Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This guide is the operational foundation for running Microsoft Entra Global Secure Access (GSA). Start here to establish the team structure, change management process, metrics framework, and reporting cadence that every capability guide builds on. The capability guides assume you have these cross-cutting practices in place.
For capability-specific operations, see the individual guides:
- Private Access operations
- Internet Access operations
- Remote Networks operations
- Microsoft Traffic operations
For initial deployment and configuration, see the Global Secure Access deployment guide. For identity-layer security investigations and incident response, see the Microsoft Entra Security Operations Guide.
Roles and responsibilities
The following section lists the roles that operate GSA and presents a Responsible / Accountable / Consulted / Informed (RACI) matrix that maps each operational activity to the role that owns it.
RACI matrix
Assign clear ownership for GSA operations. The following RACI matrix defines who is Responsible, Accountable, Consulted, and Informed for key operational activities.
| Activity | Service Owner | Network Security Engineer | Identity Engineer | SOC Analyst | IT Support / Help desk | Platform Ops / Monitoring |
|---|---|---|---|---|---|---|
| Approve policy changes | A | R | C | C | I | I |
| Configure access policies | I | R | C | C | — | I |
| Manage Conditional Access policies for GSA | I | C | R | C | — | I |
| Manage GSA service principals and enterprise apps | I | C | R | — | — | I |
| Troubleshoot authentication and sign-in failures | I | C | R | C | C | I |
| Monitor alerts and health | I | C | C | R | — | R |
| Respond to connector/tunnel alerts | A | R | I | I | I | R |
| Investigate security incidents | I | C | C | R | — | C |
| Handle user access issues (Tier 1) | — | C | C | — | R | — |
| Manage configuration backups | A | R | C | — | — | R |
| Conduct change reviews | A | R | C | C | I | C |
| Perform failover testing | A | R | C | — | I | R |
| Manage role-based access control (RBAC) and admin access | A | R | C | C | — | — |
| Produce operational reports | A | C | C | C | — | R |
| Drive continuous improvement | A | R | C | C | I | R |
Role descriptions
| Role | Key responsibilities |
|---|---|
| Service Owner / GSA Administrator | Overall accountability for GSA performance, compliance, and alignment with business requirements. Approves significant changes. Coordinates across identity, endpoint, and networking teams. |
| Network Security Engineer | Day-to-day administration: access policies, routing rules, connector/tunnel management, certificate management. Tests changes before production deployment. Escalation point for complex IT Support/Help desk issues. |
| Identity Engineer / Identity Team | Owns the Microsoft Entra ID tenant as it intersects with GSA. Manages Conditional Access policies that gate GSA traffic profiles and compliant-network enforcement. Administers GSA service principals and enterprise app registrations (CRUD). Troubleshoots authentication, token, and sign-in failures using Microsoft Entra sign-in logs. Partners with SOC Analyst on identity-related incidents. |
| SOC Analyst | Monitors security alerts. Investigates suspicious events. Fine-tunes analytics rules in Sentinel. Handles or escalates GSA-related security incidents. For detailed SecOps procedures, see the Microsoft Entra Security Operations Guide. |
| IT Support / Help desk | Tier-1 support for user access issues (client installation, connectivity problems). Follows runbooks and escalates to Network Security Engineer for complex issues. |
| Platform Ops / Monitoring Engineer | Oversees infrastructure health: dashboards, connector/tunnel uptime, automation scripts, and configuration backup processes. |
Tip
Cross-train at least two people for each role to avoid single points of failure. Document escalation paths and on-call rotations for after-hours coverage.
Change management
Apply a consistent change management process for all GSA configuration changes, including a category framework, execution procedures, and a configuration backup strategy.
Change categories
| Category | Definition | Examples | Approval required | Maintenance window |
|---|---|---|---|---|
| Standard | Routine, low-risk changes that follow a preapproved procedure | Adding users to an existing policy group, updating a URL in an allow list | Preapproved (no per-change approval) | No |
| Normal | Changes that could affect service behavior and require review | Modifying web filtering policies, adding application segments, changing traffic forwarding rules | Service Owner or Change Advisory Board | Recommended |
| Emergency | Urgent changes to address an active threat or outage | Blocking a malicious URL category, disabling a compromised connector | Execute immediately; document and review after | No (but post-change review required) |
| Major | High-impact changes affecting many users or core architecture | Enabling a new traffic profile, restructuring connector groups, onboarding a major site | Change Advisory Board | Required |
Important
Standard changes are preapproved at the category level, not the change level. Each Standard change—especially allow-list additions and removals—must still record an explicit owner approval in the ITSM ticket, set an expiration or review date so entries don't become permanent by default, and be captured in the audit log. Without these guardrails, the "preapproved" path becomes an audit gap.
Change execution process
For normal and major changes:
- Submit a change request—Document the change description, rationale, affected components, risk assessment, rollback plan, and testing results. Use the change request template.
- Test in a non-production environment—If possible, validate the change in a test tenant or with a pilot user group.
- Gain approval—Route to the Service Owner (for normal changes) or Change Advisory Board (for major changes).
- Back up current configuration—Export the affected configuration using Graph API before making changes. See the configuration export scripts in each capability guide.
- Communicate—Notify affected users and support teams. Use the communication plan template for major changes.
- Execute during maintenance window—For service-affecting changes, schedule during low-usage hours.
- Verify—Confirm the change works as intended. Check traffic logs, alert status, and user connectivity.
- Document—Record the change outcome in your IT service management (ITSM) system. Close the change request.
For emergency changes:
- Execute the change immediately to address the threat or outage.
- Document the change within 24 hours (use the change request template retrospectively).
- Review in the next scheduled change management meeting.
- Update procedures if the emergency revealed a gap.
Configuration backup strategy
GSA configuration lives in two places:
- GSA-specific Graph resources: connector groups, traffic forwarding profiles, remote networks, and filtering policies.
- Surrounding Microsoft Entra ID objects that gate and support GSA: Conditional Access policies, named locations, service principals, and app role assignments.
Use two complementary mechanisms: Graph API JSON exports for GSA-specific resources and long-term retention, and the Microsoft Entra Backup and Recovery APIs for tenant-wide Microsoft Entra ID objects and scoped restore.
GSA-specific resources — Graph API JSON export
Back up GSA configurations on a weekly automated schedule and before every normal or major change. Use the Graph API PowerShell export scripts in each capability guide:
- Private Access configuration (for example, connector groups, application segments)
- Internet Access configuration (for example, web filtering policies)
- Remote Networks configuration
- Microsoft Traffic profile configuration
GSA-related Microsoft Entra ID objects — Microsoft Entra Backup and Recovery
Microsoft Entra ID provides a native Backup and Recovery service (beta) that takes an automatic daily snapshot of supported directory objects and allows scoped restore. The snapshots cover objects that directly affect GSA:
- Conditional Access policies—policies that gate GSA traffic profiles and compliant-network enforcement
- Named location policies—named locations referenced by CA rules (including the GSA-managed compliant network location)
- Applications and service principals—GSA enterprise apps, app registrations, and linked managed identities
- App role assignments and OAuth2 permission grants—delegated/application permissions granted to GSA
- Users and groups—for role-assignable and app-assigned groups used by GSA policies
Important
Microsoft Entra retains five days of snapshots and takes one snapshot per day. Snapshots are noneditable and can't be exported. Continue running the GSA-specific JSON exports in a versioned store (Git repo or Azure Storage with soft delete) for long-term retention, audit trails, and point-in-time exports outside the five-day window.
Note
The Backup and Recovery APIs are in /beta and not supported for production use per Microsoft Graph versioning policy. Track GA announcements before building hard dependencies in recovery runbooks.
