Skip to main content

Support Matrix

This support matrix provides a comprehensive overview of the migration toolkit's capabilities across different migration scenarios. Each migration path supports exporting configuration from source systems, transforming data to match Microsoft Entra's format, and provisioning to the target environment.

Global Secure Access Export (Backup/Restore/Tenant Migration)

FeatureExportTransformProvisionNotes
Entra Private Access✅ SupportedN/ASupportedDirect export from GSA for backup, disaster recovery, or tenant-to-tenant migration. No transformation needed - exported CSV is directly compatible with provisioning function.
Entra Internet Access⏳ Coming SoonN/ASupportedExport functionality under development. Will export policies, security profiles, and Conditional Access assignments.
Use Case

Unlike migrations from third-party platforms, GSA export captures existing Global Secure Access configurations for backup, restore, or replication scenarios. This is ideal for tenant-to-tenant migrations, disaster recovery, or promoting configurations between environments.

Zscaler Internet Access to Entra Internet Access

FeatureExportTransformProvisionNotes
URL Filtering RulesSupportedSupportedSupported
URL CategoriesSupportedSupportedSupportedTransformation requires provided mapping file.
SSL InspectionSupportedNot implementedSupportedManual CSV creation needed for provisioning (see sample files for format).
Firewall RulesSupportedNot implementedNot implemented
File Type Controls / File Type FilteringSupportedNot implementedNot implemented

Zscaler Private Access to Entra Private Access

FeatureExportTransformProvisionNotes
Application SegmentsSupportedSupportedSupportedOnly app segments are processed from segment groups. If desired, Conditional Access policies to enforce controls to multiple Enterprise Apps.
Segment GroupsSupportedSupportedN/AServer Group names are kept in the conversion output CSV for reference. Entra Private Access Connector Groups need to be manually specified for provisioning.
Server GroupsSupportedPartialSupportedServer Group names are kept in the conversion output CSV for reference. Entra Private Access Connector Groups need to be manually specified for provisioning.
Access PoliciesSupportedSupportedSupportedUser, group and SCIM group assignments are parsed and converted.
Client Forwarding PolicySupportedNot implementedNot implemented
Identity Provider ControllersSupportedN/AN/AUsed to parse SCIM groups
SCIM GroupsSupportedSupportedN/AUsed as part of Client Access policy group assignment conversion

Netskope Next Gen SWG to Entra Internet Access

Feature / ObjectExportTransformProvisionNotes
Real-time Protection PoliciesSupportedSupportedSupported
URL Lists (custom allow/block lists)SupportedSupportedSupportedConverted as Web Content Filtering policies
Predefined and Custom CategoriesSupportedSupportedSupportedPredefined categories transformation requires provided mapping file
SSL Bypass / ExceptionsSupportedN/ASupportedManual CSV creation needed for provisioning (see sample files for format).

Netskope Private Access to Entra Private Access

Feature / ObjectExportTransformProvisionNotes
Private ApplicationsSupportedSupportedSupported
NPA PoliciesSupportedSupportedSupported

Forcepoint Web Security to Entra Internet Access

Feature / ObjectExportTransformProvisionNotes
Web Category PoliciesManual exportSupportedSupportedMatrix-style CSV with security groups and dispositions
Predefined CategoriesManual exportSupportedSupportedTransformation requires provided mapping file
User-Defined FQDNsManual exportSupportedSupportedFQDNs listed in User-Defined category

Citrix NetScaler Gateway to Entra Private Access

Feature / ObjectExportTransformProvisionNotes
AAA Groups → Enterprise ApplicationsManual exportSupportedSupportedEach AAA group maps to one Entra Private Access Enterprise Application
Authorization PoliciesManual exportSupportedSupportedIP/subnet/FQDN/port rule expressions parsed. DENY, boolean, and negated policies skipped.
VPN Intranet ApplicationsManual exportSupportedSupportedMulti-destination entries expanded. ICMP protocol skipped.
Group Bindings (TCP/UDP consolidation)Manual exportSupportedSupportedSame policy bound for TCP+UDP consolidated into single segment
Conflict DetectionN/ASupportedN/ACross-app overlap detection for IPs, FQDNs, and wildcards

Microsoft Defender for Endpoint to Entra Internet Access

Feature / ObjectExportTransformProvisionNotes
Web Content Filtering PoliciesSupportedSupportedSupportedExported from HAR file. Blocked categories mapped directly. Audited categories converted to Block with review flag.
URL/Domain IndicatorsSupportedSupportedSupportedExported from HAR file. Warn/AlertOnly actions flagged for review.
IP IndicatorsSupportedNot supportedNot supportedExported from HAR file.
Device Group ScopingSupportedSupportedSupportedExported from HAR file. All device groups → Default profile. Specific groups → Override profiles with placeholder Entra groups.

Palo Alto Panorama to Entra Internet Access

Feature / ObjectExportTransformProvisionNotes
Custom URL CategoriesManual exportSupportedSupportedURL List type only.
URL Filtering ProfilesManual exportSupportedSupportedPer-category actions mapped. Alert/continue/override actions flagged for review.
PAN-DB Predefined CategoriesManual exportSupportedSupportedTransformation requires provided mapping file. Partial mappings excluded and flagged.
Security RulesManual exportSupportedSupportedOnly allow-action rules with URL filtering profiles processed.
Application References (App-ID)Manual exportSupportedSupportedOptional app mapping file. Mapped apps with endpoints → FQDN policies. Unmapped apps flagged for review.
Security Profile AggregationN/ASupportedSupportedRules with same user/group assignments aggregated into single profile.

Cisco Umbrella to Entra Internet Access

Feature / ObjectExportTransformProvisionNotes
DNS PoliciesSupportedSupportedSupportedExported from HAR file. Category and destination list rules converted to EIA web content filtering policies.
Web PoliciesSupportedSupportedSupportedIncludes proxy rulesets. Application, destination list, and category rules converted. Warn/isolate actions converted to Block with review flag.
Destination ListsSupportedSupportedSupportedCustom allow/block lists resolved to FQDN rules with dual-entry pattern.
Category SettingsSupportedSupportedSupportedUmbrella categories mapped to GSA web categories via provided mapping file.
Application SettingsSupportedSupportedSupportedApplication controls converted to FQDN-based rules via provided app mapping file.
Firewall RulesSupportedNot implementedNot implementedExported from HAR file