Prévia do material em texto
Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Netskope Security Cloud Operation and Administration Version 24.02 Welcome to the Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Introduction To begin with, let’s take a look at the subject matter this course covers, as well as definitions of a few Netskope terms which you’ll encounter frequently throughout the course. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 4 Class Agenda 1. Netskope Security Cloud Platform 2. Architecture 3. Cloud Confidence Index (CCI) 4. API-enabled Protection 5. Policies* 6. Netskope Client* 7. Threat Protection* 8. Reporting * = Lab Included 9. Netskope Advanced Analytics* 10. Netskope Digital Experience Management (DEM) 11. IaaS* 12. Web Security* 13. Netskope Cloud Firewall* 14. Role-Based Access Control 15. Netskope Borderless SD-WAN 16. Netskope IoT Security This course includes sixteen chapters. We’ll cover such subjects as the Netskope Security Cloud Platform and its architecture, and how to monitor and protect cloud storage, endpoint computers, and Infrastructure-as-a-Service. We’ll also discuss Netskope products such as Advanced Analytics, Borderless SD-WAN, and IoT Security. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration Netskope terminology 52024 © Netskope. All Rights Reserved. Managed device A device that has the Netskope client installed on it and that passes checks as defined in the device classification policy. Unmanaged device A device that either does not have the Netskope client installed on it or does not pass device classification checks. Managed/sanctioned application instance An application instance over which the IT team has administrative control. Administrative control is necessary to enable API data protection for the application instance. Unmanaged/unsanctioned application instance An application instance over which the IT team does not have administrative control and therefore cannot have API-enabled protection applied to it. A few Netskope terms used frequently throughout this course require a bit of clarification. First, let’s define what we mean by managed and unmanaged devices. Classifying devices as managed or unmanaged makes it possible to use real-time protection policies to perform different types of content inspection, and to apply different actions based on device classification status. Normally, only corporate devices can be managed, because an organization can not install software on devices it does not own. However, an organization may require contractors to install certain software (such as the Netskope client) and satisfy classification rules before they are permitted to access any of the organization’s internal resources. So in the context of this course, a managed device has the Netskope client installed and passes checks as defined in a device classification policy, while unmanaged devices are everything else. With cloud applications, the situation is more complicated. However, at a basic level, a managed or sanctioned application is an application instance over which the IT team has administrative control. This level of control is necessary to give the Netskope tenant access to the cloud application's API. Netskope supports API-enabled protection for a limited but constantly growing set of cloud applications. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Netskope Security Cloud Platform Netskope Security Cloud Operation and Administration Welcome to the Netskope Security Cloud Platform chapter in our Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2 • Describe the platform on which the Netskope Security Cloud is built • Discuss the components of the Netskope Security Cloud Platform 2024 © Netskope. All Rights Reserved. Objectives The objectives of this chapter are to describe the platform on which the Netskope Security Cloud is built, as well as discuss the individual components of the Netskope Security Cloud Platform. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Platform Supporting users connecting from anywhere is driving cloud transformation. It’s changing how work gets done as everything is becoming more intuitive, connected, open, and collaborative, and that change is reflected across SaaS, IaaS, and web environments, creating new challenges and risks. Netskope Security Cloud addresses these new challenges and risks, providing a platform for the convergence of security solutions, the Security Service Edge (or SSE), by protecting data and users wherever they are, across cloud, web, and private apps. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration 42024 © Netskope. All Rights Reserved. SkopeAI: Unlock the Potential of AI Across the Portfolio ● Discover newly connected devices and gain deeper insights into device context, activities, and behavior. ● Detect behavioral anomalies, threats, and vulnerabilities in real time. ● Optimize network access through enterprise-wide predictive insights. ● Perform WAN access anomaly detection, app performance flow analytics. ● Detect unpredictable and risky user behavior. ● Identify insiders’ anomalous behavior, compromised accounts, data exfiltration. ● Discover and govern the use of generative AI and novel SaaS apps. ● Protect sensitive data across apps like ChatGPT, and coach employees in real time. ● Prevent evasive attacks, polymorphic malware, new phishing, and zero-day threats. ● Perform faster detection and categorization of malware, web domains, URLs, and web content. Use pre-trained ML classifiers to automatically protect unstructured data with high reliability and speed. SD-WAN Optimization Generative AI and SaaS SkopeAI Data Protection Device Access Intelligence AI/ML Threat Protection User and Entity Behavior Analytics To automatically adapt to the ever-growing data landscape and the corresponding widespread adoption of generative Artificial Intelligence and new AI-driven attacks, Netskope has built sophisticated Machine Learning and AI capabilities into the Netskope Security Cloud platform. These capabilities, collectively called SkopeAI, provide superior and highly responsive security for the data and users in your environment. SkopeAI provides protection in six areas: • SkopeAI Data Protection employs pre-trained Machine Learning classifiers to identify sensitive information in both structured and unstructured textual data, including specific document types such as patents, merger and acquisition contracts, tax forms, and source code, as well as images such as desktop screenshots, whiteboards, passports, IDs, and more. • SkopeAI Threat Protection delivers superior results and speed, in detecting multivarious attacks, polymorphic malware, new phishing web domains, zero-day threats, and malicious web content. • Netskope CASB delivers Machine-Learning-based risk categorization of generative Artificial Intelligence and new SaaS apps and discerns app instances, such as corporate versus personal instances. • Netskope User and Entity Behavior Analytics uses Machine Learning to detect elusive anomalous behavior patterns, including malicious insiders, compromised accounts, brute force attacks, and data exfiltration. • SkopeAI enhances network access and performance with Machine Learningbecome accessible to users later. Similarly, an app that is accessible to users today because it is at the “High” level might be blocked later if the app's CCI score drops because changes to features have negatively impacted the app's enterprise-readiness, or because the app has been involved in a serious data breach. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 12 CCI Certifications/Standards Apps compliance and data center certifications • Compliance HIPAA, PCI • Data Center Standards SOC 1, SOC 2, ISO 27001 System and Organization Controls 2 (SOC 2) Built on a set of Trust Services Principles: • The security, availability, and processing integrity of a service organization's system • The system's ability to securely protect and process information designated as confidential • The system's ability to collect, use, retain, disclose, and destroy personal information in accordance with the organization's privacy and legal requirements Here are some of the industry certifications and standards that Netskope considers when assessing the enterprise-readiness of cloud apps. On the compliance front, Netskope checks to see if an app complies with such standards as HIPAA and PCI. For data center certifications, Netskope evaluates whether an app is certified for SOC 1, SOC 2, or ISO 27001. Each of these standards is composed of subsets of principles that govern the security design of IT systems. For example, the SOC 2 (or System and Organization Controls 2) standard for data centers is built on the following set of trust principles. These principles are as follows: • The security, availability, and processing integrity of a service organization's system • The system's ability to securely protect and process information designated as confidential • The system's ability to collect, use, retain, disclose, and destroy personal information in accordance with the organization's privacy and legal requirements 2024 © Netskope. All Rights Reserved. 12 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 13 App Usage and CCL History Let’s take a few moments to look at the areas in the Cloud Confidence Index user interface where you can view app usage and CCL history, compare apps, and generate reports. To begin with, when you search for an app and click the app's name in CCI, you are taken to the app details page. On the Usage and Risk tab, you can view information about the top users of the app and the amount of bytes downloaded and uploaded. Additionally, you can view a history of how an app’s Cloud Confidence Level has changed over time, providing insights into whether the app’s creators are actively working to improve the security of the app or not. 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration Comparing applications 142024 © Netskope. All Rights Reserved. The Cloud Confidence Index also enables you to compare information for up to three applications. The information compared among the three apps includes: • The CCI score • Tags that have been applied to the apps • The number of users and sessions for each app • Bytes downloaded and uploaded • Monthly pricing information, if available • Attribute differences To compare applications: 1. Search for an application and click the app in the search results. 2. In the upper-right area of the first application’s details page, click Compare. 3. In the Compare Applications dialog, search for and select up to two more applications, then click Compare. Note that differences in attribute values are indicated by blue dashed boxes around the differing attributes in the columns for the second and third applications. 2024 © Netskope. All Rights Reserved. 14 Netskope Security Cloud Operation and Administration Cloud Confidence Index: PDF report 152024 © Netskope. All Rights Reserved. On an application’s details page, you can choose to create a CCI report in PDF format. This report includes such information as: • CCI findings • Usage details • Similar apps by session • Top users by session • Pricing details, if available To create a report: 1. From the Export drop-down menu, select Download As PDF. 2. Choose whether to include top users by session in the report. 3. Click Download. 2024 © Netskope. All Rights Reserved. 15 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. API-enabled Protection Netskope Security Cloud Operation and Administration Welcome to the API-enabled Protection chapter in our Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2 • Discuss use cases for API-enabled Protection • Explain how API-enabled Protection works • Show how to set up API-enabled Protection • Search for, filter, and modify content, and discuss violations and exposure 2024 © Netskope. All Rights Reserved. Objectives The objectives of this chapter are to discuss API-enabled Protection use cases, explain how this technology works, and show how to set up API-enabled Protection and perform various tasks. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration 3 • Overview of API-enabled Protection • Configuring API-enabled Protection 2024 © Netskope. All Rights Reserved. API-enabled Protection First, let’s look at an overview of API-enabled Protection. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration 42024 © Netskope. All Rights Reserved. Introduction to API-enabled Protection • Integrate with APIs of managed applications – Out-of-band deployment model – Direct connection from Netskope to managed application instance – Provides “introspection” visibility and policy enforcement – Leverages APIs published by the SaaS provider (supported functionality depends on API functionality offered by SaaS provider) – Leverages the OAuth 2.0 protocol • Discover sensitive data in managed cloud storage or CRMs – Use predefined or custom DLP profiles – PII, PHI, PCI, or other confidential profiles Access MethodUser LocationDeployment Options Mobile app, desktop app, sync clientBrowserRemoteOn-Premises ••••Out-of-band / API-enabled Protection API-enabled Protection is able to integrate with the APIs of managed cloud applications to provide out-of-band protection. Because it directly connects Netskope to managed SaaS instances, API-enabled Protection requires full administrator access to these instances. Once this connection is established, Netskope has visibility into your managed cloud apps and can enforce policies to protect the data stored on these applications. Note that since API-enabled Protection leverages the APIs published by the SaaS provider, the actions you can perform on files stored in your managed cloud apps depends on the specific functionality the SaaS provider has built into its APIs. For example, one SaaS provider might enable you to use their API to place files in a legal hold folder, while another provider might not. API-enabled Protection leverages the OAuth 2.0 authorization framework, which gives third-party applications limited access to an HTTP service to orchestrate an approval interaction between a resource owner and the HTTP service (referred to as the three-legged OAuth model) or by allowing the third-party application to obtain access on its own behalf (also called the two-legged OAuth model). An advantage of using OAuth 2.0 is that even if the password for logging in to the cloud service changes, reauthorization is not required because Netskope does not store passwords, just the tokens that are part of OAuth. API-enabled Protection discovers sensitive data in managed cloud storage or customer relationship management systems using either predefinedor custom DLP profiles, such as Personally Identifiable Information, Protected Health Information, Payment Card Industry information, or other confidential profiles. Once API-enabled Protection is connected to your managed SaaS apps, it can protect data at rest regardless of the user’s location or how they are accessing the SaaS apps. Users can be located either on premises or at a remote location, and they can be accessing the SaaS apps from their web browser, from a mobile or desktop app, or through a sync client. Ultimately, once data is uploaded to the managed SaaS app, API-enabled Protection can both scan and protect this data. