Skip to content

Commit a74cbe4

Browse files
authored
Merge pull request #11787 from HULKsmashGithub/stale-article-refresh-march-2026
Refresh stale Global Secure Access articles (March 2026)
2 parents a4d2ecb + f991083 commit a74cbe4

11 files changed

+39
-28
lines changed

docs/global-secure-access/concept-transport-layer-security.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: "This article provides an overview of the Transport Layer Security
44
author: HULKsmashGithub
55
ms.author: jayrusso
66
ms.topic: concept-article
7-
ms.date: 05/28/2025
7+
ms.date: 03/23/2026
8+
ms.reviewer: teresayao
89

910
#customer intent: As a Global Secure Access administrator, I want to learn about the Transport Layer Security (TLS) protocol to support the creation of TLS inspection policies.
1011

@@ -37,7 +38,7 @@ Traffic logs include four TLS-related metadata fields that help you understand h
3738
To get started with TLS inspection, see [Configure Transport Layer Security Policies](how-to-transport-layer-security.md).
3839

3940
## Supported ciphers
40-
| List of supported ciphers |
41+
|List of supported ciphers |
4142
|-------------------|
4243
|ECDHE-ECDSA-AES128-GCM-SHA256|
4344
|ECDHE-ECDSA-CHACHA20-POLY1305|

docs/global-secure-access/how-to-ai-prompt-injection-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Protect enterprise generative AI apps with prompt injection protection (preview)
33
description: "Protect your enterprise generative AI apps from prompt injection attacks with Microsoft's AI Gateway prompt injection protection."
44
ms.topic: how-to
5-
ms.date: 03/18/2026
5+
ms.date: 03/24/2026
66
ms.author: jayrusso
77
author: HULKsmashGithub
88
ms.reviewer: KaTabish
@@ -113,7 +113,7 @@ You can protect any custom JSON-based LLM or GenAI app by configuring a custom t
113113
## Known limitations
114114

115115
- Prompt Injection Protection currently supports only text prompts. It doesn't support files.
116-
- Prompt Injection Protection supports only JSON-based generative AI apps. It doesn't support apps that use URL-based encoding, like Gemini.
116+
- Prompt Injection Protection supports only JSON-based generative AI apps.
117117
- Prompt Injection Protection supports prompts up to 10,000 characters. Anything longer is truncated.
118118

119119
## Related content

docs/global-secure-access/how-to-create-remote-network-custom-ike-policy.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to set up the bidirectional communication tunnel between
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: how-to
7-
ms.date: 02/25/2025
7+
ms.date: 03/23/2026
88
ms.reviewer: absinh
99
ms.custom: sfi-image-nochange
1010
# Customer intent: As an IT admin, I need to be able to create a custom Internet Key Exchange (IKE) policy to set up the communication tunnel with Global Secure Access.
@@ -29,7 +29,7 @@ If you prefer to add custom IKE policy details to your remote network, you can d
2929

3030
To create a remote network with a custom IKE policy in the Microsoft Entra admin center:
3131

32-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
32+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/entra/identity/role-based-access-control/permissions-reference#global-secure-access-administrator).
3333

3434
1. Browse to **Global Secure Access** > **Connect** > **Remote networks**.
3535

@@ -63,7 +63,7 @@ There are several details to enter on the General tab. Pay close attention to th
6363
- This address is entered as the *peer* BGP​​ IP address on your CPE.
6464
- Refer to the [valid BGP addresses](reference-remote-network-configurations.md#valid-bgp-addresses) list for reserved values that can't be used.
6565

66-
1. Select the **Next**.
66+
1. Select **Next**.
6767

6868
### Add a link - Details tab
6969

@@ -97,13 +97,16 @@ There are several details to enter on the General tab. Pay close attention to th
9797

9898
Remote networks with a custom IKE policy can be created using Microsoft Graph on the `/beta` endpoint.
9999

100+
> [!IMPORTANT]
101+
> APIs under the `/beta` version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. For details, see [Microsoft Graph versioning and support](/graph/versioning-and-support).
102+
100103
1. Sign in to [Graph Explorer](https://aka.ms/ge).
101104
1. Select **POST** as the HTTP method from the dropdown.
102105
1. Set the API version to **beta**.
103106
1. Add the following query, then select **Run query**.
104107

