Step 2. Provide remote access to on-premises apps and services

If your organization uses a remote access VPN solution, typically with VPN servers on the edge of your network and VPN clients installed on your users' devices, your users can use remote access VPN connections to access on-premises apps and servers. But you may need to optimize traffic to Microsoft 365 cloud-based services.

If your users do not use a VPN solution, you can use Microsoft Entra application proxy and Azure Point-to-Site (P2S) VPN to provide access, depending on whether all your apps are web-based.

Here are the primary configurations for remote access:

  • You are already using a remote access VPN solution.
  • You are not using a remote access VPN solution and you want your remote workers to use their personal computers.
  • You are not using a remote access VPN solution, you have hybrid identity, and you need remote access only to on-premises web-based apps.
  • You are not using a remote access VPN solution and you need access to on-premises apps, some of which are not web-based.

See this flowchart for the remote access configuration options discussed in this article.

Remote access configuration flowchart.

With remote access connections, you can also use Remote Desktop to connect your users to an on-premises PC. For example, a remote worker can use Remote Desktop to connect to the PC in their office from their Windows, iOS, or Android device. Once they are remotely connected, they can use it as if they were sitting in front of it.

Optimize performance for remote access VPN clients to Microsoft 365 cloud services

If your remote workers are using a traditional VPN client to obtain remote access to your organization network, verify that the VPN client has split tunneling support.

Without split tunneling, all of your remote work traffic gets sent across the VPN connection, where it must be forwarded to your organization’s edge devices, get processed, and then sent on the Internet.

Network traffic from VPN clients without tunneling.

Microsoft 365 traffic must take an indirect route through your organization, which could be forwarded to a Microsoft network entry point far away from the VPN client’s physical location. This indirect path adds latency to the network traffic and decreases overall performance.

With split tunneling, you can configure your VPN client to exclude specific types of traffic from being sent over the VPN connection to the organization network.

To optimize access to Microsoft 365 cloud resources, configure your split tunneling VPN clients to exclude traffic to the Optimize category Microsoft 365 endpoints over the VPN connection. For more information, see Office 365 endpoint categories. See this list of Optimize category endpoints.

Here is the resulting traffic flow, in which most of the traffic to Microsoft 365 cloud apps bypasses the VPN connection.

Network traffic from VPN clients with tunneling.

This allows the VPN client to send and receive crucial Microsoft 365 cloud service traffic directly over the Internet and to the nearest entry point into the Microsoft network.

For more information and guidance, see Optimize Office 365 connectivity for remote users using VPN split tunneling.

Deploy remote access when all your apps are web apps and you have hybrid identity

If your remote workers are not using a traditional VPN client and your on-premises user accounts and groups are synchronized with Microsoft Entra ID, you can use Microsoft Entra application proxy to provide secure remote access for web-based applications hosted on on-premises servers. Web-based applications include SharePoint Server sites, Outlook Web Access servers, or any other web-based line of business applications.

Here are the components of Microsoft Entra application proxy.

Components of Microsoft Entra application proxy.

For more information, see this overview of Microsoft Entra application proxy.

Note

Microsoft Entra application proxy is not included with a Microsoft 365 subscription. You must pay for usage with a separate Azure subscription.

Deploy remote access when not all your apps are web apps

If your remote workers are not using a traditional VPN client and you have apps that are not web-based, you can use an Azure Point-to-Site (P2S) VPN.

A P2S VPN connection creates a secure connection from a remote worker’s device to your organization network through an Azure virtual network.

Components of Azure P2S VPN.

For more information, see this overview of P2S VPN.

Note

Azure P2S VPN is not included with a Microsoft 365 subscription. You must pay for usage with a separate Azure subscription.

Deploy Windows 365 to provide remote access for remote workers using personal devices

To support remote workers who can only use their personal and unmanaged devices, use Windows 365 to create and allocate virtual desktops for your users to use from home. With an on-premises network connection (OPNC), Windows 365 Cloud PCs can act just like PCs connected to your organization's network.

Components of Windows 365.

For more information, see this overview of Windows 365.

Note

Windows 365 is not included with a Microsoft 365 subscription. You must pay for usage with a separate subscription.

Protect your Remote Desktop Services connections with the Remote Desktop Services Gateway

If you are using Remote Desktop Services (RDS) to allow employees to connect into Windows-based computers on your on-premises network, you should use a Microsoft Remote Desktop Services gateway in your edge network. The gateway uses Transport Layer Security (TLS) to encrypt traffic and prevents the on-premises computer hosting RDS from being directly exposed to the Internet.

Remote Desktop Services connections with the Remote Desktop Services Gateway.

See this article for more information.

Admin technical resources for remote access

Results of Step 2

After deployment of a remote access solution for your remote workers:

Remote access configuration Results
A remote access VPN solution is in place You have configured your remote access VPN client for split tunneling and for the Optimize category of Microsoft 365 endpoints.
No remote access VPN solution and you need remote access only to on-premises web-based apps You have configured Azure Application Proxy.
No remote access VPN solution and you need access to on-premises apps, some of which are not web-based You have configured Azure P2S VPN.
Remote workers are using their personal devices from home You have configured Windows 365.
Remote workers are using RDS connections to on-premises systems You have deployed a Remote Desktop Services gateway in your edge network.

Next step

Step 3: Deploy Microsoft 365 security and compliance services.

Continue with Step 3 to deploy Microsoft 365 security and compliance services to protect your apps, data, and devices.