{"id":20360,"date":"2025-09-25T09:00:00","date_gmt":"2025-09-25T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=20360"},"modified":"2025-10-02T09:16:30","modified_gmt":"2025-10-02T16:16:30","slug":"transforming-our-vpn-with-global-secure-access-at-microsoft","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/","title":{"rendered":"Transforming our VPN with Global Secure Access at Microsoft"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Ensuring safe and secure access to resources in the enterprise has always been a delicate balance. Protecting corporate assets from intrusions and misuse is paramount. But a system that neglects usability for employees creates frustration and inefficiencies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At Microsoft, we\u2019re in the midst of a major transformation in how we manage access to our corporate resources. The cornerstone of this change is Microsoft Global Secure Access (GSA), a security service edge (SSE) solution that replaces traditional VPNs with a modern, identity-centric model. GSA provides three core services integrated into a unified framework: Microsoft 365 Access, Internet Access, and Private Access. This approach not only strengthens our enterprise security posture but also simplifies connectivity for both users and administrators.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Pete-Apple.png\" alt=\"A photo of Apple.\" class=\"wp-image-20364\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Pete-Apple.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Pete-Apple-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Pete-Apple-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cYears ago, the concept of a VPN was simple: a single virtual private network gave employees access to the company\u2019s entire internal network. Today, this model presents serious risks.<\/p>\n<cite>Pete Apple, principal cloud network engineer, Microsoft Digital<\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Over 158,000 of our employees are already using the GSA client and Microsoft 365, with full rollout of private and internet access planned in the coming months. Here\u2019s how we\u2019re building a more secure, seamless, and future-ready access experience across Microsoft\u2019s ecosystems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Beyond VPNs: the future of secure access<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The idea that an internal network is inherently safer than the open internet has always been risky, and modern threats make that assumption dangerous. This is why we\u2019ve embraced the Zero Trust model, shifting away from blanket access and moving toward least-privilege access\u2014ensuring users only get what they need, when they need it, and nothing more.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Adopting a Zero Trust approach across the enterprise makes moving beyond traditional VPNs imperative. For years, we\u2019ve relied on Microsoft VPN and Azure VPN to access internal resources. While effective, these traditional models operate on an \u201call-or-nothing\u201d basis: once connected, employees gain broad access, regardless of role or security context.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cYears ago, the concept of a VPN was simple: a single virtual private network gave employees access to the company\u2019s entire internal network,\u201d says Pete Apple, a principal cloud network engineer in Microsoft Digital, the company\u2019s IT organization. \u201cToday, this model presents serious risks. If a user\u2019s identity or device is compromised\u2014or if a man-in-the-middle attack occurs\u2014the attacker can connect through the VPN and gain broad access to sensitive data, soft targets, and critical systems.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Gary-Triv.png\" alt=\"A photo of Triv.\" class=\"wp-image-20365\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Gary-Triv.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Gary-Triv-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Gary-Triv-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cOne of the primary reasons for this shift to GSA is that we get more granularity within this identity-based security solution that we can control access on a very fine level.\u201d<\/p>\n<cite><em>Gary Triv, principal network engineer, Microsoft Digital<\/em><\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">This creates challenges for organizations like ours\u2014and yours.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s where GSA can help.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It shifts the paradigm by introducing fine-grained, identity-based controls. Through deep integration with Microsoft Entra, administrators can enforce policies that adapt in real time, ensuring only the right users, devices, and conditions grant access to sensitive resources.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cOne of the primary reasons for this shift to GSA is that we get more granularity within this identity-based security solution that we can control access on a very fine level,\u201d says Gary Triv, a principal network engineer in Microsoft Digital.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The four pillars of GSA security<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our focus on security is built into everything we do.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cConditional access, identity-centric controls, and other core elements of Zero Trust are built directly into the solution,\u201d says Lalitha Mahajan, global technical program manager for Global Secure Access.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">At the heart of GSA are four foundational security features:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Conditional Access (CA):<\/strong> Unlike VPNs, which provide blanket access, CA enforces contextual rules to ensure role-appropriate access at all times. For example, an engineer may be allowed access to a security portal, while another user may only see Power BI dashboards.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Continuous Access Evaluation (CAE):<\/strong> Access control doesn\u2019t stop at login. CAE evaluates user context in real time. If an employee\u2019s role changes, their credentials are revoked, or they leave the company, their active sessions are immediately terminated.