105108
```http
106-
POST https://graph.microsoft.com/beta/networkAccess/connectivity/remoteNetworks/dc6a7efd-6b2b-4c6a-84e7-5dcf97e62e04/deviceLinks
109+
POST https://graph.microsoft.com/beta/networkAccess/connectivity/remoteNetworks/{remoteNetworkId}/deviceLinks
107110
Content-Type: application/json
108111
109112
{

docs/global-secure-access/how-to-create-remote-network-vwan.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Simulate remote network connectivity using Azure vWAN
33
description: Use Global Secure Access to configure Azure and Microsoft Entra resources to create a virtual wide area network to connect to your resources in Azure.
44
ms.topic: how-to
5-
ms.date: 02/25/2025
5+
ms.date: 03/23/2026
66
ms.author: jayrusso
77
author: HULKsmashGithub
88
ms.reviewer: absinh
@@ -19,7 +19,7 @@ To complete the steps in this process, you must have the following prerequisites
1919
- An Azure subscription and permission to create resources in the [Azure portal](https://portal.azure.com).
2020
- A basic understanding of virtual wide area networks (vWAN).
2121
- A basic understanding of [site-to-site VPN connections](/azure/vpn-gateway/tutorial-site-to-site-portal).
22-
- A Microsoft Entra tenant with the [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator) role assigned.
22+
- A Microsoft Entra tenant with the [Global Secure Access Administrator](/entra/identity/role-based-access-control/permissions-reference#global-secure-access-administrator) role assigned.
2323
- A basic understanding of Azure virtual desktops or Azure virtual machines.
2424

2525
This document uses the following example values, along with the values in the images and steps. Feel free to configure these settings according to your own requirements.

docs/global-secure-access/how-to-manage-remote-network-device-links.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to add and delete customer premises equipment device link
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: how-to
7-
ms.date: 02/25/2025
7+
ms.date: 03/23/2026
88
ms.reviewer: absinh
99
ms.custom: sfi-image-nochange
1010
# Customer intent: As an IT admin, I need to manage the router devices that connect to the Global Secure Access service so my customers can connect to the service.
@@ -83,6 +83,9 @@ The **Details** tab is where you establish the bidirectional communication chann
8383

8484
Remote networks with a custom IKE policy can be created using Microsoft Graph on the `/beta` endpoint.
8585

86+
> [!IMPORTANT]
87+
> APIs under the `/beta` version in Microsoft Graph are subject to change. Use of these APIs in production applications is not supported. For details, see [Microsoft Graph versioning and support](/graph/versioning-and-support).
88+
8689
1. Sign in to [Graph Explorer](https://aka.ms/ge).
8790
1. Select `POST` as the HTTP method from the dropdown.
8891
1. Set the API version to beta.
@@ -117,7 +120,7 @@ Sample response:
117120
},
118121
"tunnelConfiguration": {
119122
"@odata.type": "#microsoft.graph.networkaccess.tunnelConfigurationIKEv2Default",
120-
"preSharedKey": "test123"
123+
"preSharedKey": "<your-preshared-key>"
121124
}
122125
}
123126
```
@@ -130,7 +133,7 @@ You can delete device links through the Microsoft Entra admin center and using t
130133

131134
### [Microsoft Entra admin center](#tab/microsoft-entra-admin-center)
132135

133-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
136+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/entra/identity/role-based-access-control/permissions-reference#global-secure-access-administrator).
134137

135138
1. Browse to **Global Secure Access** > **Connect** > **Remote networks**. Device links appear in the **Links** column on the list of remote networks.
136139

docs/global-secure-access/reference-china-user-support.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
---
2-
title: Global Secure Access Support in China (Preview)
2+
title: Global Secure Access support in China
33
description: Learn about how Microsoft is dedicated to supporting Global Secure Access capabilities in China.
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: reference
7-
ms.date: 05/20/2025
7+
ms.service: global-secure-access
8+
ms.date: 03/09/2026
89
ms.reviewer: sumeetmittal
910

1011
# Customer intent: As an IT admin, I want to evaluate the regulatory constraints of using Global Secure Access in China so that I can ensure compliance and plan connectivity strategies effectively.

docs/global-secure-access/reference-ciphers.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: Learn about the supported cryptographic algorithms, or ciphers, use
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: reference
7-
ms.date: 02/18/2025
7+
ms.service: global-secure-access
8+
ms.date: 03/09/2026
89
ms.reviewer: sumeetmittal
910

1011

docs/global-secure-access/reference-global-secure-access-certifications.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: Global Secure Access maintains a compliance portfolio. This article
44
ms.author: jayrusso
55
author: HULKsmashGithub
66
ms.topic: reference
7-
ms.date: 05/29/2025
7+
ms.service: global-secure-access
8+
ms.date: 03/24/2026
89
ms.reviewer: abhijeetsinha
910