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration API-enabled Protection: Use Cases 5 • Visibility: – Inventory all users, files and content at rest within your managed apps – Verify external access to files and folders – See full file audit trail and version history • Data Security: – Identify sensitive content and potential risks – Revoke access to or encrypt sensitive data – Configure ongoing policies to scan folders for sensitive content and take corrective actions 2024 © Netskope. All Rights Reserved. The use cases for API-enabled Protection fall under two categories—visibility and data security. To provide visibility, API-enabled Protection creates an inventory of your users’ files and folders on managed SaaS storage. It also inspects file and folder ownership and sharing levels to identify gaps in security, so that appropriate remediation can be performed, such as taking ownership of sensitive content and changing sharing levels. API- enabled Protection also provides visibility into the full audit trails and versioning histories for individual files. This enables you to track all the file activities that have been performed, such as uploads, downloads, shares, views, and deletions. It also enables you to see when file versions have changed so the updated files can be re-scanned to detect new sensitive data or potential malware infections. To provide data security, API-enabled Protection scans the contents of files in cloud storage to detect sensitive data as defined by DLP profiles and rules. When such data is found, it can then revoke access to files, encrypt files, or take other actions supported by the SaaS provider’s APIs. Additionally, you can configure ongoing scans and run policies to ensure cloud storage repositories remain clean after they've been provisioned. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 6 Classic API-enabled Protection: Instance Dashboard Main graphs: • File Exposure • File Types • File DLP Violations • Shared External Domains • Internal Sub Domains (Google Drive) • File Source, Channel Type (Slack) • File list (click for details) Reporting: • Scheduled (email) • PDF (download or email) • CSV Export The main interface for visualizing your company’s data and the users accessing it The screenshot on the slide shows the API-enabled Protection dashboard, with statistics for a Dropbox application instance. These statistics include the amount of publicly-shared content on the instance, file types, file names, detected DLP violations and malware, and more. The dashboard provides deep insights on all files and users within the CASB app instance. Administrators can use the dashboard to perform ad-hoc, real-time queries that can quickly group, filter, and drill down on contextualized transaction information across an organization’s cloud activities, both at a high level and with granular detail. Once you have connected a managed CASB app instance to the Netskope tenant, the API-enabled Protection dashboard is automatically populated with the relevant files and user data. An API-enabled Protection policy with a DLP profile is needed to view relevant violation information. The dashboard has Files, Internal Users, and External Users pages for all the apps except for Amazon Web Services, Microsoft Azure, Workplace by Facebook, Slack, and ServiceNow, all of which have unique pages. Google Drive has an additional page for Google Ecosystem, and Salesforce has an additional page for Key Management. There are also app-specific pages for AWS, Azure, Gmail, Slack, Outlook, and Cisco WebEx Teams. Once you log in to the Netskope UI tenant, click API-enabled Protection in the left navigation pane to display a list of apps, then click an app to view its specific dashboard statistics. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration Classic API-enabled Protection: Filters 72024 © Netskope. All Rights Reserved. • Create filters • Quickly find data • Expand categories • To remove filters: – De-select in filter menu – Click selected filter’s “X” button You can use filters to quickly find specific details among the large amounts of data collected by API-enabled Protection, which is especially useful when your cloud storage repositories have hundreds of thousands of files stored on them. Filters are page-specific, so the filters shown in the screenshot on the slide apply specifically to the Files page. Filters are organized by categories, such as File ID, path, type and size, owner, exposure, and more. When you see a magnifying glass icon next to an item in the filter menu, you must enter the specific value you want to filter by, such as a file ID or path. To select other types of filters, expand a category and place a checkmark next to the filter you want, then click Apply. To remove a filter from your list of selections, either de- select the filter in the filter menu, or click the filter’s “X” button. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 8 Classic API-enabled Protection: Take Action • Take immediate (bulk) action to mitigate risk • Select one or more files • Supported actions vary by application You can take actions on files discovered by API-enabled Protection by selecting one or more files. This activates the Take Action drop-down list and lets you choose an action. The options that are displayed in the Take Action list in the screenshot on the slide are the actions that are available with the Box API. The available actions will vary depending on the CASB app you are connected to and what its API allows you to do. To view a list of all possible actions for managed cloud apps, browse to docs.netskope.com and search for: API Data Protection policy actions 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 9 Classic API-enabled Protection: User Dashboard Drill down to view details about users who are accessing data. You can also drill-down into the CASB app’s internal and external users. In the screenshot at the top of the slide, you can see the number of internal users who have accessed files in the CASB app. Clicking on the number takes you to the Users page, where you can view the individual users, how many files they own, how many of those are public files, and how many files have non-expiring links. You can also export the data, as well as download, email, or schedule a PDF report. Additionally, you can click a username to see more details about the user. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration 102024 © Netskope. All Rights Reserved. • Bird’s-eye view of all Next Gen applications’ content at once • Content is a high-level abstraction that combines files, messages, comments, and pages, depending on the application • Use filters to “slice and dice” the view • Take manual actions depending on the application Next Gen API-enabled Protection: Content Inventory API-enabled Protection > CASB API (Next Gen) > Inventory In parallel tomaintaining and developing the Classic API-enabled Protection framework, Netskope has introduced and is rapidly expanding a Next Gen API-enabled Protection framework. Next Gen will eventually replace Classic, and all apps from the Classic version will be migrated to the Next Gen framework. For the time being, the two frameworks co-exist. New apps are being added to Next Gen, while apps already available in Classic are being migrated to Next Gen independently of each other. During this migration process, you may see the same app available under both frameworks. One of the advantages of the Next Gen framework is the introduction of high-level abstractions to allow for a unified view of all managed apps on the same page. The fact that a cloud storage app such as Box operates on files and folders, while a collaboration app such as Slack operates on files as well as messages and channels, led to different and app-specific instance dashboards in the Classic framework. Next Gen combines different content entities such as files, messages, comments, or pages, under a higher-level abstraction of content and presents all these different kinds of content in a single table view. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration 112024 © Netskope. All Rights Reserved. A common abstraction for: • Channels (MS Teams) • Folders (MS SharePoint) • Repositories (GitHub) • Wikis (Atlassian Confluence) Next Gen API-enabled Protection: Content Collections API-enabled Protection > CASB API (Next Gen) > Inventory Similarly to how the Next Gen API-enabled Protection framework groups individual items such as files and messages under high-level abstraction content, it also introduces the higher-level concept of “content collections” which organize the content for different apps into channels, folders, repositories, and wikis. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration API-enabled Protection: Detecting Changes 12 • Netskope API-enabled Protection uses a polling model – New files are detected max 5 minutes after being uploaded – DLP scans happen every 20 minutes on new content • Many vendors also support Webhooks – Changes are pushed to Netskope – Near instant detection of newly uploaded content 2024 © Netskope. All Rights Reserved. After API-enabled Protection has made a full inventory of all files and folders on a managed SaaS app, it uses two different methods to keep track of subsequent changes. The first method is polling, which API-enabled Protection uses by default. Every 5 minutes, it polls the SaaS app to see if there have been any changes. If the app responds in the affirmative, API-enabled Protection scans the new items. Additionally, API-enabled Protection performs DLP scans on new files every 20 minutes. The second method uses Webhooks. This method provides near real-time change detection because the SaaS app pushes a notification to Netskope as soon as it detects a change, and API-enabled Protection responds by immediately scanning the item. Although this is the preferred method, it is not the default because not all SaaS vendors support Webhooks. 2024 © Netskope. All Rights Reserved. 12 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 13 Netskope Service Provider Netskope Service Provider Did anything change? No Did anything change? Yes, Item X Give details on Item X Here you go Item X has changed Give me details on Item X Here you go Item X has changed Give me details on Item X Here you go Polling Webhooks Polling vs Webhooks The diagrams on this slide illustrate the workflows for both the polling and Webhooks methods used by API- enabled Protection to check for changes on SaaS apps. With the polling method, Netskope initiates the communication with the SaaS service provider and asks if anything has changed. If the provider responds with a “no”, a 5-minute timer is started. After 5 minutes elapses, Netskope again asks the service provider if there have been any changes since the last request. If the provider responds with a “yes”, Netskope asks for details about the changed item, which the provider supplies. At that point, API- enabled Protection scans the changed item. With Webhooks, the service provider initiates the communication with Netskope by sending a notification whenever a change occurs. Netskope asks the service provider to provide details about the changed item, the provider supplies the requested information, and API-enabled Protection inspects the changed item. This process repeats itself each time the service provider detects a change. 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration 14 • Overview of API-enabled Protection • Configuring API-enabled Protection 2024 © Netskope. All Rights Reserved. API-enabled Protection Now let’s discuss how to configure API-enabled Protection. 2024 © Netskope. All Rights Reserved. 14 Netskope Security Cloud Operation and Administration Classic: Application integrations built on the first-generation API-enabled Protection platform. Next Gen: Application integrations built on the newer API-enabled Protection platform. Applications will be gradually upgraded from Classic to Next Gen. 2024 © Netskope. All Rights Reserved. 15 Overview of API-enabled Protection Configuration Connect your Netskope Instance to your managed SaaS app. • Select the application. • Start the authorization process by clicking Setup Instance. Settings > Configure App Access > Classic or Next Gen API-enabled Protection is configured in your Netskope tenant by navigating to Settings > Configure App Access and then clicking either Classic or Next Gen. The Classic page shows SaaS apps that use Netskope’s first- generation API platform to connect, while the Next Gen page shows apps that are able to connect using Netskope’s latest API platform. All Classic apps will gradually be upgraded to the Next Gen API platform and retired from the Classic platform. Consequently, if you are compelled to configure an app connection on the Classic page today because your app does not yet have a Next Gen option, Netskope recommends setting up a new connection as soon as that app becomes available on the Next Gen page to avoid a service disruption when the Classic connector is retired. There are several differences between the Classic and Next Gen pages as to how app connections are configured, so first we’ll discuss how to configure access on the Classic platform. Once you are on the Classic page, make sure that the SaaS tab is selected at the top of the page. Next, select the app you want to connect to and click Setup Instance. 2024 © Netskope. All Rights Reserved. 15 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 16 Configuring Classic API-enabled Protection • Enter the following: – Application instance details – Instance name (used throughout Netskope tenant interface) – Email address of app admin account • Supported functionality for each instance: – CASB API – Quarantine – Legalhold – Malware – Forensic The next step in setting up the SaaS app instance is to provide the details Netskope needs in order to configure the API connection. First, specify a name for the instance. This is the name that will identify the app in dashboards, events, incidents, and reports in the Netskope tenant. Next, under Instance Type, select the types of API functionality that you want to use with the app instance. As mentioned earlier, the available options may vary from one app to another because not all apps offer the same API functionality. To illustrate, we will use Box as our example. As shown in the screenshot on the slide, 5 different API functions are supported for Box. The CASB API option allows Netskope to scan the Box instance to create an inventoryof files and users and to inspect files. The Quarantine and Legalhold options enable Netskope to move files into correspondingly-named folders when DLP scans find that the files contain sensitive content, or they hold information that must be retained for pending litigation. The Malware option enables Netskope to scan files for malware infections, and the Forensic option lets Netskope move files into a forensics folder for further investigation after they are found to violate DLP policies. Note that when you select the Quarantine, Legalhold, and Forensic options, Netskope will automatically create corresponding folders on Box. Finally, specify the email address of a Box administrator who has full access rights to the app, and confirm that you have completed the prerequisite configurations on the Box app itself, such as setting up Box Event Stream and enabling a JSON Web Token. Once you have supplied all the needed information, click Save. 2024 © Netskope. All Rights Reserved. 