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Network Filtering:<\/strong> GSA allows administrators to define exactly where users can go on the internet or within corporate networks. This ensures employees have access only to approved destinations, reducing exposure to threats.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Compliant Network (CN):<\/strong> Access is tied to the source network. For instance, a device in Redmond may be allowed, but the same device in an untrusted region could be blocked automatically.<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Together, these pillars make GSA a secure and adaptive solution, fully aligned with the principles of Zero Trust.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cWith the Zero Trust model, our goal is to enforce least-privilege access. That means locking down internal resources, improving segmentation, and using firewalls and other controls so users can\u2019t reach everything by default,\u201d Apple says. \u201cInstead of relying on a blanket VPN network, we\u2019re moving to the Entra Global Secure Access model, which combines network and identity. Instead of granting broad visibility into the entire internal network, access can now be scoped to a user\u2019s identity\u2014so employees only connect to the resources defined for them.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Lalitha-Mahajan.png\" alt=\"A photo of Mahajan.\" class=\"wp-image-20366\" style=\"width:150px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Lalitha-Mahajan.png 500w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Lalitha-Mahajan-300x300.png 300w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/Lalitha-Mahajan-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\">\u201cUnlike traditional VPNs, GSA delivers both client-side and server-side insights, all of which we own. This gives us deeper visibility and allows us to make the data more actionable for our use cases.\u201d<\/p>\n<cite><em>Lalitha Mahajan, program manager, Microsoft Digital<\/em><\/cite><\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">A perfect example is a Microsoft developer\u2014one of our most common employee roles.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our developers may need access to specific source code, certain labs, and designated file shares. With GSA, we can grant access only to those resources\u2014and nothing else. This shift from a blanket &#8220;once connected, you can see everything&#8221; approach, to a tightly defined, identity-based model is a major security improvement and one of the most exciting reasons we&#8217;re moving forward with this product.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A key differentiator and critical Zero Trust enabler is GSA\u2019s rich telemetry, which provides real-time visibility into user activity, device health, and network traffic. This continuous stream of data enables early detection of threats, anomaly detection, and precise policy enforcement\u2014strengthening Zero Trust in practice.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cUnlike traditional VPNs, GSA delivers both client-side and server-side insights, all of which we own,\u201d Mahajan says. \u201cThis gives us deeper visibility and allows us to make the data more actionable for our use cases.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The key components of GSA<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Private Access is just one of three offerings that make up GSA. Together, these offerings are unified under a single client that creates three dedicated tunnels\u2014one for each service\u2014while administrators centrally define routing and policy rules. GSA consists of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Microsoft 365 Access:<\/strong> Optimized, policy-controlled connectivity for Office apps and services.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Internet Access:<\/strong> Secure browsing with TLS inspection, URL filtering, and content controls.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Private Access:<\/strong> A modern replacement for legacy VPNs that enable granular access to internal resources.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">For Internet Access, GSA supports two deployment models: branch connectivity, where IPSec tunnels secure traffic from devices without a client (like printers), and client connectivity, where the GSA client routes laptop or desktop traffic directly to the GSA Edge. Both approaches enforce consistent policies, differing only in how traffic reaches the framework.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advanced features and monitoring<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Unlike fragmented VPN and firewall logs, GSA provides consistent visibility through unified logging, which consolidates session data\u2014including user identity, device, source, destination, and applied policies\u2014into a single view. We can now easily validate whether security features are working as intended and forward logs to Microsoft Sentinel for extended monitoring.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This holistic view provides us with a major advantage against cyber threats, enabling faster investigations and clearer correlations between user behavior and network activity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our rollout of GSA is well underway internally at Microsoft. With more than 158,000 GSA client and Microsoft 365 users already onboard, the next phase will expand private access company-wide, followed by broader adoption of internet access. Early pilots have demonstrated strong results, with positive feedback on both usability and the ability to solve unique access challenges.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By delivering a complete, identity-based secure access solution\u2014spanning Microsoft 365, internet, and private connectivity\u2014Microsoft is redefining enterprise access for the cloud-first era. The result is a future where connectivity is not only seamless but also secure, adaptive, and tightly aligned with user identity and context.