📄️ Overview Network Pillar
Implementation Effort: High
📄️ Stop buying or building Active Directory dependent apps
Implementation Effort: Low
📄️ Enable QuickAccess and Deploy Connectors
Implementation Effort: Medium
📄️ Migrate key remote apps to QuickAccess & enable private DNS
Implementation Effort: Medium
📄️ Secure remote app access with modern security controls (MFA/Device Trust)
Implementation Effort: Low
📄️ Bring all legacy apps under full governance lifecycle
Implementation Effort: High
📄️ Complete migration of apps to Private Access or Application Proxy
Implementation Effort: Medium
📄️ Header Decommission VPN infrastructure
Implementation Effort: Low
📄️ Design and Implement SDWAN capabilties
Implementation Effort: High
📄️ Roll out GSA client to all managed devices
Implementation Effort: Low
📄️ Discover App Usage and plan for App Segmentation
Implementation Effort: Medium
📄️ Define Segmentation Strategy
Implementation Effort: Medium
📄️ Rollout App Segments for Macro Segmentation
Implementation Effort: Medium
📄️ Secure sensitive legacy AppAccess with PIM
Implementation Effort: Low
📄️ Rollout / Implement Application Segments for Macro-segmentation based on business needs
Overview
📄️ Implement B2B guest access controls for partner access (Global Secure Access)
Implementation Effort: Medium
📄️ Implement Microsoft Entra Private Access for Active Directory domain controllers
Implementation Effort: Medium
📄️ Define legacy protection and enforcement
Implementation Effort: Medium
📄️ Implement Intelligent Local Access for Private Access
Implementation Effort: Medium
📄️ Monitoring: Leverage and monitor Traffic Logging
Implementation Effort: Low
📄️ Monitoring: Review GSA Audit Logs
Implementation Effort: Medium
📄️ Monitoring: Export Traffic and Audit logs to external SIEM solution
Implementation Effort: Medium
📄️ Monitoring: Leverage GSA Azureworkbooks
Implementation Effort: Low
📄️ Monitoring: Leverage GSA Sentinel integration
Implementation Effort: Low
📄️ Monitoring: Monitor and scale out
Implementation Effort: Medium
📄️ Define your SaaS app and Internet Access protection policy
Implementation Effort: Medium
📄️ Base SWG: Onboard M365 traffic
Implementation Effort: Low
📄️ Base SWG: Update Conditional Access policies to leverage Compliant Network controls
Implementation Effort: Low
📄️ Base SWG: Review and Redesign existing Internet Access filtering policies
Implementation Effort: Medium
📄️ Base SWG: Onboard Internet Access Secure Web Gateway capabilities
Overview
📄️ Configure web content filtering and URL filtering (Preview)
Implementation Effort: Medium
📄️ Implement Microsoft Entra Internet Access (Secure Web Gateway)
Implementation Effort: High
📄️ Roll out GSA client to all managed devices
Implementation Effort: Low
📄️ Protect M365: Implement Universal Tenant Restrictions to protect Auth and Data Plane for M365
Implementation Effort: Medium
📄️ Protect M365: Enable GSA Signaling for Conditional Access
Implementation Effort: Low
📄️ Protect M365: Implement for Guest Access in AVD and W365 (MS Roadmap)
Overview
📄️ Advanced SWG: Enable and Configure TLS inspection
Implementation Effort: Medium
📄️ Configure network content filtering with file policies (Preview)
Implementation Effort: Medium
📄️ Advanced SWG: Implement Threat Intelligence filtering
Implementation Effort: Low
📄️ Integrate Netskope Advanced Threat Protection and Data Loss Prevention
Implementation Effort: Medium
📄️ Advanced SWG: Implement Cloud Firewall capabilities (MS Roadmap)
Overview
📄️ Advanced SWG: Design and Implement SDWAN capabilties
Implementation Effort: High
📄️ Agentless SWG: Onboard M365 traffic remote or agentless network segments
Implementation Effort: Medium
📄️ Agentless SWG: Update CA policies to leverage Compliant Network controls
Implementation Effort: Low
📄️ Configure Internet Access for remote networks (branch offices)
Implementation Effort: Medium
📄️ Monitoring: Leverage and monitor Traffic Logging
Implementation Effort: Low
📄️ Monitoring: Review GSA Audit Logs
Implementation Effort: Medium
📄️ Monitoring: Export Traffic and Audit logs to external SIEM solution
Implementation Effort: Medium
📄️ Monitoring: Leverage GSA Azureworkbooks
Implementation Effort: Low
📄️ Monitoring: Review remote network health logs
Implementation Effort: Low
📄️ Monitoring: Leverage GSA Sentinel integration
Implementation Effort: Low
📄️ Monitoring: Monitor and scale out
Implementation Effort: Medium
📄️ Discover and Assess Public Network Endpoints/Resources
Implementation Effort: Medium
📄️ Create an Azure DDoS Protection Plan for VNETs / Enable Azure DDoS Protection for Public IPs
Implementation Effort: Low
📄️ Simulate DDoS Attacks to ensure readiness
Implementation Effort: Low
📄️ Automate Governance, Monitoring, and Response for Azure DDoS Protection
Implementation Effort: Medium
📄️ Evaluate Network Traffic Flows
Implementation Effort: Medium
📄️ Deploy Azure Firewall and route all outbound and inbound traffic through it
Implementation Effort: High