Required Entra roles and permissions:
Microsoft Entra Backup Reader—list snapshots, view jobs, retrieve changes (delegated to the Identity Engineer and SOC Analyst roles)Microsoft Entra Backup Administrator—create preview jobs, create recovery jobs. Cancel jobs (restrict to named break-glass / change-approved operators)- Graph permissions: see the individual API reference topics under
microsoft.graph.entraRecoveryServices
Tip
Always run a preview job with scoped filters before executing a recovery job. Only one job (preview or recovery) can run per tenant at a time, so coordinate across the Identity and Network Security Engineer roles during an incident.
Suggested playbooks:
| Playbook | Purpose | Key Graph call |
|---|---|---|
| Get-GsaEntraSnapshot.ps1 | List the most recent snapshots and record the ID used in an incident ticket. | GET /directory/recovery/snapshots |
| Start-GsaEntraRecoveryPreview.ps1 | Create a scoped preview job for Conditional Access policies, named locations, and GSA service principals. Scope defaults to the GSA-relevant entity types; override with -EntityTypes when needed. |
POST /directory/recovery/snapshots/{id}/recoveryPreviewJobs |
| Invoke-GsaEntraRecovery.ps1 | After the preview is reviewed and approved, execute the recovery job with the same filter scope and log the outcome. Requires -Force or interactive confirmation. |
POST /directory/recovery/snapshots/{id}/recoveryJobs |
Each playbook is authored in the numbered playbook format used across the guide (see script .NOTES header for Trigger, Required permissions, and references). For the end-to-end concept, see Microsoft Entra Backup and Recovery overview.
Important
Store the GSA JSON exports in a secured location with versioning enabled (for example, an Azure Storage account with soft delete, or a Git repository). Retain at least 30 days of GSA-specific exports. Treat the Entra snapshot history as an extra five-day safety net, not a replacement.
Metrics and reporting
Metrics framework
Track operational metrics across all GSA capabilities. Each capability guide defines capability-specific key performance indicators (KPIs). This section provides the cross-cutting framework and reporting cadence.
Cross-cutting metrics
| Metric | How to measure | Target |
|---|---|---|
| Overall GSA service availability | % time at least one operational path exists for each capability | > 99.9% |
| Change success rate | Changes without rollback or incident / total changes | > 95% |
| Mean time to detect (MTTD) | Time from issue occurrence to alert firing | < 5 minutes |
| Mean time to respond (MTTR) | Time from alert to initial response action | < 15 minutes (business hours) |
| Mean time to resolve | Time from alert to issue fully resolved | < 4 hours (P1), < 8 hours (P2) |
| Configuration backup compliance | Successful automated backups / scheduled backups | 100% |
| RBAC hygiene | % of admin accounts reviewed in the current quarter | 100% |
| Alert noise ratio | False positive or informational alerts / total alerts | < 20% |
Important
During the first 30 days after deployment, establish performance baselines for each metric before setting alert thresholds. Use baseline data from normal operations to calibrate targets—this practice prevents alert fatigue from overly aggressive thresholds. Revisit baselines quarterly as your environment evolves.
Cross-cutting metric alerts
Aim to back every cross-cutting metric with an automated alert when it breaches its target. Where an automated signal isn't yet available (for example, change success rate, which depends on ITSM data), schedule a structured manual review and track converting it to an automated signal as an improvement action.
