Entra ID

Microsoft Entra Internet Access Adds AI Security

3 min čtení

Shrnutí

Microsoft has announced new generally available and preview capabilities for Entra Internet Access and Entra Private Access, with a strong focus on securing AI, web, and private app traffic. The updates give IT teams more visibility into shadow AI, prompt injection risks, unmanaged devices, and private app access while extending Zero Trust controls across more scenarios.

Potřebujete pomoc s Entra ID?Mluvte s odborníkem

Introduction

Microsoft is expanding its identity-centric Secure Access Service Edge strategy with new features in Microsoft Entra Internet Access and Microsoft Entra Private Access. For IT admins, the big story is clearer control over AI usage, web traffic, and private app access without relying on traditional perimeter-based security.

What’s new in Entra Internet Access

Several AI and web protection features are now generally available:

  • Shadow AI discovery helps identify unsanctioned AI tools and SaaS apps being used across the organization.
  • Prompt Injection Protection is designed to stop malicious prompts that attempt to manipulate AI models or expose sensitive data.
  • Network content filtering can block sensitive file uploads to unapproved AI services.
  • URL filtering and threat intelligence improve protection against malicious or risky websites.
  • Cloud firewall for remote networks adds more granular policy enforcement for branch and remote site traffic.
  • iOS support and remote network connectivity extend protection to more user and device scenarios.

What’s new in public preview

Microsoft also introduced several preview features aimed at broader deployment flexibility:

  • BYOD with client in Entra Private Access for Zero Trust access from unmanaged devices.
  • Explicit Forward Proxy for Entra Internet Access to support agentless and legacy devices using PAC files.
  • Secure Browser Integration for Intune-managed Microsoft Edge with TLS inspection and policy enforcement.
  • Shadow MCP visibility to identify unauthorized or high-risk MCP servers and monitor AI-related traffic paths.

What’s new in Entra Private Access

For private applications, Microsoft is continuing its push away from legacy VPNs:

  • External User Access secures partners and contractors with Zero Trust controls.
  • Intelligent Local Access improves routing efficiency to reduce latency and avoid unnecessary backhauling.

Why this matters for IT admins

These updates matter because AI adoption is happening faster than many governance programs can keep up. Entra Internet Access gives administrators better visibility into shadow AI use and stronger controls to prevent data leakage and AI-specific threats. At the same time, Entra Private Access expands secure access options for contractors, unmanaged devices, and hybrid environments.

Next steps

IT teams should review whether current policies cover AI tools, unmanaged devices, and external users. If you are already using Microsoft Entra, this is a good time to evaluate the new generally available controls and test preview features such as Secure Browser Integration and BYOD access. Organizations still relying on traditional VPN and web filtering approaches should also assess whether Global Secure Access can simplify Zero Trust enforcement.

Potřebujete pomoc s Entra ID?

Naši odborníci vám pomohou implementovat a optimalizovat vaše Microsoft řešení.

Mluvte s odborníkem

Buďte v obraze o technologiích Microsoft

Microsoft EntraZero TrustAI securityPrivate AccessInternet Access

Související články

Entra ID

Microsoft Identity Manager 2016 SP3 Now Available

Microsoft Identity Manager 2016 SP3 is now generally available, bringing improved stability, broader platform compatibility, and a new Azure SQL Database deployment option for the Synchronization Service. The update matters for organizations running hybrid identity environments because it reduces operational risk, supports newer infrastructure components, and gives customers a supported path forward while planning longer-term moves to Microsoft Entra.

Entra ID

Microsoft Entra Face Check Secures High-Risk Identity Flows

Microsoft is expanding Face Check in Microsoft Entra Verified ID to strengthen identity verification during remote onboarding, access requests, and account recovery. The update removes per-user Face Check limits in Microsoft Entra Suite and highlights general availability for verified account recovery, helping organizations reduce impersonation risk and help desk dependency.

Entra ID

Microsoft Entra May 2026: Global Secure Access GA

Microsoft Entra’s May 2026 updates focus heavily on Global Secure Access, certificate-based authentication, and stronger privileged access controls. The new capabilities help IT teams extend Zero Trust protections to branch offices, mobile devices, external users, and AI workloads while improving usability and policy enforcement.

Entra ID

Microsoft Entra ID Passkeys: Fixing Recovery Gaps

Microsoft is expanding its passkey-first strategy in Entra ID by addressing the security gaps that remain after passkey deployment, including fallback credentials and weak account recovery. New capabilities such as Windows passkeys, passkey-preferred authentication, and generally available Entra ID account recovery help organizations reduce phishing and social engineering risk while improving user experience.

Entra ID

Microsoft Entra Webinar Series Strengthens Identity Security

Microsoft has launched a five-part Secure identity foundation with Microsoft Entra webinar series focused on passwordless authentication, Conditional Access, ID Protection, Tenant Governance, and Backup and Recovery. The series gives IT and security teams practical deployment guidance to strengthen access management, improve tenant visibility, and build more resilient identity protections across cloud and hybrid environments.

Entra ID

SASE 101 in Microsoft Entra: How to Get Started

Microsoft’s latest Entra guidance explains SASE fundamentals for organizations modernizing secure access in cloud-first and hybrid work environments. The post clarifies how SASE differs from SSE, how it supports Zero Trust, and how teams can begin with Microsoft Global Secure Access.