in to the test device where you installed the global secure access (GSA) agent. |
| 59 | +2. To confirm blocked access, attempt to open the FQDN you blocked. It can take up to 20 minutes for the policy to apply to your client device. |
| 60 | + |
| 61 | + |
| 62 | +### View activity in the traffic log |
| 63 | + |
| 64 | +1. In the **Microsoft Entra admin center** \> **Global Secure Access** \> **Monitor**, select [**Traffic logs**](https://learn.microsoft.com/entra/global-secure-access/how-to-view-traffic-logs). If needed, select **Add filter**. Filter when **User principal name** contains *testuser* and **Action** set to **Block**. |
| 65 | +2. Observe the entries for your target FQDN that show traffic as blocked and then allowed. There may be a delay of up to 20 minutes for entries to appear in the log. |
0 commit comments