16 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 17 Authorizing Classic API-enabled Protection • Disable popup blockers and verify you are not logged in to the SaaS app as a different user. • Click Grant Access. • Log in to the app with the admin account whose email address you specified earlier and approve access rights when prompted. The app should now show up in the SaaS app list in your Netskope tenant. However, notice that there is a red icon with an “X” to the left of the app, indicating that a connection has not yet been established. The next step is to actually log in to the app and establish the connection. Before you attempt this, however, make sure you disable popup blockers in your web browser. Also, you may need to close all your browser tabs to ensure that you are not currently logged in to the SaaS app as a different user. Once you have done these things, click the app’s Grant Access button. A browser window should pop up, asking you to enter the username and password of the app administrator whose email address you specified earlier. This should be followed by a screen asking you to verify that you want to give Netskope various access rights to the app. 2024 © Netskope. All Rights Reserved. 17 Netskope Security Cloud Operation and Administration Verifying Authorization of Classic API-enabled Protection 182024 © Netskope. All Rights Reserved. • If successful: – A green checkmark appears next to the instance name. – If you still see a red checkmark, refresh the page. – The account used to authorize “secure delegated access” receives an email. • Inventory of users, files and folders starts automatically. After you have successfully logged in to the SaaS app and approved all requested access rights, return to the SaaS app list in your Netskope tenant and verify that the app’s red “X” icon has changed to a green checkmark icon. You may need to refresh your browser to see these changes. At this point, Netskope automatically begins scanning the app and making an inventory of all users, files, and folders. 2024 © Netskope. All Rights Reserved. 18 Netskope Security Cloud Operation and Administration 192024 © Netskope. All Rights Reserved. Streamlined instance setup • No instance type selection • Granting access is implicit in the setup Next Gen API-enabled Protection Setting up a managed application instance for the Next Gen API platform is similar to the process for the Classic API platform, but there are a number of differences. To set up a Next Gen app instance, perform the following steps: First, on the Next Gen page, select the CASB API tab. Next, select the SaaS app you want to manage. Next, click Setup CASB API Instance. Follow any instructions that are displayed and provide instance details as requested. Next, click the Grant Access button. Finally, authenticate to the managed app instance under the appropriate administrator account. Note that the process of granting access is part of the setup and is not performed separately. Additionally, instance types are absent. Instead of enabling a Threat Protection instance type, the Next Gen framework simply requires a policy with a Threat Protection profile for the instance (or for all managed SaaS apps at once). 2024 © Netskope. All Rights Reserved. 19 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Policies Netskope Security Cloud Operation and Administration Welcome to the Policies chapter of the Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2 • Describe Netskope policy flow • Discuss the two main Netskope policy types: Real-time Protection and API-enabled Protection • Explain the function of DLP rules and create a rule • Explain the purpose of profiles and how they are used in policies • Discuss policy actions • Discuss use cases for quarantine instances and explain how to use this capability 2024 © Netskope. All Rights Reserved. Objectives The objectives of this chapter are to describe the flow of Netskope policies; discuss the two main Netskope policy types—Real-time Protection and API-enabled Protection; explain the purpose and function of DLP rules and how to create a rule; explain the purpose of profiles and discuss how they are used in policies; discuss policy actions and how to add them to policies; and discuss why you would want to use quarantine instances, as well as explain how to configure and use this capability. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration Policies 3 • Overview of Netskope Policies • DLP Rules/Classifications • Profiles • Actions • Quarantine 2024 © Netskope. All Rights Reserved. First, let’s describe the flow of Netskope policies, and discuss Netskope API Data Protection and Real-time Protection policies. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 4 Policy flow Rules Profile Policy Rule-1 Rule-2 FP Automotive DS - DLP EM Identifiers ID-1 ID-2 ID-3 API Data Protection Real-time Protection CASB Web IaaS Private App DLP Rule Dictionary Exact Match Fingerprint Classification DLP/Threat Name SSN CCN Driver’s License ML Image Classifiers Netskope uses a top-down approach to policy building. To illustrate this approach, let’s use DLP policies as an example. The first level of the DLP policy creation flow is to select data identifiers. There are more than 3500 identifiers built into the system to identify such information as first name, last name, social security number, credit card number, driver license, Machine Learning image classifiers, and many more types of data. Additionally, you can create your own custom data identifiers. The next level of the policy flow is rules. As shown in the diagram on the slide, you can roll up multiple data identifiers into a single rule. The different types of rules include DLP, dictionary, exact match, and fingerprint classification rules. The next level of the policy flow is profiles. Profile types include DLP, threat, and more. For a DLP profile, you can roll up multiple DLP rules into a single profile. Multiple rules within a profile are evaluated using logical “ORs”. For example, if rule one or rule two or a fingerprinting rule or an exact match rule are true, then the profile will be triggered. The final level of the policy flow is the policy itself. Profiles are attached to Real-time Protection and API Data Protection policies. Other policy types include cloud app, web, IaaS, private app, and firewall policies. In summary, a typical DLP policy flow works as follows: First, data identifiers trigger rules. Second, rules trigger profiles. Third, profiles trigger actions in policies. 2024 © Netskope. AllRights Reserved. 4 Netskope Security Cloud Operation and Administration 52024 © Netskope. All Rights Reserved. Real-time Protection Policies • Enforce an action based on: – Users, groups, and OUs (as inclusions or exclusions) and other criteria (source IP, user confidence, etc.) – Cloud apps, web page categories, private apps, etc. – Activities (browse, download, upload, etc.) – Constraints (From User, File Type, etc.) and criteria (App Instance Tag, Destination Country, etc.) • Define DLP and threat protection profiles to protect against data loss and malware. Once you have gained visibility into the cloud apps being used in your organization and users’ activities in those apps, the next step is to define policies to enforce your business rules. Real-time Protection policies enable you to enforce actions in real time, such as blocking file uploads or downloads. Policies can be based on source criteria such as: • Users, groups, and organizational units (as either inclusions or exclusions), as well as source IP address, user confidence level, access method, and device classification • Destination types, including cloud applications, web page categories, private apps, web traffic, and all traffic • Activities such as login attempt, download, upload, share, post, or copy • Constraints such as file type, file size, and content coming from or going to a specific user In addition to this, you can also define DLP and threat protection profiles to inspect traffic and prevent exposure or loss of sensitive and critical data. Netskope provides a wizard-driven policy tool that walks you through all the steps of policy creation. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration 6 • Safe cloud enablement with a single policy Coach users away from apps with a lower than “good” CCL when they try to upload data, offering them the corporate solution as an alternative. At the same time, still allow downloads from the same apps for collaboration with external parties. • Granular control in a managed app Block downloads of sensitive data from Salesforce.com to mobile devices as soon as users travel outside the US. 2024 © Netskope. All Rights Reserved. Real-time Protection policies: Use cases Now let’s consider a couple of use cases for Real-time Protection policies. To begin with, these policies enable your users to work safely in the cloud. For example, with a single Real-time Protection policy, you can coach users away from cloud apps that have a Cloud Confidence Level that is lower than “good.” When users try to upload data to an unapproved cloud app, you can display a block page that alerts them that this action is not recommended, and you can direct them to an approved corporate solution that has a much higher CCL score. In the same policy, you can also allow downloads from the app so that your users can collaborate with external parties who are using the app to share files. A second use case for Real-time Protection policies is to bring granular control to managed apps. For example, you can configure a policy to allow users to download sensitive data from an approved cloud app such as Salesforce when they are on their corporate laptop in the United States, but then block downloads when they are accessing Salesforce on a mobile phone and are traveling outside of the United States. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration Real-time Protection policy processing Order-specific! 7 • Important! – Real-time Protection policies are processed sequentially (top to bottom) DLP = Exception – A match will stop further processing. – Verify the order of your policies! – Select the rule position when saving the policy: Top / Bottom / Before / After • Drag and drop policies to re-order Click Apply Changes to save the order. Policy changes do not take effect until you apply the changes. 2024 © Netskope. All Rights Reserved. A crucial concept related to Real-time Protection policies is their processing order. Real-time Protection policies are processed sequentially from the top down, and when there is a match on a rule within a policy, no further rules or policies are processed. The only exception to this is DLP rules, which continue to be processed after a match is found. For all other rules, however, you need to plan your policy ordering carefully. For example, suppose you want to allow full access to the Box app in your organization, but you want to block all other cloud storage apps. To achieve these objectives, you need two different policies. Your “Allow Box” policy needs to be placed at the top of the stack, and the “Block all cloud apps” policy needs to be placed below that. With the two policies in this order, things will work as intended. Users who try to access Box will be able to do so because the “allow” rule in the first policy will trigger a match. Users who try to access any other cloud storage app will be blocked, because after the “Allow Box” policy has been evaluated without triggering a match, processing will proceed to the “Block all cloud apps” policy, which will trigger a match. If the order of the two policies is reversed, however, the intended results will not be achieved. With the “Block all cloud apps” policy at the top of the stack and the “Allow Box” policy positioned below it, a user who attempts to access Box will not be successful, because the “block” rule in the top policy will trigger a match when it identifies Box as a cloud storage app. The “Allow Box” policy will never be evaluated because all processing stops when there is a match on a rule. Initial policy position is specified when you save the policy. You are asked whether you want to move the policy to the top or bottom of the stack, or before or after a specific policy in the stack. Note that after you have saved a policy and specified its initial position, you can change its position at a later time by using the drag handle to the left of the policy number, indicated by the two columns of three dots each. When you hover over the drag handle, it changes to a vertical double-sided arrow. You can then drag-and-drop the policy to the desired position in the stack. Finally, click Apply Changes. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration API Data Protection Policies 9 Create / Modify Policies • Active API-enabled Protection • DLP • Profiles • Templates 2024 © Netskope. All Rights Reserved. Next, let’s discuss API Data Protection policies. These policies use a wizard-driven engine to protect data at rest. The look and feel of this wizard is slightly different from the Real-time Protection policy wizard, but it lets you quickly specify the application, users, content, and activities to include in the policy, as well as a DLP profile that defines the type of data you want to look for, and the action you want to take when sensitive data is detected. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration 10 • Protect PII information against exposure Scan all files in the company’s managed cloud storage app for PII content. If PII information is shared outside the company, remove the external links or shares. • Protect classified information against SaaS vendor insider threats Scan all files in the company’s managed clouds storage app for corporate classified data. Automatically encrypt files that match the DLP policy. 2024 © Netskope. All Rights Reserved. API Data Protection policies: Use cases Two common use cases for API Data Protection are protecting PII against exposure and protecting classified information against SaaS vendor insider threats. To protect Personally Identifiable Information, API Data Protection can scan the files in your managed cloud app instance to detect personal information such as driver license numbers,social security card numbers, and so forth. If files containing sensitive information are found, API Data Protection can remove external links or shares to prevent that content from leaving the organization. Keep in mind that API Data Protection requires administrator- level access to the cloud app to be able to perform these operations. To protect classified information against SaaS vendor insider threats, API Data Protection can scan the files in your organization’s managed cloud app to detect corporate classified data. If the cloud app supports it, API Data Protection can encrypt files containing sensitive information. This provides a higher level of protection against SaaS vendor insiders who have some level of access to their customers’ cloud app instance and can get to files stored on the app. By encrypting sensitive files, these insiders will not be able to access the contents of the files. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration 11 1. Specify the application, app instance (e.g., Box, Cloud Storage, etc.). 2. Specify the users (All, Selected Users, User Profiles, Groups). 3. Specify the content to scan (Shared Ext/Int, Public, Private, File Types. 4. Specify the activities that need to be protected or controlled (e.g., Edit, Share, Change permissions, etc.). 5. Optional: Apply DLP. 6. Apply an action (Alert, Encrypt, Restrict Access/sharing, Legal Hold, Disable Print/Download). 7. Specify a notification. 2024 © Netskope. All Rights Reserved. API Data Protection policies: Workflow The workflow for building API Data Protection policies includes seven main steps. Step 1 is to specify the application or application instance you want to inspect. The application can be a specific SaaS product, such as Box, or a more general category of cloud apps, such as cloud storage. The application instance is a specific instance of a cloud app, such as a corporate instance of Box. Step 2 is to specify users or user groups. These users are different from Real-time Protection policy users. Real- time Protection policies look at users, groups, and organizational units. API Data Protection policies look at owners or users who have permissions to perform operations in the cloud app, such as sharing and modifying files. Step 3 is to specify the content to scan. Protecting content with API Data Protection can be thought of in terms of layers of exposure. Rather than trying to detect and protect all kinds of data at rest in one pass, Netskope breaks things down into layers. For example, consider a policy designed to protect a certain category of data, such as PII, or to comply with regulatory requirements, such as GDPR. The policy is first run against externally-shared files on cloud storage, and any files that are found to contain sensitive data are remediated by removing sharing links. The policy is then run against internally-shared files, which are remediated next, then public files, then private files, and finally specific file types. After the full initial scan of all files in cloud storage, you would schedule regular retroactive scans to make sure that the repository is staying clean. Step 4 is to specify the activities that need protection. These activities are different from those specified in Real- time Protection policies. Real-time Protection is concerned with activities such as uploading and downloading files in real time, viewing files, and so forth. API Data Protection is concerned with editing files already on cloud storage, creating external sharing links for files, changing file permissions, and so on. Step 5 is to optionally apply a DLP profile. Step 6 is to apply an action. Once again, Real-time Protection policies and API Data Protection policies differ. Because Real-time Protection is physically sitting inline with traffic, you can take actions such as allowing or blocking, bypassing, and so forth. Since API Data Protection is not inline with the traffic, you can only take an action after the fact. For example, you can generate alerts, restrict file access and sharing, disable printing and downloading, or place files in legal hold. Step 7 is to specify notifications to send to administrators and users to let them know what actions have been taken. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 12 SaaS “Classic” API Data Protection policies Policies > API Data Protection > SaaS > Classic • Processed in parallel. • Apply to a single managed application instance. • No more than one DLP profile. • Supported actions depend on the application. • Shared between ongoing scans and retroactive scans. API Data Protection for SaaS applications is currently split into two frameworks: Classic and Next Gen. Eventually, Netskope will migrate all supported SaaS apps to the Next Gen platform, but at present, you will need to divide your policies across the two frameworks, depending on which apps you need to protect. Additionally, there are some other points you should be aware of. When it comes to protecting sensitive data in API Data Protection policies, there are a number of differences from Real-time Protection policies. The differences are even more pronounced in the Classic framework of API Data Protection. First, a policy necessarily applies to a single instance of a single application. If you want to detect the same sensitive data in different apps, or if you have more than one managed instance of an app, you will need multiple API Data Protection policies to achieve this goal. Next, a policy allows selection of no more than one DLP profile. We will discuss profiles in detail later in this chapter, but for the purposes of this overview, know that if you need to detect sensitive data and perform policy actions using multiple DLP profiles, you will need multiple policies. For retroactive scans of SaaS apps, the Classic API Data Protection framework uses the same policies as those used for ongoing scans. In other words, if you want to use a retroactive scan to find existing documents that match a certain DLP profile, you need to create a normal API Data Protection policy with this DLP profile first. This is different from how Next Gen API Data Protection works. 2024 © Netskope. All Rights Reserved. 12 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 13 • Processed in parallel. • Can apply to: – All applications – Category – Application – Instance • Multiple DLP profiles. • Retroactive scan policies are separate from ongoing scan policies. SaaS “Next Gen” API Data Protection policies Policies > API Data Protection > SaaS > Next Gen Next Gen API Data Protection aims to bring the experience of using API Data Protection policies closer to that of Real-time Protection policies. In particular, with Next Gen API Data Protection policies you can do the following: First, you can apply a policy either to all managed SaaS app instances, all managed instances belonging to a cloud app category (for example, Cloud Storage or Collaboration), all managed instances of the same app, or a specific instance. This enables you to use far fewer policies than in the Classic framework. Note that the available actions in the policy depend on the application scope, and you will only be able to select the actions supported for all apps in the scope. In other words, if you want to use an app-specific action, you need to create a policy for that specific app rather than for all apps, or for a category. Next, you can select multiple DLP profiles in a single policy. This also reduces the number of policies that are needed to cover the same use cases, as compared to the Classic API Data Protection policies, thereby making policy management easier. Finally, with retroactive scans, the Next Gen API Data Protection framework has entirely separate sets ofpolicies for ongoing scans and retroactive scans. 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration Filtering and editing policies 142024 © Netskope. All Rights Reserved. The larger your policy list grows over time, the more difficult it can be to locate specific policies so you can edit them as the need arises. The Netskope tenant offers powerful policy filtering features to help you locate the exact policies you want to edit. By default, there is a “Policy Name” filter that enables you to search for specific text in the names of policies. Additionally, you can click Add Filter to add a wide assortment of other filters to help you locate policies by such criteria as User, User Group, Organization Unit, Profile Type, Action, and many more. After you have located the policy that you want to tune, click the ellipsis button to the right of the policy to access a popup menu to choose from options including Edit, Disable, Clone, and more. 2024 © Netskope. All Rights Reserved. 14 Netskope Security Cloud Operation and Administration Policies 16 • Overview of Netskope Policies • DLP Rules/Classifications • Profiles • Actions • Quarantine 2024 © Netskope. All Rights Reserved. Next, let’s take a look at DLP rules and classifications. 2024 © Netskope. All Rights Reserved. 16 Netskope Security Cloud Operation and Administration DLP: Use cases 17 • Prevent confidential data from being leaked or uploaded to cloud apps that are not enterprise-ready. • Allow users to work with cloud apps that have less than stellar security but block or coach on activities involving sensitive data. Allow is the new Block! • Create Real-time Protection policies with DLP profiles to control sensitive data in real-time. • Create API Data Protection policies with DLP profiles to detect and protect sensitive files stored in your managed cloud apps. Examples: Revoke access for external users, encrypt data 2024 © Netskope. All Rights Reserved. You can use DLP to prevent confidential data from being leaked or uploaded to cloud apps that are not enterprise- ready. This allows users to collaborate with external parties, such as partners, using cloud apps that are not officially approved in your organization, while ensuring that sensitive data is not compromised. If DLP detects that a user is trying to transfer sensitive data to such apps, it can block uploads or coach the user that their activity is not advised. As Netskope likes to say, “Allow is the new Block!” You can create Real-time Protection policies that have DLP profiles assigned to them to control the movement of sensitive data in real time, and you can also create API Data Protection policies to scan files in cloud storage for sensitive data, and then take an action such as revoking external users’ access to files, encrypting files, and so forth, provided that the cloud application supports the action. 2024 © Netskope. All Rights Reserved. 17 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 18 Standard, SkopeAI, and Advanced features AdvancedSkopeAIStandard Everything in Standard and SkopeAI, as well as: File fingerprinting, Exact Data Matching (EDM) and Optical Character Recognition (OCR) Everything in Standard as well as: AI/ML classification for patent and M&A documents, tax forms, source code, images (desktop screenshots, whiteboards, passports, IDs, etc.) • Data-at-rest and data-in- motion DLP • 40+ regulatory compliance templates including GDPR, PII, PCI, PHI, etc. • 3,000+ data identifiers, 1,600+ file types, custom regex, patterns • Two AI/ML standard classifiers for resumes and source code • Incident management and remediation Netskope DLP is offered in three different packages. The Standard package gives you DLP for data-at-rest and data-in-motion in cloud applications. It also includes more than 40 templates for regulatory compliance, such as GDPR, PII, PCI, and more. It comes with more than 3000 predefined data identifiers that enable you to build policy rules to detect specific types of information, such as credit card numbers, Social Security numbers, and so forth. It offers detection for more than 1600 true file types. “True file type” means a file’s type as determined by its internal format and structure, not merely its filename extension. The Standard package also includes support for custom Regex expressions and patterns, as well as two Machine Learning classifiers for detecting resumés and source code, and incident management and remediation workflows for DLP incidents. Next, the Skope AI package includes all the features and capabilities of the Standard package, with the addition of an extended set of AI and Machine Learning capabilities to identify patents, Merger and Acquisition documents, tax forms, and additional types of source code. It's also able to detect sensitive information in images such as desktop screenshots and photos of whiteboards, and to identify pictures of passports, government ID cards, and so forth. Finally, the Advanced package includes everything that is in both the Standard and SkopeAI packages, and adds file fingerprinting, Exact Data Matching, and Optical Character Recognition. We will explore all these capabilities in more detail later in this chapter. 2024 © Netskope. All Rights Reserved. 18 Netskope Security Cloud Operation and Administration 19 • A DLP Rule defines what data to look for. Many predefined rules exist in the system. • A DLP Profile can be assigned to a policy (Real-time Protection or API Data Protection). – Can contain several DLP Rules (Logical Order) – 35+ predefined profiles in the system 2024 © Netskope. All Rights Reserved. DLP: Rules and profiles Policies > Profiles > DLP > Edit Rules > Data Loss Prevention Policies > Profiles > DLP As we mentioned earlier, data identifiers describe specific kinds of information, such as first and last names, credit card numbers, and so on. Data identifiers are included in DLP rules to define what data to look for in data-at-rest or data-in-motion. Netskope DLP offers a wide range of predefined rules to add to your policies, and you can also build custom rules as needed. Multiple rules can be rolled into a DLP profile, which you can then assign to a Real-time Protection or API Data Protection policy. For example, the “Payment Card Industry Data Security Standard” profile includes 8 different DLP rules. There are more than 35 pre-built DLP profiles, and you can build your own custom profiles that include both pre-built and custom DLP rules. The rules in a DLP profile are processed sequentially and joined by "OR" operators. For example, if rule 1 or rule 2 or rule 3 are true, the DLP profile is triggered. 2024 © Netskope. All Rights Reserved. 19 Netskope Security Cloud Operation and Administration DLP rules location 20 • Rules are located under the DLP profile: Policies > Profiles > DLP > Edit Rules > Data Loss Prevention • DLP rules contain: – Predefined identifiers – Custom identifiers – Advanced matching options – Content to be scanned – Severity Threshold 2024 © Netskope. All Rights Reserved. DLP rules are found in the Netskope tenant by clicking Policies, then under Profiles clicking DLP. From the Edit Rules drop-down list, select Data Loss Prevention. DLP rules consist of predefined or custom data identifiers; advanced matching options such as Exact Data Matching and proximity expressions; details about the content to scan, such as only metadata, only content, or both; and the severity threshold, or the number of matches required before a policy action will be taken. 2024 © Netskope. All Rights Reserved. 20 Netskope Security Cloud Operation and Administration DLP predefined identifiers (1 of 2) 21 • Create rules using 3,000+ predefined data identifiers – Numbers: SSN, CC, Driver License – Names: People, banks, medical, etc.– Addresses: Different countries • With data validation: – Luhn check on CC – Prefix check on SSN 2024 © Netskope. All Rights Reserved. As mentioned earlier, Netskope DLP lets you choose from more than 3000 predefined data identifiers to create DLP rules. There are data identifiers for numbers such as Social Security, credit card, and driver license numbers. There are also identifiers for proper names such as people's names and the names of businesses, and general names such as medical terms. Additionally, there are data identifiers for addresses such as residential and business addresses and countries. To verify that specific types of data are what they appear to be, Netskope DLP performs data validation. For example, to identify valid credit card numbers, Netskope DLP performs a Luhn check on likely candidates, such as 16-digit patterns that look like they could be real credit card numbers. A 16-digit number that consists of repeated numbers, such as 16 ones, is immediately dropped from further consideration because it does not correspond to a valid pattern for a credit card number. Another example of number patterns that Netskope DLP can validate are 9- digit numbers that look like they could be U.S. Social Security numbers. It verifies that the first 5 digits correspond to a prefix range that has been officially released by the Social Security Administration. 