thank you for sharing; it is very insightful and appreciated conversation. Absolutely, deep dive into the integration of on protocols like: kerberos, ntlm, ipsec, ikev1 how they fit in end to end in the Micrsoft Entra Architecture, would be edifying.
Hi, sorry for the delay in replying to your comment. Thanks for leaving it. We a planning to do the deep dive this coming month. I will do one on Kerberos in the next couple of weeks.
Grandmaster Thomas with John on the stage, an incredible line-up which not only Identity fellows shouldn't miss! Great work John and keep up :-)! And FULL ACK for future deep-dive sessions also regarding the protocols ;-)!
John, great stuff again. Many thanks to you and Thomas for all of the great information. I recently came off of the back of a ZScaler ZPA POC feeling that there were gaps that would block adoption. Entra PA could not have come at a better time! I believe this will address all of the issues we found in our POC and more. Particularly interested in the Branch Office IPsec connection to the SSE and the Traffic Profiles as this could replace WAN technology and leverage our CA framework we already have in place today. Looking forward to seeing how this pans out and more content from your good self.
Hi, thanks for feedback - I will shortly be releasing a video on setting up a VNG in Azure for testing the branch office scenarios. It would give you a great test environment. At the moment branch office only works for M365.
Thanks both John and Thomas, really good walk through on Entra and the new changes coming in, appreciate the insight (Q & A was ace, top points covered) Re videos requests - anything re best practice, how to implement, scenario or org type, maybe either a overview, walkthrough and troubleshooting with security hardening or recommended security defaults / eg SecureScore to aim for?
I assume you are just referring to Private Access where the resource you want to access is on the on-prem network. All I can say is keep your eyes open and you will see something rather smart in the future.
Thank you both. Please more of these videos.
Thanks you! More videos are planned
Wonderful! Thanks, John and Thomas for providing this!
Also, yes please on the future video around NTLM and Kerberos, as that would be fantastic to know more on the specifics there.
Thank you Steve, NTLM and Kerberos is a must
Thanks for the interview. Traffic profile acquisition and synthetic ip ranges sounds interesting for a deeper dive.
Thank for your comments and leaving your ideas for a deeper dive - more goodness soon!
thank you for sharing; it is very insightful and appreciated conversation. Absolutely, deep dive into the integration of on protocols like: kerberos, ntlm, ipsec, ikev1 how they fit in end to end in the Micrsoft Entra Architecture, would be edifying.
Hi, sorry for the delay in replying to your comment. Thanks for leaving it. We a planning to do the deep dive this coming month. I will do one on Kerberos in the next couple of weeks.
Thank You, and please make those deep dives
Thanks for your feedback and yes we will be making the deep dives.
Grandmaster Thomas with John on the stage, an incredible line-up which not only Identity fellows shouldn't miss! Great work John and keep up :-)! And FULL ACK for future deep-dive sessions also regarding the protocols ;-)!
Thanks for the comments - they are much appreciated. The protocols seem popular and will have to address that soon.
Great session John & Thomas! Good questions and clear answers. Looking forward to seeing more deep-dives
Thanks for your comment Kent. We are definitely planning more.
John, great stuff again. Many thanks to you and Thomas for all of the great information. I recently came off of the back of a ZScaler ZPA POC feeling that there were gaps that would block adoption. Entra PA could not have come at a better time! I believe this will address all of the issues we found in our POC and more. Particularly interested in the Branch Office IPsec connection to the SSE and the Traffic Profiles as this could replace WAN technology and leverage our CA framework we already have in place today. Looking forward to seeing how this pans out and more content from your good self.
Hi, thanks for feedback - I will shortly be releasing a video on setting up a VNG in Azure for testing the branch office scenarios. It would give you a great test environment. At the moment branch office only works for M365.
Thanks both John and Thomas, really good walk through on Entra and the new changes coming in, appreciate the insight (Q & A was ace, top points covered)
Re videos requests - anything re best practice, how to implement, scenario or org type, maybe either a overview, walkthrough and troubleshooting with security hardening or recommended security defaults / eg SecureScore to aim for?
Many thanks for your feedback Andrew, it is really appreciated. We will billed a list of videos to produce. Thanks!
@@john_craddockThanks John, really nice that you had Thomas on your Q&A video, both your and his insights were great!
Short of pausing the access client, is there any way to keep traffic from routing through the proxies when the PC is actually on the on-prem network?
I assume you are just referring to Private Access where the resource you want to access is on the on-prem network. All I can say is keep your eyes open and you will see something rather smart in the future.
hi, after 5 months seems that UDP and private dns feature for private access is still not present. Do you have any idea of when will be ready ?
Hello, they are in private preview at the moment and will be released into public preview in the coming months