Entra ID

Microsoft Entra Internet Access AI Gateway Preview

3 min read

Summary

Microsoft has previewed a secure web and AI gateway in Entra Internet Access that adds network-layer controls for enterprise AI use, including shadow AI detection, file filtering with Purview integration, and prompt injection protection. This matters because it gives organizations an identity-first way to discover unsanctioned AI tools, prevent sensitive data leakage, and enforce consistent security policies across devices and clouds without needing to modify applications.

Need help with Entra ID?Talk to an Expert

Introduction: why identity-first AI security matters

Generative AI adoption is accelerating across enterprises, but security readiness is lagging—especially around data leakage to unsanctioned AI tools, prompt injection attacks, and fragmented controls across devices and clouds. Microsoft’s latest Entra updates position identity as the control plane for governing AI access, with new network-layer protections designed to secure AI usage without requiring app rewrites.

What’s new: Secure Web & AI Gateway in Entra Internet Access (Public Preview)

Microsoft Entra Internet Access now includes a secure web and AI gateway, extending AI-aware inspection and policy enforcement into the network layer as part of Microsoft’s SASE approach.

1) Shadow AI Detection

  • Discovers unsanctioned AI tools observed in network traffic.
  • Uses Cloud Application Analytics plus Defender for Cloud Apps risk scoring and Microsoft’s Cloud App Catalog.
  • Enables quick enforcement via Conditional Access to sanction, restrict, or block high-risk AI apps.

2) Network File Filtering (with Purview integration)

  • Blocks uploads/downloads based on file type.
  • Can inspect file content and metadata in transit.
  • Integrates with Microsoft Purview to enforce Sensitive Information Types and Exact Data Match policies—reducing the chance of regulated or confidential data being shared with unapproved AI services.

3) Prompt Injection Protection

  • Inspects AI traffic inline and blocks malicious prompts in real time.
  • Extends Azure AI Prompt Shields to the network layer, aiming for consistent protection across AI apps, agents, and LLMs—without refactoring applications.

4) Controls for AI agents and MCP servers

  • Applies network-layer boundaries with URL filtering to allow approved agent connections and block unsanctioned MCP servers.
  • Pairs with Entra identity controls (e.g., MFA, geo-restrictions) across Windows, macOS, iOS, and Android.

Additional Entra Internet Access enhancements

Microsoft also highlighted broader improvements including:

  • Threat intelligence filtering for known malicious sites.
  • Remote networks for Internet traffic to extend protections to branches/remote sites without the Global Secure Access client.
  • Cloud firewall for remote networks with centrally managed, identity-driven policies.

Impact on IT admins and security teams

  • More uniform AI policy enforcement across browsers, devices, and environments (on-prem, hybrid, multi-cloud).
  • Reduced reliance on per-app controls or SDK-based security retrofits.
  • Stronger governance posture by linking network observations (what users access) with identity-driven decisions (what they’re allowed to do).

Action items / next steps

  1. Evaluate the public preview of Secure Web & AI Gateway in Entra Internet Access and map it to your AI risk scenarios (Shadow AI, data leakage, prompt injection).
  2. Integrate with Purview: validate Sensitive Information Types and Exact Data Match coverage for high-risk data categories.
  3. Review Conditional Access policies for AI services (sanctioned vs. unsanctioned) and define block/allow criteria using Defender for Cloud Apps risk scoring.
  4. Create an AI access baseline (approved tools, approved agent/MCP endpoints, logging/monitoring requirements) and socialize it with security and business owners.

Need help with Entra ID?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

Microsoft EntraEntra Internet AccessSASESecure Web GatewayAI security

Related Posts

Entra ID

Microsoft Entra Backup and Recovery Enters Preview

Microsoft has launched Microsoft Entra Backup and Recovery in public preview, giving organizations a Microsoft-managed way to restore critical identity objects and configurations to a known-good state. The service helps IT teams recover faster from accidental admin changes, provisioning errors, and malicious modifications that could otherwise disrupt access and security.

Entra ID

Microsoft Entra External MFA Now Generally Available

Microsoft has announced general availability of external MFA in Microsoft Entra ID, allowing organizations to integrate trusted third-party MFA providers using OpenID Connect. The feature lets IT teams keep Microsoft Entra ID as the central identity control plane while maintaining Conditional Access, risk evaluation, and unified authentication method management.

Entra ID

Microsoft Entra RSAC 2026 Identity Security Updates

At RSAC 2026, Microsoft announced major Microsoft Entra updates aimed at securing not only users and devices but also AI agents, workloads, and modern multi-tenant environments. The new capabilities—such as expanded Entra Agent ID governance, shadow AI detection, prompt injection protection, passkey enhancements, and adaptive risk-based access—matter because they strengthen Zero Trust identity security as organizations adopt AI and face more dynamic access risks.

Entra ID

Microsoft Entra Secure Access Report 2026 on AI Risk

Microsoft’s Entra Secure Access Report 2026 says AI adoption is significantly increasing identity and network access risk, with 97% of organizations reporting an access-related incident in the past year and 70% tying incidents to AI activity. The report argues that fragmented identity and network tools are making the problem worse, which matters because more organizations are now moving toward consolidated access platforms to better secure AI tools, agents, and machine identities.

Entra ID

Microsoft Entra Conditional Access All Resources Update

Microsoft is updating Entra Conditional Access so policies targeting "All resources" will be enforced consistently even when resource exclusions exist, closing a gap where some sign-ins requesting only OIDC or limited directory scopes could bypass policy checks. Beginning March 27, 2026 and rolling out through June 2026, affected tenants may see more users prompted for MFA, device compliance, or other controls—making this important for organizations to review impacted Conditional Access policies and prepare for changes in sign-in behavior.

Entra ID

Microsoft Entra Access Priorities Webinar Series

Microsoft is launching the four-part Microsoft Entra Access Priorities webinar series to help IT teams turn its identity-first security strategy into practical deployment steps, with guidance on phishing-resistant authentication, adaptive access, least privilege, and securing AI-related access. The series matters because it gives organizations concrete tools, demos, and checklists to strengthen Zero Trust and prepare for an emerging Access Fabric model that spans users, apps, devices, and AI agents.