2024 © Netskope. All Rights Reserved. 21 Netskope Security Cloud Operation and Administration • Quick Search – Narrow in on a specific type of identifier – Useful for when you’re not sure exactly what you’re looking for • Predefined tags – Appear in search results – When browsing by category, all tags associated with the different data identifiers in the category are displayed collectively DLP predefined identifiers (2 of 2) 222024 © Netskope. All Rights Reserved. If you want to add a predefined data identifier to a DLP rule but you don't know what it's called or where it's located, you can use Quick Search to help you find what you're looking for. For example, by typing “Canadian addresses” in the Quick Search field, you can quickly see all the data identifiers related to Canadian postal addresses. Quick Search also makes it easier to see all the data identifiers related to broader terms across all categories. For example, to see all the data identifiers and categories related to the medical profession, you could type “medical” in the Quick Search field to see an expandable list of all the available medical data identifiers, such as healthcare ID numbers, patient information terms, and medical procedures, as well as categories and subcategories such as “Medical Data” and “Medical Data Classification Systems”. Note that there are predefined tags, regions, and languages assigned to data identifiers. They are displayed in light-blue boxes below an identifier. They appear in search results, and when you are browsing by category, all the tags associated with the different data identifiers in a category are displayed collectively. You can use predefined tags as search terms as well. For example, you could perform a Quick Search on the “addresses” tag, the “Canada” region, or the “French” language. 2024 © Netskope. All Rights Reserved. 22 Netskope Security Cloud Operation and Administration DLP custom data identifiers 23 • If you can’t find the identifier you need, construct your own custom identifier. • Supports Regex and keywords. • Also supports predefined identifiers by enclosing identifier name in: {{ }} • Multiple custom identifiers can be added to a DLP rule. 2024 © Netskope. All Rights Reserved. Policies > Profiles > DLP > Edit Rules > Data Loss Prevention > New Rule If you are not able to find a predefined identifier that meets your needs, you can define your own. Custom identifiers can include Regex and keywords. You can also include predefined identifiers by enclosing their names in double curly brackets. To add a custom identifier to a DLP rule, select Case Sensitive or Case Insensitive from the first drop-down list, then enter a regular expression, a keyword, or a predefined identifier in the first text field. Next, click the “+” button to the right of the text field to add the item to the rule. Repeat this process to add more custom identifiers to the rule. 2024 © Netskope. All Rights Reserved. 23 Netskope Security Cloud Operation and Administration DLP dictionary-based identifiers 24 Dictionary files can be used as identifiers. • Dictionaries can be manually imported or automatically created. • Ideal for long lists of keywords or regular expressions. • Multiple dictionaries can be selected in a single DLP rule. 2024 © Netskope. All Rights Reserved. Policies > Profiles > DLP > Edit Rules > Data Loss Prevention > New Rule In addition to the DLP data identifiers that we have already discussed, you can also use dictionary files as identifiers. A dictionary file is a CSV file that can contain either keywords and phrases, or regular expressions. You can manually create a dictionary file by adding one keyword or phrase per line in a keyword dictionary, or one regular expression per line in a regular expression dictionary, with a limit of 25 regular expressions. Dictionaries can also be automatically created when you perform Exact Data Matching. You can select both manually imported and automatically created dictionaries on the “Custom” page of the DLP rule wizard by clicking the Saved Identifiers tab. There are two formats for dictionaries—standard and weighted. We will discuss weighted dictionaries in more detail on the next slide. Note that you can select multiple dictionaries in a DLP rule. Selected dictionaries appear in the “Dictionary Identifiers” list in the right pane of the DLP rule wizard, indicated by a “D” and followed by a number, such as D0, D1, and so on. 2024 © Netskope. All Rights Reserved. 24 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 25 Weighted dictionaries (1 of 2) Weighted dictionaries are only supported with keywords and phrases. The default weight for a dictionary entry is 1, but you can assign a custom weight of -100 to +100. The weight value you assign to a dictionary entry goes into calculating the violation score. When Netskope DLP scans files and detects a keyword or phrase that matches an entry in a weighted dictionary, it adds that entry’s weight value to a running tally. When the scan is complete, Netskope DLP uses the final weight total to determine an aggregated violation score, and if the score meets or exceeds a severity threshold defined in a DLP rule, and the rule has been configured to take a policy action at that severity threshold level, then the prescribed action is taken. You can upload dictionaries by navigating to Policies in your Netskope tenant, then going to Profiles and DLP and clicking the Dictionary tab. Click New Dictionary to open a dialog where you can upload a dictionary file. As stated earlier, the dictionary file must be in the comma-separated values format. Additionally, the file must be no larger than 1 MB. The screenshot on the right side of this slide shows the contents of a weighted dictionary containing key phrases related to heart disease. Note that there is one phrase per line, and the weight of each phrase is set by adding a comma after the phrase and then specifying the weight value. If you configure the severity threshold of a DLP rule to take a policy action at an aggregated violation score of 100, then a policy action would be taken if Netskope DLP detects matching phrases in the content it is scanning, and their weight values add up to 100 or more. 2024 © Netskope. All Rights Reserved. 25 Netskope Security Cloud Operation and Administration 26 • Improve accuracy with weighted dictionaries. • Improve true positives. Influence the rule to trigger when high confidence dictionary termsare found • Especially useful when porting dictionaries from Forcepoint or Symantec. 2024 © Netskope. All Rights Reserved. Weighted dictionaries (2 of 2) • John Smith had a heart attack when he saw the price. • John Smith has suffered an acute myocardial infarction. Dictionary Weight Myocardial infarction, 48 Heart attack – not found Higher Confidence Weighted dictionaries help to improve accuracy. The higher the weight value assigned to keywords and phrases, the higher the degree of relevancy or importance that Netskope DLP applies to those terms. This in turn helps to improve the rate of true positives and trigger DLP rules when there is a high level of confidence that detected keywords and phrases are important. The weighted dictionaries that are supported by Netskope use a standard format, so you can easily import dictionaries from other vendors that support this format, such as Forcepoint or Symantec. The example sentences at the bottom of this slide illustrate how weighted dictionaries can be helpful in detecting true positives. Patient medical records are protected by government regulations and privacy laws; however, some expressions can have both medical and figurative meanings. For example, in the sentence "John Smith had a heart attack when he saw the price", the term "heart attack" is being used in a figurative sense. However, Netskope DLP is not able to distinguish between an actual medical condition and a figurative description of John's reaction of dismay to the high price of an item. Consequently, this could result in a false positive. On the other hand, if a weighted dictionary is attached to a DLP rule, and the official medical term for a heart attack, namely "acute myocardial infarction", is assigned a weight of 48, and the term "heart attack" is either not included in the dictionary, or is included but is not assigned a custom weight value, then there is a much higher level of confidence that if Netskope DLP detects the phrase "heart attack", it will not result in a false positive. 2024 © Netskope. All Rights Reserved. 26 Netskope Security Cloud Operation and Administration 27 Options include: AND, OR, NOT, NEAR and () Matching the word “private” within a proximity of 100 characters to the word “confidential”: 2024 © Netskope. All Rights Reserved. Advanced matching options Now let’s take a moment to talk about advanced matching options in DLP rules. These options include proximity operators to check for data identifiers within a certain distance of each other. The available operators are AND, OR, NOT, and NEAR. You can also specify order of operations by enclosing terms in parenthesis characters. The NEAR operator is very similar to the AND operator, except the NEAR operator specifies a character range to ensure identifiers are close to each other. In the example on the slide, advanced options are being used to match instances of the custom identifier c0, which is the case-insensitive keyword “private”, that is within 100 characters of the custom identifier c1, which is the case-insensitive keyword “confidential”. There are a couple of details and tips related to advanced matching options you should be aware of. First, the proximity number is inclusive of all characters, beginning with the first character of the first data identifier and going to the last character of the last identifier. So in the case of our example, the words “private” and “confidential” must occur within 100 characters of each other, with the 7 characters of the word “private” and the 12 characters of the word “confidential” being included as part of that total of 100 characters. Second, take care when you are typing the names of the data identifiers in your proximity statements. A common mistake people make is to type the letter “O” instead of the number “0” when specifying a data identifier such as “c0”. 2024 © Netskope. All Rights Reserved. 27 Netskope Security Cloud Operation and Administration 28 Options: Metadata, Content, or Metadata & Content Metadata is data about data. 2024 © Netskope. All Rights Reserved. Content to be scanned The next step in the DLP rule wizard is to specify the area of files to scan. By default, Netskope scans both metadata and content. If needed, you can choose to only scan metadata or only scan content. Metadata is not the actual contents of the file; rather, it's data about the file, such as who created the file, when the file was created or last modified, and so on. 2024 © Netskope. All Rights Reserved. 28 Netskope Security Cloud Operation and Administration 292024 © Netskope. All Rights Reserved. Microsoft Word document metadata Let’s look at a Microsoft Word document as an example of file metadata. You can view this information by opening the document in Microsoft Word, navigating to File, and then selecting Info. Click Show All Properties to view information such as Last Modified, Created, and Last Printed dates, as well as other metadata such as title, custom tags, status, categories, authors, and so on. 2024 © Netskope. All Rights Reserved. 29 Netskope Security Cloud Operation and Administration 30 If the DLP rule is intended for scanning files that contain rows or records (such as spreadsheets), select the Record Based Scan option to scan for data identifiers by records or rows. 2024 © Netskope. All Rights Reserved. Record-based scan Also on the Content page of the DLP rule wizard, you have the option to specify whether you want the DLP scan to be record-based. You should select this option if you intend the rule to be used for scanning files that contain rows and columns, such as spreadsheets or CSV files. By specifying a record-based scan, you are telling Netskope DLP to look for data identifiers within individual records instead of whole files. In other words, you are specifying that identifiers such as first name, last name, credit card number, and so on, must come from a single row in the spreadsheet or CSV file. For example, Anne's first name, Joe's last name, and Mary's credit card number might all appear in the same spreadsheet file, but they all come from different rows or records within that file. When you select Record Based Scan, the DLP rule will only match if all the data identifiers are detected in the same record. 2024 © Netskope. All Rights Reserved. 30 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 31 Example DLP rules Look for the word private near confidential Custom Identifiers • (C0) - Case Insensitive: private • (C1) - Case Sensitive: confidential Expression • C1 NEAR C0 • Proximity Check: 100 characters Scan Section • Metadata & Content • Record Scanning Off Severity Threshold • Low Severity: 1 • Medium Severity: 25 • High Severity: 100 • Critical Severity: 1000 • Trigger action at Low Custom Identifiers • (C0) - Case Insensitive: private • (C1) - Case Sensitive: confidential Expression • C1 NEAR C0 • Proximity Check: 100 characters Scan Section • Metadata & Content • Record Scanning Off Severity Threshold • Low Severity: 1 • Medium Severity: 25 • High Severity: 100 • Critical Severity: 1000 • Trigger action at Low Any Credit Card Predefined Identifiers (P0) - number/any/cc Expression P0 Scan Section Record Scanning Off Severity Threshold • Low Severity: 1 • Medium Severity: 25 • High Severity: 100 • Critical Severity: 1000 • Trigger action at Low Predefined Identifiers (P0) - number/any/cc Expression P0 Scan Section Record Scanning Off Severity Threshold • Low Severity: 1 • Medium Severity: 25 • High Severity: 100 • Critical Severity: 1000 • Trigger action at Low This slide shows two different examples of DLP rules. The rule on the left is looking for the case-insensitive custom identifier C0, which is the keyword "private", near the case-sensitive custom identifier C1, which is the keyword "confidential", all within 100 charactersof each other. It is scanning both metadata and content, and the “Record Based Scanning” option is not enabled. It also establishes the severity threshold, with Low severity set at 1 match, Medium at 25 matches, and so on, with the policy action being triggered at the Low severity level. The rule on the right is looking for any credit card number, as indicated by the predefined identifier P0. Since there is only one data identifier referenced in the rule, no proximity operations are needed. Once again, the “Record Based Scanning” option has been left off, and the various severity thresholds have been set, with the policy action triggered at the Low severity level. 2024 © Netskope. All Rights Reserved. 