| Metric breach | How to detect | Where you see it | What to do next |
|---|---|---|---|
| Backup job failure or missed schedule | Azure Automation watchdog runbook (Test-GsaBackupCompliance.ps1) runs daily and checks for failed or missing backup jobs | Alert email to your ops distribution list; Automation Account job history in the Azure portal | 1. Check the failed job output in the Automation Account. 2. Run the backup manually. 3. Fix the root cause (expired credentials, API throttling, storage quota). 4. Confirm the next scheduled run succeeds. |
| RBAC review overdue (< 100% this quarter) | Scheduled runbook (Test-GsaRbacHygiene.ps1) runs weekly and queries Graph API for unreviewed admin role assignments | Alert email listing overdue accounts and their roles | 1. Review each flagged assignment in Microsoft Entra ID under Roles and administrators. 2. Confirm that the role is still required and least-privileged, or remove access. 3. Update the RBAC review log with the review date. 4. If your organization uses Identity Governance, you can use Access Reviews or Privileged Identity Management role reviews for the same control. |
| Alert noise ratio > 20% | Scheduled runbook (Test-GsaAlertNoiseRatio.ps1) runs weekly and queries Sentinel incident classifications | Alert email with noise ratio and top noisy analytics rules | 1. Open Sentinel > Analytics. 2. Tune or add exclusions to the noisiest rules. 3. Reassess after the next reporting period. |
| Change success rate < 95% | Manual—review your ITSM change records monthly | Your ITSM system (ServiceNow, Jira Service Management, or equivalent) | 1. Identify failed or rolled-back changes. 2. Conduct root cause analysis on each. 3. To prevent recurrence, update change procedures to address gaps. 4. Report findings in the quarterly ops review. |
| MTTD > 5 min or MTTR > 15 min | Sentinel analytics rule on incident response times | Sentinel Incidents dashboard; alert email if rule fires | 1. Review the slow-response incidents. 2. Check if alert routing or on-call assignment caused the delay. 3. Adjust notification channels or escalation paths. |
Tip
Deploy the three automation runbooks (Test-GsaBackupCompliance.ps1, Test-GsaRbacHygiene.ps1, Test-GsaAlertNoiseRatio.ps1) to an Azure Automation Account with a system-assigned managed identity. Grant the identity Log Analytics Reader on your workspace, Automation Job Operator on the Automation Account, and the Microsoft Graph permissions RoleManagement.Read.Directory and Mail.Send. Schedule each runbook on its recommended cadence (daily for backup compliance, weekly for the others).
Reporting cadence
| Audience | Cadence | Content | Format |
|---|---|---|---|
| Operations team | Weekly | Alert summary, health check results, open incidents, upcoming changes | Dashboard or brief email |
| Service Owner / Management | Monthly | Service availability trends, security efficacy (threats blocked), change success rate, capacity outlook | Slide deck or executive dashboard |
| Security leadership | Quarterly | Threat landscape impact, compliance posture, policy efficacy, cross-product integration value | Executive summary report |
| Continuous improvement review | Quarterly | Metric trends, incident postmortems, improvement action items, capacity planning | Meeting with action items |
Reporting tools
The following tools provide operational visibility across all GSA capabilities. Configure dashboards for trend analysis and management reporting—primary issue detection should come from the alerts defined in each capability guide.
Global Secure Access dashboard
The built-in Global Secure Access dashboard in the Microsoft Entra admin center provides a single-pane overview of all traffic flowing through the service. Navigate to Global Secure Access > Dashboard to view:
- Traffic volume and trends across all profiles (Private Access, Internet Access, Microsoft Traffic)
- Top users and destinations
- Cross-tenant access activity
- Device status summary
Traffic logs
The traffic logs provide session-level detail for all GSA traffic. Navigate to Global Secure Access > Monitor > Traffic logs to filter by user, destination, policy action, and connection status. Traffic logs are also available in Log Analytics via the NetworkAccessTraffic table for Kusto Query Language (KQL) queries.
Remote network health logs
The remote network health logs provide tunnel-level status and connectivity data for all branch sites. Navigate to Global Secure Access > Monitor > Remote network health logs to view:
- Tunnel connectivity status (connected, disconnected) per remote network
- Last state change timestamps
- Border Gateway Protocol (BGP) route status for each tunnel
- Source and destination IP addresses
Remote network health data is also available in Log Analytics via the RemoteNetworkHealthLogs table. Use this data for historical trend analysis and automated alerting on tunnel health.