<\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png\" alt=\"\" class=\"wp-image-19493\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Key-takeaways-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Key takeaways<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Our experience transitioning to GSA Private Access has left us with several key insights that other enterprises can apply to their own efforts to modernize remote access:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Adopt least-privilege access: <\/strong>Move away from blanket network access to ensure employees only reach the resources they need.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Reduce risk from compromised accounts: <\/strong>Limit the blast radius of identity or device breaches by segmenting and scoping access.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Continuously evaluate trust: <\/strong>Treat access as dynamic, adapting in real time to changes in user roles, device health, or network conditions.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Improve visibility through telemetry: <\/strong>Use detailed activity and traffic data to spot anomalies early and strengthen security decisions.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Unify security and connectivity: <\/strong>Align access with identity and context, creating a balance between strong protection and seamless user experience.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png\" alt=\"\" class=\"wp-image-19492\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Try-it-out-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Try it out<\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-private-access?OCID=InsideTrack_Product_10751\" target=\"_blank\" rel=\"noreferrer noopener\">Sign up for a free trial of Microsoft Entra Private Access.<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png\" alt=\"\" class=\"wp-image-19491\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Related-links-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">Related links<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/global-secure-access\/overview-what-is-global-secure-access\" target=\"_blank\" rel=\"noreferrer noopener\">Find out more about Global Secure Access.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/global-secure-access\/concept-private-access\" target=\"_blank\" rel=\"noreferrer noopener\">Learn about Microsoft Entra Private Access.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-entra-blog\/microsoft-security-service-edge-now-generally-available\/3847828\" target=\"_blank\" rel=\"noreferrer noopener\">Try out Microsoft Security Service Edge.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-private-access\" target=\"_blank\" rel=\"noreferrer noopener\">Check out Microsoft Entra Private Access.<\/a><\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/architecture\/gsa-deployment-guide-intro\" target=\"_blank\" rel=\"noreferrer noopener\">Read the Microsoft Global Secure Access Deployment Guide.<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-c0392459 wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-container-core-group-is-layout-7db9d80f wp-block-group-is-layout-constrained\" style=\"padding-right:0;padding-left:0\">\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"190\" src=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png\" alt=\"\" class=\"wp-image-19490\" style=\"object-fit:cover;width:75px;height:75px\" srcset=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge.png 190w, https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/07\/Wed-like-to-hear-from-you-badge-150x150.png 150w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p class=\"has-body-xl-font-size wp-block-paragraph\" style=\"margin-top:var(--wp--preset--spacing--spacing-24);margin-bottom:0;padding-top:var(--wp--preset--spacing--spacing-24)\">We&#8217;d like to hear from you!<\/p>\n<\/div>\n\n\n\n<ul style=\"margin-top:var(--wp--preset--spacing--spacing-20)\" class=\"wp-block-list is-style-list-no-bullets\">\n<li class=\"wp-block-list-item\"><a href=\"mailto:msitstaff@microsoft.com\">Want more information? Email us and include a link to this story and we\u2019ll get back to you.<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ensuring safe and secure access to resources in the enterprise has always been a delicate balance. Protecting corporate assets from intrusions and misuse is paramount. But a system that neglects usability for employees creates frustration and inefficiencies. At Microsoft, we\u2019re in the midst of a major transformation in how we manage access to our corporate [&hellip;]<\/p>\n","protected":false},"author":220,"featured_media":20362,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":true,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[383,689,848],"coauthors":[877],"class_list":["post-20360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-azure-networking","tag-network-security","tag-security-and-risk-management","m-blog-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Transforming our VPN with Global Secure Access at Microsoft - Inside Track Blog<\/title>\n<meta name=\"description\" content=\"Learn we&#039;re using Global Secure Access to manage our VPN and remote access at Microsoft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Transforming our VPN with Global Secure Access at Microsoft - Inside Track Blog\" \/>\n<meta property=\"og:description\" content=\"Learn we&#039;re using Global Secure Access to manage our VPN and remote access at Microsoft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Inside Track Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-25T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-02T16:16:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/10751-Hero_image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2300\" \/>\n\t<meta property=\"og:image:height\" content=\"1293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leon Yen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leon Yen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/\"},\"author\":{\"name\":\"Leon Yen\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/e46f3e992fa54af48469250b30d708fa\"},\"headline\":\"Transforming our VPN with Global Secure Access at Microsoft\",\"datePublished\":\"2025-09-25T16:00:00+00:00\",\"dateModified\":\"2025-10-02T16:16:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/\"},\"wordCount\":1553,\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/09\\\/10751-Hero_image.jpg\",\"keywords\":[\"Azure networking\",\"Network Security\",\"Security and risk management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/\",\"name\":\"Transforming our VPN with Global Secure Access at Microsoft - Inside Track Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/09\\\/10751-Hero_image.jpg\",\"datePublished\":\"2025-09-25T16:00:00+00:00\",\"dateModified\":\"2025-10-02T16:16:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/e46f3e992fa54af48469250b30d708fa\"},\"description\":\"Learn we're using Global Secure Access to manage our VPN and remote access at Microsoft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/09\\\/10751-Hero_image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/uploads\\\/prod\\\/2025\\\/09\\\/10751-Hero_image.jpg\",\"width\":2300,\"height\":1293,\"caption\":\"We're using Global Secure Access to manage our VPN and remote access at Microsoft.