31 Netskope Security Cloud Operation and Administration Fingerprinting and Exact Match 32 Benefits: • Full coverage – Apply policies for data in motion or data at rest • Improved accuracy – Reliably detect sensitive data extracted from original files • Easy policy enforcement – No policy tuning needed; the original content translates the policy 2024 © Netskope. All Rights Reserved. Identify sensitive data in CSV files Generate an Exact Match hash Fingerprinting Exact Match Identify sensitive data in unstructured files Fingerprint the assets Apply document fingerprinting Apply binary fingerprinting (MD5, SHA-256 hash) Validate DLP rule with Exact Match Use auto dictionaries in DLP rule Next, let's discuss two advanced DLP options: fingerprinting and Exact Match. Fingerprinting is used on unstructured documents, such as Microsoft Word documents, PDF files, source code, and essentially any file that does not have the structure of a spreadsheet, CSV, or database file. To begin the fingerprinting process, upload an unstructured file to the Netskope tenant. An MD5 or SHA-256 hash of the file is then generated so that if the original document is ever manipulated or modified, Netskope DLP can detect the mismatch between the hashes of the original file and the modified file and subsequently trigger a DLP policy action. More importantly, the fingerprinting process captures a digital DNA of the original document so that when Netskope DLP classifies the original document as sensitive, it can trace modified versions of that file back to its source, provided that the changed file does not deviate more than 30% from the original file. Exact Match works in a similar way to fingerprinting but is used on structured data in CSV files. Each column of data in the CSV file must have a header that identifies the type of information contained in that column, such as first name, last name, credit card number, and so forth. You upload the CSV file to the Netskope tenant, and individual hashes are calculated for each row or record in the file. Additionally, you can choose to automatically create dictionaries for each of the columns in the file. The names of these dictionaries are derived from the column headers. For example, if the CSV file contains four columns with the headers "First Name", "Last Name", "Phone Number", and "Credit Card Number", four Exact Match dictionaries will be created, and they will be named after these headers. The dictionaries will also include hashes for the data contained in each field of their respective column. When you enable Exact Match for a DLP rule, Netskope DLP will inspect structured data leaving your organization and compare it to the hashes in the Exact Match dictionaries that have been generated. If a match is found, then a policy action will be triggered. Fingerprinting and Exact Match can protect structured sensitive data whether that data is being sent out of your organization in real time or is sitting at rest in cloud storage. Their precise methods of analyzing and profiling original source content ensure that Netskope DLP can accurately detect sensitive data that has been extracted from original sources. Additionally, fingerprinting and Exact Match make it easy to enforce DLP policies because the content from the original files serves as the basis for determining whether the data is sensitive and needs to be protected. 2024 © Netskope. All Rights Reserved. 32 Netskope Security Cloud Operation and Administration Exact Match 33 • HR database file holding sensitive PII information • Includes header row: id, gender, birthdate, maiden_name, etc. • Map DLP identifier to column • Identifier P0 – Column 1 2024 © Netskope. All Rights Reserved. There are three ways to populate the Exact Match database: 1. Upload a data set to your Netskope tenant. 2. Upload a data set to your on-premises Virtual Appliance. 3. Create salted SHA-256 hashes locally, then upload them to the Netskope cloud using an on-premises Virtual Appliance. Here is a more detailed example illustrating how Exact Match works. Suppose you have a text file named HRdatabase.txt that consists of comma-separated values. The first line or row of the file contains headers labeled “id”, “gender”, “birth date”, and so on. Following the header row are rows of comma-separated data corresponding to their respective headers. This file has been uploaded to the Netskope tenant, so a set of automatically generated dictionaries will be available for selection when creating a DLP rule. On the Exact Match page of the DLP rule wizard, you need to select the Enable Exact Match option. This enables you to select the HR database text file from a drop-down list and then map column headers to data identifiers. In the example on the slide, the “address” column is mapped to the P0 predefined identifier for US postal addresses, and the “postal” column is mapped to the P1 identifier for US postal codes (or ZIP codes). Exact Match also offers a feature called “column groups” which makes it possible to create a hash for combinations of columns from the uploaded file. For example, you could create a column group for street address, city, and state, and Exact Match will create a single hash for that combination of data for each row in the file, rather than creating a separate hash for each field on its own. That way, if Netskope DLP detects this specific combination of data during a scan, the rule will trigger a match. There are three ways to populate your Exact Match database. First, you can upload .csv or .txt files through the Netskope tenant UI. You can also upload files to your on-premises Netskope virtual appliance and let the appliance generate the hashes. Finally, you can create salted SHA-256 hashes locally and then upload these hashes to your on-premises Netskope virtual appliance. 2024 © Netskope. All Rights Reserved. 33 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 34 On-premises Exact Match 1. Copy file to Netskope Virtual Appliance. 2. Run DLP command to perform one-way non-reversible hash. (Process can be automated by running cron job.) 3. Virtual Appliance uploads hash to Netskope Security Cloud. On-premises file SHA-256 hash SSNFirst and Last Name 489-36-8350Robert Aragon 514-14-8905Ashley Borden 690-05-5315Thomas Conley 421-37-1396Susan Davis 458-02-6124Christopher Diaz 612-20-6832Rick Edwards 300-62-3266Victor Faulkner 660-03-8360Lisa Garrison 213-46-8915Marjorie Green 449-48-3135Mark Hall 1 2 3 Virtual Appliance SSNName 05BABBDA7A3366925050…02B700E235DACDB74600… 939048D97156D4C7D3CC…6B1A5575A73BA0BB7CF1… 253E339B935E58B65268…67168312B82306CF736B… 412283B6EFA9EDE5978D…6E9CB2BE752C314E43EB… E0DE3F5C12E3277BCF36…48CEDF91E38E304C4A3B… 4E7B19A806EF5A6F2C77…5FD1479A40CA12EB5222… C5F39976E5E9A15AFADC…275FA04F5566319822A4… AE796A50B32E19EF7B63…062EC26E878ED2F0135F… C69F6F1E4408A23ADC6F…98D2844AB8364A7FC28C… 6956720692FFEEAABCB9…3D0557B00D09022D3DD4… Netskope Security Cloud Due to security concerns, some organizations might not want to directly upload sensitive files to their Netskope tenant when creating Exact Match rules. Even though files uploaded using thethrough enterprise-wide predictive insights, SD-WAN access anomaly detection, and application performance flow analytics. • SkopeAI device intelligence provides Machine-Learning-based identification and categorization of newly connected devices, delivering unprecedented device visibility, access control, and Internet-of-Things security. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 5 Rich policy context of CASB+SWG+DLP User, Group, OU Pat from Accounting is using managed laptop to upload files to personal Box instance: DLP check; coach if PCI, PII, etc. Pat from Accounting is using managed laptop to upload files to company Box instance: Check for malware/threats Pat from Accounting is using personal mobile device to download files from company Box instance: View only mode Pat from Accounting is using managed laptop to browse gambling sites on web: Block site, coach user with AUP alert Device Managed Personal Accounting Pat Smith Cloud Storage App Managed Unmanaged App Personal Instance Company File Sharing 100+ Categories URL Category Upload File (up, down, share, view) Activity AV/ML IOCs Scripts Macros Sandbox Threat DLP Profiles And Rules Content Policy Action Allow Block Coach Encrypt Legal Hold Quarantine etc. CLOUD XD Risk Security Privacy Legal/Audit GDPR etc. CCI Rating 65K+ Apps 97 The Netskope Security Cloud uses a unified policy engine, which means that you can combine the coverage and protection of multiple Netskope security products like CASB, SWG, and DLP in a single policy. Another major advantage of this approach is the rich context that can be woven into policies around a user's environment and activities. Policies can include the following types of contextual information: • Users and the groups and organizational units they belong to • Types of devices, and whether they are managed or unmanaged • Managed and unmanaged cloud applications • Cloud app instance ownership, such as company or private instances • Risk ratings of cloud apps as identified by Netskope's Cloud Confidence Index • Categories of the websites and URLs that users visit • Activities such as uploading, downloading, and sharing files • Threats posed by files infected with malware, and anomalous behavior that might indicate an organization's security has been compromised • File content such as sensitive and confidential information that can be detected by DLP profiles and rules • Actions that a policy can perform based on a given set of circumstances, such as allowing or blocking traffic, coaching users about acceptable behavior, and so on Now let's consider some practical examples of the rich policy context that Netskope can provide by uniting CASB, SWG, and DLP. Suppose a user named Pat, who belongs to the Accounting department, is uploading files from her company-owned and managed laptop to her private instance of Box. You can configure a policy to run a DLP scan on the files Pat is trying to upload. If customer credit card data or personally-identifiable information is detected, the upload actions can be blocked, or a user notification can be displayed, reminding Pat that transferring confidential company information to personal storage is a violation of corporate policy. On the other hand, if Pat is using her company laptop to upload files to a corporate Box instance, you can configure a policy to allow the upload actions in this case, provided that a threat scan is able to determine that the files are not infected with malware. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration Next, suppose Pat is trying to download sensitive files from a corporate instance of Box onto her personal mobile device that is not secured or protected by her company. You can configure a policy that only allows Pat to view the contents of the files on her mobile device, but not actually download the files. Finally, suppose that Pat is on her corporate laptop again, and she is trying to browse gambling websites. You can define a policy to block websites that fall under the "Gambling" category, and also display an alert to inform Pat, that using corporate devices to visit gambling or gaming websites is a violation of corporate acceptable-use policy. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 6 Netskope CASB API API Connector LOG Offline ‣ Cloud app discovery ‣ App risk ‣ Basic activity visibility ‣ eDiscovery of DLP violations & Malicious Threats ‣ Data governance ‣ Policy control for at-rest content Now let’s take a look at the products included in the Netskope Security Cloud. First, we’ll discuss Netskope Cloud Access Security Broker, or CASB. In most cases, a top priority of organizations that are moving their business to the cloud is to gather information about their internet traffic. They need to understand what their user base is doing, which cloud applications they are using and how they are using these applications. When this information has been acquired, the organization can determine the controls they need to put in place to reduce risk and limit exposure to threats and data loss going forward. Netskope CASB uses a couple of offline or out-of-band methods to gather information about the cloud apps being used in an organization. The first of these methods is log ingestion. This involves importing log files from on- premises proxy servers and firewalls into the Netskope platform. These logs provide visibility into the cloud apps users are accessing, how much data they’re transferring into and out of the apps, and so forth. The information gathered from logs can be used to check Netskope’s Cloud Confidence Index, or CCI, and identify the level of risk the discovered apps pose to your organization. However, you can not take any direct actions at this point; you have only gained visibility into cloud app usage. This is where the second offline method comes in. Netskope CASB uses API connectors to interact with files stored in managed cloud applications, or in other words, cloud applications for which an organization has full administrative access. This enables Netskope to hook into the cloud application’s API and perform such operations as scanning files for DLP and regulatory compliance violations and malware infections, and then applying policy controls such as placing files in quarantine, encrypting files, or changing file-sharing permissions. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration Thin Agent / Mobile Profile 2024 © Netskope. All Rights Reserved. 7 Cloud Inline Forward Proxy Inline Explicit Proxy / PAC file GRE/IPSec Proxy Chaining ‣ Real-time policy control for all cloud apps ‣ Native, browser and mobile app coverage ‣ Mobile and remote coverage for all cloud apps ‣ DLP & Threat Protection traffic steering options Thin Agent Reverse Proxy Real-time policy control for browser based managed cloud apps only In addition to CASB API, the Netskope Security Cloud Platform includes Cloud Inline, which, as its name implies, provides inline or real-time protection. Inline protection enables you to apply policy actions in real time as users are accessing cloud apps and trying to upload and download files. With Cloud Inline, users’ cloud app traffic is steered to the Netskope Security Cloud, which then examines any files the users are trying to upload or download and applies policy actions, such as blocking files that contain sensitive information or malware. The most common method of deploying inline protection is using the Netskope thin agent or client. The Netskope client is installed on users’ computers and steers their internet traffic based on policies and Netskope tenant settings. For example, theNetskope tenant UI go out over port 443, this might not be adequate for some organizations. This is a use case for the on-premises Netskope Virtual Appliance. If you are using the on-premises method to create hashes for Exact Match, there is a recommended process for uploading files to a Netskope Virtual Appliance. First, copy the sensitive file you want to match against to the appropriate folder on the virtual appliance. Second, run the DLP command that creates one-way, non-reversible SHA-256 hashes of the file's data. Note that you can automate this step with a cron job. When the appliance has completed creating the hashes, it will automatically upload the results to the Netskope Security Cloud. The original file is then permanently removed from the appliance. You can find detailed instructions that include the commands for uploading files to the appliance and performing the hash operation by browsing to docs.netskope.com and searching for the article entitled “Create a DLP Exact Match Hash from a Virtual Appliance.” 2024 © Netskope. All Rights Reserved. 