Working with CSV Files
This section provides comprehensive guidance on creating, reviewing, and validating CSV configuration files for Microsoft Global Secure Access. Whether you're migrating from another platform or deploying from scratch, CSV files are the bridge between planning and provisioning.
Why CSV Files?
CSV (Comma-Separated Values) files provide a structured, human-readable format for defining Global Secure Access configurations:
✅ Universal Format
- Works for both migrations (generated by conversion tools) and greenfield deployments (created from samples)
- Editable in Excel, VS Code, or any text editor
- Version control friendly (Git, SVN, etc.)
✅ Administrative Control Point
- Review converted configurations before deploying
- Modify policies to match organizational requirements
- Selectively deploy using the
Provisioncolumn - Test incremental by enabling policies one at a time
✅ Repeatable & Auditable
- Backup existing configurations by exporting to CSV
- Replicate configurations across tenants (dev → test → prod)
- Document policy decisions directly in CSV descriptions
- Track changes using version control systems
✅ Automation Ready
- Single PowerShell command to provision entire configuration
- Idempotent operations (safe to re-run)
- Built-in validation before Graph API calls
- Comprehensive logging for compliance
CSV Workflow Overview
For Migrations
- Export configuration from source platform (ZScaler, Netskope, etc.)
- Convert to GSA-compatible CSV format with category mapping
- Review & Edit CSV files (this is where you are now!)
- Provision to Microsoft Graph API
For Greenfield Deployments
- Choose a sample that matches your requirements
- Customize CSV files with your policies and groups
- Review & Validate (this is where you are now!)
- Provision to Microsoft Graph API
CSV Files by Product
Global Secure Access has two main products, each with their own CSV structures:
Entra Internet Access (EIA)
Secures web browsing and SaaS application access with web content filtering.
CSV Files:
- Policies CSV: Defines web filtering rules and TLS inspection policies
- Security Profiles CSV: Links policies to user groups via Conditional Access
Use Cases:
- Block malicious websites and malware
- Control access to social media and entertainment
- Enforce acceptable use policies
- TLS inspection for threat detection
👉 Learn More: EIA CSV Configuration
Entra Private Access (EPA)
Provides Zero Trust Network Access (ZTNA) to internal applications without VPN.
CSV Files:
- Applications CSV: Defines enterprise applications, network segments, connector groups, and user assignments
Use Cases:
- Publish internal web applications
- Secure remote access to on-premises resources
- Replace VPN with application-level access
- Implement least-privilege access
👉 Learn More: EPA CSV Configuration
What This Section Covers
📄 EIA CSV Configuration
Complete guide to Entra Internet Access CSV files:
- Policies CSV: Structure, columns, rule types, examples
- Security Profiles CSV: Linking policies with priorities
- Validation Checklist: Pre-provisioning checks
- Common Issues: Troubleshooting and fixes
- Samples: Example configurations for greenfield
📄 EPA CSV Configuration
Complete guide to Entra Private Access CSV files:
- Applications CSV: Structure, columns, segments, connectors
- Validation Checklist: Pre-provisioning checks
- Common Issues: Troubleshooting and fixes
- Samples: Example configurations for greenfield
📄 Best Practices
Cross-product guidance for working with CSV files:
- Editing CSV files (Excel vs text editors)
- Testing strategies (start small, expand gradually)
- Selective provisioning workflow
- Version control and backup strategies
- Multi-tenant deployment patterns
Common Tasks Quick Links
I need to...
Review a migration CSV
- From ZScaler → EIA CSV Configuration
- From Netskope → EIA CSV Configuration or EPA CSV Configuration
- From ZPA/NPA → EPA CSV Configuration
Create a greenfield configuration
- For web filtering → EIA Samples
- For private app access → EPA Samples
Fix a common error
- EIA issues → EIA Common Issues
- EPA issues → EPA Common Issues
Understand CSV structure
- EIA structure → EIA CSV Files
- EPA structure → EPA CSV Files
Learn best practices
- Testing strategy → Best Practices
- Excel editing tips → Best Practices
- Version control → Best Practices
Prerequisites
Before working with CSV files, ensure you have:
Required Knowledge
- ✅ Understanding of EIA Configuration Model (if working with EIA)
- ✅ Understanding of EPA Configuration Model (if working with EPA)
- ✅ Familiarity with your organization's security requirements
- ✅ Access to Entra ID group names and user identities
Required Tools
- ✅ CSV editor (Excel, VS Code, or text editor)
- ✅ Migrate2GSA PowerShell module installed
- ✅ Microsoft Graph PowerShell SDK (installed with module)
- ✅ Appropriate Microsoft Graph permissions
Required Permissions
For provisioning after CSV review:
NetworkAccessPolicy.ReadWrite.All(for EIA/EPA provisioning)Group.Read.All(for user/group assignments)Application.ReadWrite.All(for EPA enterprise applications)Policy.ReadWrite.ConditionalAccess(for Conditional Access policies)
Next Steps
Ready to work with CSV files? Choose based on what you're deploying:
Or jump straight to Best Practices for cross-product guidance.
If you're stuck or have questions:
- Check the Understanding GSA section for conceptual guidance
- Review platform-specific Migration Guides for context
- Consult the Provisioning Documentation for next steps
- Contact the team at migrate2gsateam@microsoft.com