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/transforming-our-vpn-with-global-secure-access-at-microsoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Transforming our VPN with Global Secure Access at Microsoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/\",\"name\":\"Inside Track Blog\",\"description\":\"How Microsoft does IT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/#\\\/schema\\\/person\\\/e46f3e992fa54af48469250b30d708fa\",\"name\":\"Leon Yen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ab9cf97961dbaa4e72f8a4b65b058699898b827fa51b3f33bfcc04413f2c484?s=96&d=mm&r=g061960f3618169f72de6df0dd5ce4358\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ab9cf97961dbaa4e72f8a4b65b058699898b827fa51b3f33bfcc04413f2c484?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1ab9cf97961dbaa4e72f8a4b65b058699898b827fa51b3f33bfcc04413f2c484?s=96&d=mm&r=g\",\"caption\":\"Leon Yen\"},\"url\":\"https:\\\/\\\/www.microsoft.com\\\/insidetrack\\\/blog\\\/author\\\/lyen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transforming our VPN with Global Secure Access at Microsoft - Inside Track Blog","description":"Learn we're using Global Secure Access to manage our VPN and remote access at Microsoft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/","og_locale":"en_US","og_type":"article","og_title":"Transforming our VPN with Global Secure Access at Microsoft - Inside Track Blog","og_description":"Learn we're using Global Secure Access to manage our VPN and remote access at Microsoft.","og_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/","og_site_name":"Inside Track Blog","article_published_time":"2025-09-25T16:00:00+00:00","article_modified_time":"2025-10-02T16:16:30+00:00","og_image":[{"width":2300,"height":1293,"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/10751-Hero_image.jpg","type":"image\/jpeg"}],"author":"Leon Yen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Leon Yen","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/"},"author":{"name":"Leon Yen","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/e46f3e992fa54af48469250b30d708fa"},"headline":"Transforming our VPN with Global Secure Access at Microsoft","datePublished":"2025-09-25T16:00:00+00:00","dateModified":"2025-10-02T16:16:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/"},"wordCount":1553,"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/10751-Hero_image.jpg","keywords":["Azure networking","Network Security","Security and risk management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/","name":"Transforming our VPN with Global Secure Access at Microsoft - Inside Track Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/10751-Hero_image.jpg","datePublished":"2025-09-25T16:00:00+00:00","dateModified":"2025-10-02T16:16:30+00:00","author":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/e46f3e992fa54af48469250b30d708fa"},"description":"Learn we're using Global Secure Access to manage our VPN and remote access at Microsoft.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/#primaryimage","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/10751-Hero_image.jpg","contentUrl":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/10751-Hero_image.jpg","width":2300,"height":1293,"caption":"We're using Global Secure Access to manage our VPN and remote access at Microsoft."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/transforming-our-vpn-with-global-secure-access-at-microsoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/insidetrack\/blog\/"},{"@type":"ListItem","position":2,"name":"Transforming our VPN with Global Secure Access at Microsoft"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#website","url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/","name":"Inside Track Blog","description":"How Microsoft does IT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/insidetrack\/blog\/#\/schema\/person\/e46f3e992fa54af48469250b30d708fa","name":"Leon Yen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1ab9cf97961dbaa4e72f8a4b65b058699898b827fa51b3f33bfcc04413f2c484?s=96&d=mm&r=g061960f3618169f72de6df0dd5ce4358","url":"https:\/\/secure.gravatar.com\/avatar\/1ab9cf97961dbaa4e72f8a4b65b058699898b827fa51b3f33bfcc04413f2c484?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1ab9cf97961dbaa4e72f8a4b65b058699898b827fa51b3f33bfcc04413f2c484?s=96&d=mm&r=g","caption":"Leon Yen"},"url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/author\/lyen\/"}]}},"jetpack_featured_media_url":"https:\/\/www.microsoft.com\/insidetrack\/blog\/uploads\/prod\/2025\/09\/10751-Hero_image.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9hcZA-5io","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/20360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/users\/220"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/comments?post=20360"}],"version-history":[{"count":4,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/20360\/revisions"}],"predecessor-version":[{"id":20474,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/posts\/20360\/revisions\/20474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media\/20362"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/media?parent=20360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/categories?post=20360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/tags?post=20360"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/insidetrack\/blog\/wp-json\/wp\/v2\/coauthors?post=20360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}