1011
#customer intent: As an IT admin, I want to know which certifications Global Secure Access supports so that I can ensure compliance with industry standards.
@@ -28,8 +29,8 @@ Global Secure Access is included in several Azure compliance audits. The support
2829
| GxP (FDA 21 CFR Part 11) | Azure can help customers meet their requirements under Good Clinical, Laboratory, and Manufacturing Practices (GxP), as well as regulations enforced by the US Food and Drug Administration (FDA) under 21 CFR Part 11. For more information, see [GxP (FDA 21 CFR Part 11)](/azure/compliance/offerings/offering-gxp). | ISO 27001:2013 |
2930
| HDS (France) | Microsoft Azure has the Health Data Hosting (Hébergeurs de Données de Santé, HDS) certification, which is required for all entities that host personal health data governed by French law. Microsoft is the first major cloud service provider to meet the strict French standards for storing and processing health data. For more information, see [Health Data Hosting (HDS) France](/compliance/regulatory/offering-hds-france). | ISO 27001:2013 |
3031
| HIPAA BAA (US) | The Health Insurance Portability and Accountability Act (HIPAA) is a US law that establishes requirements for the use, disclosure, and safeguarding of protected health information (PHI). It applies to covered entities—doctors' offices, hospitals, health insurers, and other healthcare companies—with access to PHI, and to business associates, such as cloud service providers, that process PHI on their behalf. For more information, see [HIPAA (US)](/azure/compliance/offerings/offering-hipaa-us). | NA |
31-
| ISO 20000-1:2011 | ISO 20000-1:2011 is an international standard for IT service management that defines requirements for the development, implementation, monitoring, maintenance, and improvement of an IT service management system. For more information, see [ISO/IEC 20000-1:2018](/azure/compliance/offerings/offering-iso-20000-1). | ISO 27001:2013 |
32-
| ISO 22301:2012 | ISO 22301:2012 is the premium international standard for business continuity management that provides for a formal certification. For more information, see [ISO 22301:2019](/azure/compliance/offerings/offering-iso-22301). | ISO 27001:2013 |
32+
| ISO 20000-1:2018 | ISO 20000-1:2018 is an international standard for IT service management that defines requirements for the development, implementation, monitoring, maintenance, and improvement of an IT service management system. For more information, see [ISO/IEC 20000-1:2018](/azure/compliance/offerings/offering-iso-20000-1). | ISO 27001:2013 |
33+
| ISO 22301:2019 | ISO 22301:2019 is the premium international standard for business continuity management that provides for a formal certification. For more information, see [ISO 22301:2019](/azure/compliance/offerings/offering-iso-22301). | ISO 27001:2013 |
3334
| ISO 27001:2013 | The ISO 27000 family of standards gives a framework for policies and procedures that include all legal, physical, and technical controls in Microsoft Azure Compliance Offerings for an organization's information risk management. ISO 27001 lists the requirements for implementing, maintaining, monitoring, and improving an information security management system (ISMS). For more information, see [ISO 27001:2013](/azure/compliance/offerings/offering-iso-27001). | NA |
3435
| ISO 27017:2015 | The ISO 27017 code of practice is designed for organizations to use as a reference for selecting cloud services information security controls when implementing a cloud computing information security management system based on ISO 27002. Cloud service providers can also use ISO 27017 as a guidance document for implementing commonly accepted protection controls. For more information, see [ISO/IEC 27017:2015](/azure/compliance/offerings/offering-iso-27017). | ISO 27001:2013 |
3536
| ISO 27018:2019 | ISO 27018 is the first international code of practice for cloud privacy that provides guidelines based on ISO 27002 guidelines and best practices for information security management. Based on EU data-protection laws, it gives specific guidance to cloud service providers acting as processors of personally identifiable information (PII) on assessing risks and implementing state-of-the-art controls for protecting PII. ISO 27018 establishes cloud-specific control objectives and guidelines for PII in accordance with the privacy principles in ISO 29100. For more information, see [ISO/IEC 27018:2019](/azure/compliance/offerings/offering-iso-27018). | ISO 27001:2013 |
@@ -45,7 +46,7 @@ Global Secure Access is included in several Azure compliance audits. The support
4546
| SOC 3 | A SOC 3 report is a short, public version of the SOC 2 Type 2 attestation report. The SOC 3 report is for users who want assurance about the cloud service provider's controls but don't need a full SOC 2 report. For more information, see [System and Organization Controls (SOC) 3](/azure/compliance/offerings/offering-soc-3). | NA |
4647
| UK Cyber Essentials Plus | Cyber Essentials is a UK government-backed scheme that helps organizations check and reduce risks from common cybersecurity threats to their IT systems. Cyber Essentials is required for all UK government suppliers that handle personal data. For more information, see [UK Cyber Essentials Plus](/azure/compliance/offerings/offering-uk-cyber-essentials-plus). | ISO 27001:2013 |
4748
| UK G-Cloud | Government Cloud (G-Cloud) is a UK government initiative to ease procurement of cloud services by government departments and promote government-wide adoption of cloud computing. G-Cloud comprises a series of framework agreements with cloud services suppliers (such as Microsoft), and a listing of their services in an online store—the Digital Marketplace. This approach enables public-sector organizations to compare and procure cloud services without having to do their own full review process. For more information, see [UK G-Cloud](/azure/compliance/offerings/offering-uk-g-cloud). | ISO 27001:2013 |
48-
| WCAG 2.0 | The Web Content Accessibility Guidelines 2.0 (WCAG 2.0) provide a framework for developing web content that improves accessibility for people with disabilities, and users of devices with limited graphical abilities. For more information, see [Web Content Accessibility Guidelines](/compliance/regulatory/offering-wcag-2-1). | ISO 27001:2013 |
49+
| WCAG | The Web Content Accessibility Guidelines (WCAG) provide a framework for developing web content that improves accessibility for people with disabilities, and users of devices with limited graphical abilities. For more information, see [Web Content Accessibility Guidelines](/compliance/regulatory/offering-wcag-2-1). | ISO 27001:2013 |
4950