34 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 35 Proximity (NEAR Operator) • To fine-tune DLP rules, add Boolean and proximity operators to the expressions used to find sensitive data. • The NEAR operator implies AND. • Proximity is measured from the first character of the first data identifier to the last character of the last data identifier (including spaces and punctuation). • The entire data match must fall within the defined proximity. (P0) – Postal Addresses (US) (P1) – Postal Addresses (US; Postal Codes) (P2) – Address / ZIP code / US (D0) – Bankname P0 OR P1 OR P2 NEAR D0 Proximity Check: 50 characters As mentioned earlier, you can use Boolean and proximity operators to fine-tune your DLP rules and improve detection results. The proximity operator NEAR is particularly useful for this purpose. The NEAR operator performs the same basic function as the AND operator, with the added benefit of letting you define a character range within which two or more terms must appear in a file. It is important to note that proximity measurements begin at the first character of the first data identifier referenced in the statement, and end at the last character of the last data identifier. Empty spaces and punctuation are included in the total character count. In the illustration on the slide, the colored rectangles each mark off 10 characters in two rows of data in a text file that consists of comma-separated values. The proximity statement shown above the illustration is telling Netskope DLP to look for US postal addresses, signified by the predefined identifier P0, or US postal codes, signified by P1, or a combination of US addresses and ZIP codes, signified by P2, near bank names, signified by the dictionary identifier D0. All of these items must occur within 50 characters of each other in the file. In the first row, the bank name “Bank of America” extends the character count to more than 50 characters, so the DLP rule will not match. In the second row, the entire address, ZIP code, and bank name fall within the prescribed total of 50 characters, starting with the “2” of the building number and ending with the “p” in “Citigroup”, with spaces and punctuation characters included. Consequently, the DLP rule matches in this case. A tip to keep in mind when using proximity statements, is to make sure to specify character ranges that are logical and relevant. For example, you do not want Netskope DLP to find the first data identifier on page 1 of a document and then look for the next identifier as far away as page 10. Being so far apart, there’s probably no correlation between the two identifiers. On the other hand, you want the character range to be wide enough to encompass all reasonable and relevant combinations of data. For instance, if the proximity value in the NEAR statement in the example on the slide would have been set to 60, the DLP rule would have matched with both rows of data because “Bank of America” would have fallen within that range. Similarly, if the state abbreviation “CA” had been fully spelled out as “California,” the 50-character proximity value would have prevented both rows of data from matching. 2024 © Netskope. All Rights Reserved. 35 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 36 DLP Severity Threshold Specify threshold values for each severity level. 1. Select Record or Aggregate Score. 2. Optional: Select Count only unique records. 3. Enter number of matching records or a violation score for each severity level or accept default settings. 4. Specify the severity level at which the policy action should be taken. An alert is sent when a severity level is reached for a file. Policies > Profiles > DLP > Edit Rules > Data Loss Prevention > New Rule On the Severity Threshold page of the DLP Rule wizard, you can specify the number of matches that must be detected in a file to qualify for one of the four severity levels—Low, Medium, High, or Critical. First, specify how you want the threshold to be set, either by record or by aggregated score. The Record option increments the matching record count each time an instance of sensitive data is detected in a file. So if you have the “Low” severity level set to 5 records or more, then at least 5 occurrences of sensitive data must be detected in a file in order for the incident to be classified as low severity. The Aggregated Score option is used in conjunction with weighted dictionaries. When Netskope DLP is scanning a file, each time it detects a keyword or phrase that is referenced in a weighted dictionary, it adds the numerical weight you have assigned to that entry to a running tally. After the scan is complete, the sum of all the weighted values becomes the final violation score. So if you have the “Low” severity level set to 100 points or more, then Netskope DLP must detect weighted keywords or phrases within a file that add up to at least 100 points in order for the incident to be classified as low severity. DLP rules that are configured to look for numerical data, such as credit card, driver license, or Social Security numbers, typically use a record threshold, while rules meant to detect only textual data should use an aggregated score threshold. By default, when Netskope DLP scans a file, each time it encounters a piece of sensitive data it increments the record count, even if that data repeats itself. If you want to count only unique occurrences of a specific piece of data, select the option Count only unique record. To provide a practical example, suppose you have a DLP rule that is set to take a policy action if 10 unique credit card numbers are detected in a file. If a file contains 7 instances of the same credit card number and only 3 other instances of unique credit card numbers, a policy action will be taken by default, because the 7 identical credit card numbers and the 3 unique numbers add up to 10 occurrences. To avoid this situation, you would select the Count only unique record option. This would count the 7 identical credit card numbers as 1 occurrence, which added to the 3 unique numbers would total 4 occurrences of unique credit card numbers. As a result, no policy action would be taken in this case. After you have set the threshold values for the 4 severity levels, make sure to specify the severity level at which you want the policy action to be taken. 2024 © Netskope. All Rights Reserved. 36 Netskope Security Cloud Operation and Administration 37 • Requires Advanced DLP license. • Available for both Real-time Protection and API Data Protection policies. • Max file size is 4 MB by default. • OCR supports these file types: png, pjpeg, jpeg, gif, bmp, jp2, tiff, x-ms-bmp • Supported images embedded in PDF, MS Office, and archives are extracted and scanned. •There is no “OCR Policy.” OCR scanning is a passive function. 2024 © Netskope. All Rights Reserved. Optical Character Recognition (OCR) Optical Character Recognition, or OCR, requires an Advanced DLP license and is available for both Real-time Protection and API Data Protection policies. Currently, there is a 4-megabyte size limit on files that OCR can process. OCR supports scanning the image file types shown on the slide. Additionally, OCR is able to extract and scan supported images that are embedded in PDF and Microsoft Office files. It can also extract and inspect images stored in archives such as zip files up to 8 folder levels deep. It is important to note that there is no specific OCR policy to configure because OCR scanning is a passive function. The diagram on the right of the slide depicts the OCR process. Traffic from both the Netskope proxy and API connectors arrives at the first level of Netskope servers, which notice that the policy encompasses DLP. So they offload the files to a bank of DLP servers, where clear text is extracted and DLP rules are applied. If any image files are detected, they are offloaded to a bank of OCR servers which inspect the image files and extract any clear text that they can. This text is then fed back into the DLP engine, which scans the content and takes a policy action if any violations are detected. 2024 © Netskope. All Rights Reserved. 37 Netskope Security Cloud Operation and Administration 38 • Recommended: Use the built-in regulatory profiles vs. using custom DLP profiles when possible. • DLP helps manage risk, not eliminate it. • False positives and false negatives are a fact of life with DLP (the goal is to minimize them). • Identify your high value assets (what matters most). • Build well defined DLP rules. – Constraint search using AND increases false negatives. – Inclusive search using OR increases false positives. – Include context when building your rules! – Leverage fingerprinting and Exact Match. – Adjust the threshold levels to match business process. 2024 © Netskope. All Rights Reserved. Avoiding DLP misclassification Netskope has several recommendations and guidelines to help avoid DLP misclassifications. • We recommend that you use the built-in regulatory profiles, such as GDPR and PCI-DSS, rather than creating your own custom profiles. The built-in profiles include everything that is needed to meet statutes and regulations. • Understand that DLP helps manage risk, but it cannot completely eliminate it. DLP is not a silver bullet. • Remember that false positives and false negatives are a fact of life with DLP. Take a constructive approach of tuning your policies over time until you're seeing more accurate results. • Identify your high-value assets first. Identify the files and folders that are the most important and sensitive and that could have a significant impact on your organization if they are ever exposed. Once you have secured these assets, you can extend DLP policies to less sensitive documents over time. • Build well-defined DLP rules. – Using AND statements in your DLP rules tends to increase false negatives. The reason for this is that all parts of the statement must be true before the rule will trigger a match. – Similarly, using OR statements tends to increase false positives, because if any parts of the statement are true, then the rule will trigger a match. – When building DLP rules, make sure to include as much context as possible. Looking for identifiers like driver license number and credit card number within a reasonable proximity of associated identifiers such as phone number and address will improve the relevancy of your rules. – Leverage fingerprinting and Exact Match whenever possible. – Also, tweak severity threshold levels to match your business processes. For example, suppose you're creating DLP rules for a large hospital, and you know that the Accounts Receivable administrator is allowed to pull up one Social Security number and up to two credit card numbers for an individual patient, because for large bills, the charge might need to be spread out across two separate credit cards. As long as the employee doesn't try to pull up more information than they are allowed to, you do not want to see a DLP alert, because things are going according to standard business process. However, if the employee suddenly tries to pull several Social Security numbers and credit card numbers in a very short timeframe, you do want to see DLP alerts, because this behavior falls outside of standard business process and needs to be investigated. 2024 © Netskope. All Rights Reserved. 38 Netskope Security Cloud Operation and Administration Policies 39 • Overview of Netskope Policies • DLP Rules/Classifications • Profiles • Actions • Quarantine 2024 © Netskope. All Rights Reserved. Next, let’s discuss policy profiles. 2024 © Netskope. All Rights Reserved. 39 Netskope Security Cloud Operation and Administration 40 • A profile is essentially a container for efficiently grouping related rules. • The rules in the profile must be of the same type. Example: DLP profiles can only contain DLP rules and Fingerprint Classification rules. • Profiles are located at Policies > Profiles. 2024 © Netskope. All Rights Reserved. Overview of profiles Profiles are essentially containers that enable you to efficiently group related rules. In the screenshot on the slide, you can see that the predefined DLP profile “Payment Card Industry Data Security Standard” contains 8 DLP rules designed to detect credit card information to meet regulatory requirements for Payment Card Industry Data Security. Note that the rules and other policy objects in a profile must all be of the same type. For example, DLP profiles can only contain DLP rules, classifiers, and fingerprint rules. To access profiles in the Netskope tenant, go to Policies, and then under Profiles, click a profile type. 2024 © Netskope. All Rights Reserved. 40 Netskope Security Cloud Operation and Administration 412024 © Netskope. All Rights Reserved. Example of creating a custom profile: DLP Policies > Profiles > DLP > New Profile Netskope recommends using predefined profiles as much as possible. However, you can also create custom profiles, if needed. For example, to create a custom DLP profile in the Netskope tenant, click Policies. Under the “Profiles” heading, click DLP, then click New Profile. The DLP Profile wizard guides you through the process of selecting file profiles, DLP rules, classifiers, and fingerprint rules that were created previously, and then specifying a name for the profile. 2024 © Netskope. All Rights Reserved. 41 Netskope Security Cloud Operation and Administration 42 Constraint profiles allow you to select Matches or Does not match for specific details. Example: Does not match Business Box users *@netskope.com 2024 © Netskope. All Rights Reserved. Constraint profile: User In addition to DLP profiles, you can create a variety of other types of profiles, such as constraints. Constraint profiles let you determine whether a specific detail matches or does not match against data that is being inspected. The screenshot on the slide shows a user constraint profile for Business Box users that uses the Does not match option to check for usernames specified in the form of an email address. In this case, the user constraint includes an asterisk wildcard before the @netskope.com domain to indicate that if someone is trying to sign in to Business Box with a username that does not end in “netskope.com”, they will be blocked. 2024 © Netskope. All Rights Reserved. 42 Netskope Security Cloud Operation and Administration 43 The same concept relates to AWS S3 buckets in specific regions. 2024 © Netskope. All Rights Reserved. Constraint profile: Storage The storage constraint profile lets you specify constraints for cloud storage, such as S3 buckets in the AmazonWeb Services infrastructure. These storage buckets can exist in different geographical regions, so when you're setting up a storage constraint, you can choose to match or not match against specific accounts, buckets, and regions. 2024 © Netskope. All Rights Reserved. 43 Netskope Security Cloud Operation and Administration Adding an application instance 44 Application instances can be added at Skope IT > Application Events and used in Real-time Protection policies. 2024 © Netskope. All Rights Reserved. Click the magnifier icon next to an Application Event to view details. Click New App Instance to add the app instance name. Netskope is capable of understanding application instance for many types of applications. However, sometimes the instance name isn’t automatically detected. Since names are required for referencing app instances in Real- time Protection policies, Netskope has provided a way to add missing names from the Skope IT Application Events page. Locate an event for the application you want to reference in a policy, then click the magnifying glass icon to the far left of the event. This opens the event details. In the example on the slide, the details for a Box event show that the Instance Name field is empty. To specify a name for the instance, click the New App Instance link. 2024 © Netskope. All Rights Reserved. 