Enriched Microsoft 365 logs
The enriched Microsoft 365 logs augment standard Microsoft 365 audit events with network context from GSA (source IP, device, user agent). Navigate to Global Secure Access > Monitor > Enriched Microsoft 365 logs to correlate Microsoft 365 activity with network-level details. These logs require the Microsoft traffic profile to be enabled.
Alerts
The Global Secure Access alerts view surfaces platform-level issues, including unhealthy connectors, configuration changes to traffic forwarding, and integration alerts from third-party security services. Navigate to Global Secure Access > Monitor > Alerts. When exported via Microsoft Entra diagnostic settings (NetworkAccessAlerts category), alerts are available in Log Analytics via the NetworkAccessAlerts table for KQL queries and Sentinel analytics rules.
Microsoft Sentinel workbooks
The Global Secure Access workbook in Microsoft Sentinel provides advanced operational dashboards with KQL-driven visualizations for traffic volume, denied sessions, and compliant network coverage. To access:
- In Microsoft Sentinel, go to Threat management > Workbooks.
- Search for Global Secure Access and open the workbook.
Note
The workbook requires the Global Secure Access solution from the Microsoft Sentinel content hub. If the workbook isn't visible, go to Content management > Content hub, search for Global Secure Access, and install the solution.
Pin frequently used views to a shared Azure dashboard for team-wide visibility.
Security Copilot
Use Microsoft Security Copilot to speed cross-product investigation and correlation when an alert spans Entra, Global Secure Access, and Microsoft Sentinel data sources. Don't use it as a replacement for the dashboards, logs, and alerting workflows described earlier in this section.
Prompt examples:
- "Summarize the last 24 hours of Global Secure Access incidents by correlating Microsoft Entra sign-in logs, Global Secure Access traffic logs, and Microsoft Sentinel incidents; group the findings by user, application, and policy, and identify the likely root cause for each cluster."
- "Compare the last seven days of Global Secure Access alerts to the previous 30-day baseline and highlight the top anomalies across denied sessions, connector health, and Conditional Access failures."
- "Show me Global Secure Access configuration changes in the last 24 hours that coincide with a spike in user access failures or Microsoft Sentinel incidents."
Graph API and PowerShell
Automate report generation with custom scripts that query Log Analytics via the Azure Monitor Query API and output formatted reports. See the automated weekly report playbook for an example.
Automated weekly report (example playbook)
Playbook 1: Automated weekly operations report
| Field | Value |
|---|---|
| Trigger | Azure Automation scheduled runbook (every Monday 06:00 UTC) |
| Frequency | Weekly |
| Required permissions | Log Analytics Reader on the GSA Log Analytics workspace; Mail.Send Graph API permission for the managed identity or service principal running the runbook |
| Steps | 1. Connect to Azure using the Automation Account managed identity. 2. Query Log Analytics for the past seven days across all GSA capabilities (total alerts by severity from NetworkAccessAlerts, total and failed traffic sessions from NetworkAccessTraffic, Global Secure Access sign-ins from SigninLogs filtered on IsThroughGlobalSecureAccess, and remote network tunnel status from RemoteNetworkHealthLogs).3. Format the results into an HTML email body. 4. Send the report via Microsoft Graph Send-MgUserMail to the operations distribution list.5. Log the execution result to the Automation Account job output. |
| Script | See the runbook code that follows. |
# Weekly GSA Operations Report — Azure Automation Runbook
Connect-AzAccount -Identity
$workspaceId = "<your-log-analytics-workspace-id>"
$query = @"
let timeRange = 7d;
union
(NetworkAccessAlerts | where TimeGenerated > ago(timeRange) | summarize AlertCount=count() by AlertSeverity=tostring(Severity)),
(NetworkAccessTraffic | where TimeGenerated > ago(timeRange) | summarize TotalSessions=count(), FailedSessions=countif(ConnectionStatus == "Failed")),
(SigninLogs | where TimeGenerated > ago(timeRange) and IsThroughGlobalSecureAccess == true | summarize TotalSignIns=count(), FailedSignIns=countif(ResultType != "0")),
(RemoteNetworkHealthLogs | where TimeGenerated > ago(timeRange) | summarize ConnectedTunnels=countif(Status == "tunnelConnected"), DisconnectedTunnels=countif(Status == "tunnelDisconnected"))
"@
$results = Invoke-AzOperationalInsightsQuery -WorkspaceId $workspaceId -Query $query
# Format $results into HTML and send via Send-MgUserMail
Tip
Store report templates in your configuration backup repository. Update them as you add new metrics or capabilities.