5051
## Related content
5152
[Service Trust Portal](https://servicetrust.microsoft.com/)

docs/global-secure-access/troubleshoot-global-secure-access-client-disabled.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Troubleshoot the Global Secure Access Client: Disabled by Your Organization"
33
description: This document provides troubleshooting guidance for the Global Secure Access client when it shows the "disabled by your organization" error message.
44
ms.topic: troubleshooting
5-
ms.date: 03/10/2025
5+
ms.date: 03/23/2026
66
ms.author: jayrusso
77
author: HULKsmashGithub
88
ms.reviewer: lirazbarak
@@ -22,15 +22,15 @@ The **Global Secure Access client - disabled by your organization** error messag
2222

2323
The warning message also appears when the client receives an empty policy (that is, no traffic forwarding profiles from Microsoft, Private Access, or Internet Access).
2424
The empty policy happens in the following cases:
25-
- All traffic forwarding profiles are disabled in the portal.
26-
- Some traffic forwarding profiles are enabled, but the user isn't assigned to any of them (in the **User and group assignments** section of each profile).
27-
- The user didn't sign in to Windows with a Microsoft Entra user.
28-
- Authentication to get the policy requires user interaction (such as if multifactor authentication (MFA) or terms of use (ToU) are enabled).
25+
1. All traffic forwarding profiles are disabled in the portal.
26+
1. Some traffic forwarding profiles are enabled, but the user isn't assigned to any of them (in the **User and group assignments** section of each profile).
27+
1. The user didn't sign in to Windows with a Microsoft Entra user.
28+
1. Authentication to get the policy requires user interaction (such as if multifactor authentication (MFA) or terms of use (ToU) are enabled).
2929

3030
In cases **3** and **4**, only traffic profiles that are assigned to the entire tenant (**Assign to all users** in the user and group assignment section is set to **Yes**) take effect. Traffic profiles assigned to specific users and groups aren't applied since the user identity isn't used to get the policy. In these cases, only the device identity is available to the policy service.
3131

3232
To view the Global Secure Access traffic profile configuration:
33-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator).
33+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Secure Access Administrator](/entra/identity/role-based-access-control/permissions-reference#global-secure-access-administrator).
3434
1. Navigate to **Global Secure Access** > **Connect** > **Traffic forwarding**.
3535
:::image type="content" source="media/troubleshoot-global-secure-access-client-disabled/traffic-forwarding.png" alt-text="Screenshot of the Traffic forwarding profiles screen." lightbox="media/troubleshoot-global-secure-access-client-disabled/traffic-forwarding-expanded.png":::
3636

docs/global-secure-access/troubleshoot-global-secure-access-mobile-client-advanced-diagnostics.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,8 @@
22
title: "Troubleshoot the Global Secure Access Mobile Client: Advanced Diagnostics"
33
description: Discover how to use advanced diagnostics to resolve issues with the Global Secure Access mobile client for Android and iOS.
44
ms.topic: troubleshooting
5-
ms.date: 04/29/2025
5+
ms.service: global-secure-access
6+
ms.date: 03/09/2026
67
ms.author: jayrusso
78
author: HULKsmashGithub
89
ms.reviewer: cagautham

0 commit comments

Comments
 (0)