@NTFAQGuy

Lets dive into the Entra secure web gateway solution, Microsoft Entra Internet Access! Please make sure to read the description for the chapters and key information about this video and others.

⚠ P L E A S E   N O T E ⚠

🔎 If you are looking for content on a particular topic search the channel. If I have something it will be there!
🕰 I don't discuss future content nor take requests for future content so please don't ask 😇
🤔  Due to the channel growth and number of people wanting help I no longer can answer or even read questions and they will just stay in the moderation queue never to be seen so please post questions to other sites like Reddit, Microsoft Community Hub etc.
👂 Translate the captions to your native language via the auto-translate feature in settings! https://youtu.be/v5b53-PgEmI for a demo of using this feature.

Thanks for watching!
🤙

@saeednrzadeh4754

I just do not know what we should do without these very easy to understand videos , Microsoft documentation only make sense after watching John's video.  I guess these days Microsoft documentation is too much talk and heavy to understand . Thanks John

@butztanx

Listened to a podcast about GSE last week and knew it was going to be something I need to put in place within our business. I searched straight for Jon Savill knowing fine well that this quality content would be available. Another superb video Jon. Thanks as always!

@Semtx552

what a successor vid to the first vid on global secure access! 
thanks so much John!

@christianpetrik7533

Waited for this. You never disappoint :)

@davidgorman994

Very useful. You seem to be using an updated version of the client that I am. The version I used didn't really show if you were connected to the services or not. This is very welcome.

@nerdegem

Looks like an interesting challenge to services such as CloudFlare Argo tunnels and Tailscale networks, as well as traditional VPNs with split tunnelling.

@bshwjt

You made that easy John.

@NeilSearle

Interesting tech, could solve some problems in my environment thanks for the walk through!

@Dikimkd

Thanks for this, very fun demo and great overall video.

@webclanka4490

Thanks for the great explanation!

@HARPzC

Great Video John! Very interesting. I can see this possibly replacing our Forcepoint Web Filter Agents on our end user devices?!

@Lenaandyara

This is great! Wish it can go to all different browsers such as google chrome and Firefox

@christianibiri

Awesome video!! lot of useful information!. Thank you!!!

@ilannknochen

Awesome as usual!

@ultrakicksv1

This is wonderful, however this breaks internal applications causing a DNS issues that I am still trying to determine how to fix this.

@antaskew7079

great content as always John, qq..does the 65000 weighted profile trump all/any other policy (possibly conflicting) setting ? 
thanks in advance and happy new year !

@ArchitectinginAzure

Thanks for another great demo. I am assuming we can add block all rule to priority 6500 security profile to block any traffic that is outside the explicit rules.

@adelettouati4820

**Merci beaucoup**  Thanks John *

@PatrickMPatrickm

Signing out of the agent gives unfiltered internet access? I assume sign out capability will be restricted for standard users?