Continuous improvement
Quarterly operations review
Conduct a quarterly review covering the following areas. Assign an owner and due date for every action item.
| Area | What to review |
|---|---|
| Metrics | Cross-cutting and capability-specific metric trends (improving, degrading, stable) |
| Incident postmortems | Root cause, detection method, response timeline, and recurrence prevention for each significant incident |
| Policy effectiveness | Alignment with business and compliance requirements; identify gaps or over-blocking |
| Capacity planning | Growth trends for connectors, tunnels, and licenses; plan expansions for next quarter |
| Feature adoption | Results of the monthly new feature and functionality review; schedule testing and adoption for approved candidates |
| Process improvement | Operational pain points; assign corrective action items |
New feature and functionality review
Run a structured feature review every month and bring the outcome into the quarterly operations review. Use this review to track new Global Secure Access capabilities, preview announcements, deprecations, client and connector release changes, and any documented behavior changes that affect your operating model.
| Cadence | Role | Automated by | Procedure | What to do next |
|---|---|---|---|---|
| Monthly | Service Owner + Network Security Engineer + Identity Engineer | Manual—documentation review | Review two sources for new features, preview announcements, deprecations, release notes, and breaking changes across all GSA capabilities: What's new in Microsoft Entra and the Global Secure Access documentation. Record each relevant item and map it to the affected capability guide. Assess operational impact, prerequisites, licensing impact, and rollout risk. | Create change requests for features that improve security posture or operational efficiency. Schedule testing for approved candidates, track preview items on the roadmap, and update runbooks, alert thresholds, and operating procedures when Microsoft changes service behavior or retires functionality. |
Tip
Use the capability guides to capture feature-specific actions after the shared review. For example, update Private Access operations, Internet Access operations, Remote Networks operations, or Microsoft Traffic operations when a change affects only one capability.
Training and knowledge sharing
- Schedule quarterly knowledge-sharing sessions, especially after major GSA feature releases.
- Monitor the Microsoft Tech Community for Global Secure Access and the Global Secure Access documentation for updates.
- Stay informed via Microsoft Entra what's new for feature announcements and deprecation notices.
- Track three release notes so your team keeps current with connector and client versions, new features, and update requirements:
Tip
Treat your guides and runbooks as living documents—update troubleshooting references after every significant incident, and update procedures after every change review. Version-control all documentation.
Adapting to organizational changes
Review your GSA capacity and configuration when:
| Trigger | Action |
|---|---|
| Merger, acquisition, or divestiture | Assess new users, sites, and applications. Plan capacity and policy updates. |
| New office or branch site | Evaluate whether to use client-based access or remote network (GRE/IPsec) connectivity. See Remote Networks operations. |
| Significant remote workforce growth | Verify connector and license capacity. Review Private Access performance baselines. |
| New cloud application adoption | Verify the application is properly classified in web filtering policies. Add application segments if needed for Private Access. |
| Regulatory or compliance changes | Review policies for alignment. Update reporting to cover new compliance requirements. |
Related content
- Private Access operations
- Internet Access operations
- Remote Networks operations
- Microsoft Traffic operations
- Change request template
- Communication plan template
- Daily health check template
- Private Access health check template
- Global Secure Access documentation
- GSA Deployment Guide
- Microsoft Entra Security Operations Guide