Skip to main content

Working with CSV Files

This section provides comprehensive guidance on creating, reviewing, and validating CSV configuration files for Microsoft Global Secure Access. Whether you're migrating from another platform or deploying from scratch, CSV files are the bridge between planning and provisioning.

Why CSV Files?

CSV (Comma-Separated Values) files provide a structured, human-readable format for defining Global Secure Access configurations:

Universal Format

  • Works for both migrations (generated by conversion tools) and greenfield deployments (created from samples)
  • Editable in Excel, VS Code, or any text editor
  • Version control friendly (Git, SVN, etc.)

Administrative Control Point

  • Review converted configurations before deploying
  • Modify policies to match organizational requirements
  • Selectively deploy using the Provision column
  • Test incremental by enabling policies one at a time

Repeatable & Auditable

  • Backup existing configurations by exporting to CSV
  • Replicate configurations across tenants (dev → test → prod)
  • Document policy decisions directly in CSV descriptions
  • Track changes using version control systems

Automation Ready

  • Single PowerShell command to provision entire configuration
  • Idempotent operations (safe to re-run)
  • Built-in validation before Graph API calls
  • Comprehensive logging for compliance

CSV Workflow Overview

For Migrations

  1. Export configuration from source platform (ZScaler, Netskope, etc.)
  2. Convert to GSA-compatible CSV format with category mapping
  3. Review & Edit CSV files (this is where you are now!)
  4. Provision to Microsoft Graph API

For Greenfield Deployments

  1. Choose a sample that matches your requirements
  2. Customize CSV files with your policies and groups
  3. Review & Validate (this is where you are now!)
  4. Provision to Microsoft Graph API

CSV Files by Product

Global Secure Access has two main products, each with their own CSV structures:

Entra Internet Access (EIA)

Secures web browsing and SaaS application access with web content filtering.

CSV Files:

  • Policies CSV: Defines web filtering rules and TLS inspection policies
  • Security Profiles CSV: Links policies to user groups via Conditional Access

Use Cases:

  • Block malicious websites and malware
  • Control access to social media and entertainment
  • Enforce acceptable use policies
  • TLS inspection for threat detection

👉 Learn More: EIA CSV Configuration

Entra Private Access (EPA)

Provides Zero Trust Network Access (ZTNA) to internal applications without VPN.

CSV Files:

  • Applications CSV: Defines enterprise applications, network segments, connector groups, and user assignments

Use Cases:

  • Publish internal web applications
  • Secure remote access to on-premises resources
  • Replace VPN with application-level access
  • Implement least-privilege access

👉 Learn More: EPA CSV Configuration

What This Section Covers

📄 EIA CSV Configuration

Complete guide to Entra Internet Access CSV files:

  • Policies CSV: Structure, columns, rule types, examples
  • Security Profiles CSV: Linking policies with priorities
  • Validation Checklist: Pre-provisioning checks
  • Common Issues: Troubleshooting and fixes
  • Samples: Example configurations for greenfield

📄 EPA CSV Configuration

Complete guide to Entra Private Access CSV files:

  • Applications CSV: Structure, columns, segments, connectors
  • Validation Checklist: Pre-provisioning checks
  • Common Issues: Troubleshooting and fixes
  • Samples: Example configurations for greenfield

📄 Best Practices

Cross-product guidance for working with CSV files:

  • Editing CSV files (Excel vs text editors)
  • Testing strategies (start small, expand gradually)
  • Selective provisioning workflow
  • Version control and backup strategies
  • Multi-tenant deployment patterns

I need to...

Review a migration CSV

Create a greenfield configuration

Fix a common error

Understand CSV structure

Learn best practices

Prerequisites

Before working with CSV files, ensure you have:

Required Knowledge

  • ✅ Understanding of EIA Configuration Model (if working with EIA)
  • ✅ Understanding of EPA Configuration Model (if working with EPA)
  • ✅ Familiarity with your organization's security requirements
  • ✅ Access to Entra ID group names and user identities

Required Tools

  • ✅ CSV editor (Excel, VS Code, or text editor)
  • Migrate2GSA PowerShell module installed
  • ✅ Microsoft Graph PowerShell SDK (installed with module)
  • ✅ Appropriate Microsoft Graph permissions

Required Permissions

For provisioning after CSV review:

  • NetworkAccessPolicy.ReadWrite.All (for EIA/EPA provisioning)
  • Group.Read.All (for user/group assignments)
  • Application.ReadWrite.All (for EPA enterprise applications)
  • Policy.ReadWrite.ConditionalAccess (for Conditional Access policies)

Next Steps

Ready to work with CSV files? Choose based on what you're deploying:

Or jump straight to Best Practices for cross-product guidance.


Need Help?

If you're stuck or have questions: