![]() This security was built to protect internal infrastructure and to safeguard mobile browsing of external web sites by rerouting traffic into the VPN and then out through the on-premises Internet perimeter. To safeguard these connections, enterprises build layers of network security solutions along the VPN paths. While core workloads remained on-premises, a VPN from the remote client routed through a datacenter on the corporate network was the primary method for remote users to access corporate resources. For information about optimizing Microsoft 365 worldwide tenant performance for users in China, see Microsoft 365 performance optimization for China users.Įnterprises have traditionally used VPNs to support secure remote experiences for their users.For information about how to configure Stream and live events in VPN environments, see Special considerations for Stream and live events in VPN environments.For guidance on securing Teams media traffic in VPN split tunneling environments, see Securing Teams media traffic for VPN split tunneling. ![]() For a detailed list of VPN split tunneling scenarios, see Common VPN split tunneling scenarios for Microsoft 365. ![]()
0 Comments
Leave a Reply. |