Why you should enable the Microsoft Traffic Forwarding Profile
This blog post is the start of my series about the Microsoft Traffic Profile in GSA, covering overview, architecture and deployment
This post is part of a series on the Microsoft Traffic Forwarding Profile in Global Secure Access:
Why you should enable the Microsoft Traffic Forwarding Profile (this post) Token Replay Protection and the Compliant Network Check Universal Tenant Restrictions Coexistence with other Secure Web Gateways Logging The case for enabling it The Microsoft Traffic Forwarding Profile tends to get overlooked in two different situations. In organizations that are already running a GSA project – typically starting with Entra Private Access – it often gets deprioritized because the focus is on getting the connector infrastructure in place and migrating VPN users.