44 Netskope Security Cloud Operation and Administration Using application instances in Real-time Protection policies 45 Specify an App Instance name: 2024 © Netskope. All Rights Reserved. In the Real-time Protection Policy, set Destination as AppInstance and select the App Instance you created. In the “Create Application Instance” dialog, specify a name for the app instance and click Save. You can then choose App Instance as the destination in a Real-time Protection policy and select the specific app instance by name. 2024 © Netskope. All Rights Reserved. 45 Netskope Security Cloud Operation and Administration Policies 46 • Overview of Netskope Policies • DLP Rules/Classifications • Profiles • Actions • Quarantine 2024 © Netskope. All Rights Reserved. Next, let’s talk about policy actions. 2024 © Netskope. All Rights Reserved. 46 Netskope Security Cloud Operation and Administration 47 • Real-time Protection actions – Depend on policy type and settings – Are things that can be done to inline traffic (e.g., User Alert, Block) 2024 © Netskope. All Rights Reserved. Policy actions • API Data Protection actions – Differ per cloud application – Are things that can be done to data at rest (i.e., User Alert, Block not supported) The list of actions available when building policies varies depending on the context you’re working in. For example, with Real-time Protection policies, different actions are available depending on policy type and settings. The screenshot in the upper-right of the slide shows the list of actions you might see if you are creating a Real-time Protection policy of the Web Access type, with specific categories selected (such as Gambling, for example), and with no activities or profiles selected. Simply adding another category to the policy can change the list of available actions. For example, adding the category Business Process Management after the Gambling category removes the User Alert option from the list of available actions because this particular action is not supported for the Business Process Management category. With API Data Protection policies, the list of available actions varies depending on the cloud application and which API operations it supports. None of the real-time actions are available in API Data Protection policies, such as displaying a popup notification on the user’s endpoint device or blocking users from downloading or uploading files. The only supported actions are those that can be performed after the fact, using a cloud app’s APIs to inspect data at rest. The screenshot in the lower-right of the slide shows the list of available actions for Google Drive, which supports such API operations as Change Ownership, Encrypt, Legal Hold, and more. ******************** Further information For more information about supported API Data Protection policy actions, refer to the following: https://docs.netskope.com/en/api-data-protection-policy-actions-per-cloud-app.html 2024 © Netskope. All Rights Reserved. 47 Netskope Security Cloud Operation and Administration Custom notifications 48 You can customize: • Logo • Title • Subtitle • Message • Footer • Justification • Action 2024 © Netskope. All Rights Reserved. Policies > Templates > User Notification Another feature of policies is the ability to specify custom block pages and user alert or coaching messages, otherwise known as user notification templates. For example, you can insert a custom logo, a title and subtitle, a message, a footer, justification settings, and an option for the user to take an action. Fields and settings that have a red asterisk next to them are mandatory. 2024 © Netskope. All Rights Reserved. 48 Netskope Security Cloud Operation and Administration Notification variables 49 • Application name • Category name • URL accessed by user • Domain accessed by user • Activity performed • Triggered policy name • User Email / File Owner • Application Instance • File name 2024 © Netskope. All Rights Reserved. User notification templates also allow you to use variables to extract details from event logs and insert this information into user alert messages. In the screenshot on the slide, you can see that the Subtitle and Message fields have an “Insert Variable” option. Two variables have been inserted into the text in the Message field—the {{NS_FILENAME}} and {{NS_APP}} variables. These variables will insert the name of the file the user is trying to upload and the name of the cloud app that the user is trying to upload the file to. The available variables for user notifications are: • Application name • Category name • URL accessed by user • Domain accessed by user • Activity performed • Triggered policy name • User Email / File Owner • Application Instance • File name 2024 © Netskope. All Rights Reserved. 49 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 50 Putting it all together: Building a Netskope policy Custom RuleCustom Rule Custom Identifiers • (C0) - Case Insensitive: private • (C1) - Case Sensitive: confidential Expression • C1 NEAR C0 • Proximity Check: 100 characters Scan section • Metadata & Content • Record Scanning Off Severity Threshold • Low Severity: 1 • Medium Severity: 25 • High Severity: 100 • Critical Severity: 1000 • Take policy action at Low Severity Custom Identifiers • (C0) - Case Insensitive: private • (C1) - Case Sensitive: confidential Expression • C1 NEAR C0 • Proximity Check: 100 characters Scan section • Metadata & Content • Record Scanning Off Severity Threshold • Low Severity: 1 • Medium Severity: 25 • High Severity: 100 • Critical Severity: 1000 • Take policy action at Low Severity Real-time Protection PolicyReal-time Protection Policy User = jali@kkrlogistics.com Application = Microsoft Office 365 Outlook.com Activities = Post, Send DLP Profile = Custom profile Action = Block User = jali@kkrlogistics.com Application = Microsoft Office 365 Outlook.com Activities = Post, Send DLP Profile = Custom profile Action = Block Custom ProfileCustom Profile Custom ruleCustom rule Now let's look at an example of policy building that rolls together everything we've been talking about so far. The goal of this policy is to block a specific person from using the cloud version of Outlook to post or send content that contains a specific keyword. First, we'll create a custom DLP rule. This rule will check for two custom data identifiers. The first identifier, C0, is the case-insensitive keyword “private”. The second identifier,C1, is the case-sensitive keyword “confidential”. The rule will check to see whether these two identifiers appear within 100 characters of each other. Both metadata and content will be inspected to see if the keywords are present, and “Record Based Scan” will be turned off because we intend to use the rule to scan unstructured text files, not structured files such as spreadsheets or CSV files. We will set the Severity Threshold so that Low severity is 1 match, Medium is 25, High is 100, and Critical is 1000 matches. The policy action will be triggered at Low severity. We will then add the custom rule to a custom DLP profile. Finally, we will create a Real-time Protection policy for Cloud App Access, selecting a specific user as the source. We will select “Microsoft Office 365 Outlook.com” as the destination, with “Post” and “Send” as the activities. We will select our custom DLP profile that contains our custom DLP rule, and we will select “Block” as the policy action. We'll name the policy and save it, choosing to place the policy at the top of the stack because it is very specific, applying only to a very narrow set of criteria. 2024 © Netskope. All Rights Reserved. 50 Netskope Security Cloud Operation and Administration Policies 51 • Overview of Netskope Policies • DLP Rules/Classifications • Profiles • Actions • Quarantine 2024 © Netskope. All Rights Reserved. Finally, let’s take a few moments to discuss how to use quarantine capabilities in Netskope policies. 2024 © Netskope. All Rights Reserved. 51 Netskope Security Cloud Operation and Administration Quarantine: Use cases 522024 © Netskope. All Rights Reserved. Use case 1: Real-time Protection Some users have been trying to upload confidential files to unmanaged cloud storage apps. Company policy dictates that such actions must be blocked until the Risk Officer has examined the files, asked users for their justifications, and decided on a case-by-case basis whether to allow the uploads. Until this task is completed, the blocked files need to be stored in a secure location. Use case 2: API Data Protection An organization runs regular scans on data at rest in their managed cloud storage app. If PII data is detected, the affected files need to be moved to a safe location until the Risk Officer can investigate. To set the stage for a discussion about using quarantine capabilities in Netskope policies, here are a couple of use cases. The first use case applies to Real-time Protection. Suppose that an organization’s Corporate Security team has discovered that some of their users are trying to upload what appear to be confidential files to unmanaged cloud storage apps. Company policy dictates that such actions must be blocked until the Risk Officer has had a chance to examine the files, has contacted the users and asked them to provide justifications for their actions, and has decided on a case-by-case basis whether to allow or continue blocking the upload attempts. Until the Risk Officer is able to complete this task, the blocked files need to be stored in a secure location so they can be examined. The second use case applies to API Data Protection. In this case, suppose that an organization regularly scans files stored in their managed cloud storage app. If Personally Identifiable Information, or PII, is ever detected, the organization’s standard procedure is for the Risk Officer to review the affected files and determine if any further action needs to be taken. In the meantime, the files containing the sensitive information need to be moved to a safe location. These use cases illustrate the kinds of situations that the quarantine function is designed to address. 2024 © Netskope. All Rights Reserved. 52 Netskope Security Cloud Operation and Administration Quarantine Instances 53 • Quarantine Instances are special API-enabled Protection app instances. • Files on managed cloud apps that violate DLP policies can be moved into a Quarantine Instance. – When a file is quarantined, a “tombstone” file is created in its place. – A custodian must review quarantined files and decide whether to restore or block the files. 2024 © Netskope. All Rights Reserved. Netskope uses special API-enabled Protection app instances called Quarantine Instances to manage file quarantine operations. This special instance is created by selecting the Quarantine instance type when you are adding access for a managed SaaS app in the Netskope tenant. You can configure DLP policies to move files into a Quarantine Instance when sensitive data is detected. When a file is moved, a “tombstone” file is created in the place of the original file to serve as an indicator to the file’s owner that a quarantine operation has taken place. At that point, the original file will remain in the Quarantine Instance until an administrator has reviewed the file to determine if the quarantine operation was warranted, and to decide if the file should be restored to its original location or remain in its blocked state. 2024 © Netskope. All Rights Reserved. 53 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 54 Quarantine profiles Policies > Profiles > Quarantine > New Quarantine Profile File moved into quarantine folder After you have created a Quarantine Instance, you must create a Quarantine Profile. Creating this profile enables the Netskope tenant to create a Netskope Quarantine folder in the managed cloud app and lets you add quarantine actions to your policies. To create this profile, go to Policies in the Netskope tenant, and under Profiles, click Quarantine. Click New Quarantine Profile and give the profile a name. Next, select a managed cloud app and its Quarantine Instance. In the User Email field, provide the email address of a user who has administrative access to the managed cloud app. This level of access is required to create the quarantine folder, as well as to move files into the folder and back out again as needed. In the Notification Emails field, you can add the email addresses of individuals who you want to receive a notification when files are placed in quarantine. 2024 © Netskope. All Rights Reserved. 54 Netskope Security Cloud Operation and Administration Quarantine: Remediation 55 Access the Quarantined Files dashboard to: • Download quarantined files for investigation • Restore or block quarantined files • Contact file owners via email 2024 © Netskope. All Rights Reserved. Incidents > Quarantine The Quarantined Files dashboard in the Netskope tenant enables you to manage files in your Quarantine Instances. To access this dashboard, go to Incidents and then click Quarantine. To remediate a quarantined file, select a profile from the Quarantine Profile drop-down list. All the files that have been moved to the Quarantine Instance associated with the selected profile are then displayed. To review the contents of a file, select the file and click Download Files. You can also take an action on the file, such as Restore or Block, and you can contact the file's owner by email. 2024 © Netskope. All Rights Reserved. 55 Netskope Security Cloud Operation and Administration Lab A: Metadata DLP Policy Time: 35 minutes 562024 © Netskope. All Rights Reserved. This chapter includes a lab to practice some of the concepts you learned about. 2024 © Netskope. All Rights Reserved. 56 Netskope Security Cloud Operation and Administration Netskope Client (Managed Device) Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Welcome to the Netskope Client chapter, in our Netskope Security Cloud Operation and Administration Course. The Client is a simple non-intrusive application that steers traffic from the end-user’s device to the Netskope cloud. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2 Objectives • Explain how the Netskope Clientoperates on various platforms • Install the Netskope Client on various platforms • Configure the Netskope Client to steer various traffic 2024 © Netskope. All Rights Reserved. The objectives covered in this chapter explain how the Netskope Client operates and steers traffic on the various platforms the Netskope Client is supported on. We will also go through the installation options of the Netskope Client, and how to set up various steering configurations to steer traffic from the Client to the Netskope Cloud. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration Netskope Client 3 • Introduction • Desktop Client • Mobile App • Administration and Configuration • Deployment Options 2024 © Netskope. All Rights Reserved. Let’s look at an overview of the Netskope Client. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration Netskope Client - Introduction 42024 © Netskope. All Rights Reserved. • One of the many deployment options of the Netskope solution • Forward Proxy Steering Mechanism • Lightweight – Only steers the traffic to the Netskope tenant instance – No packet processing performed on the endpoint – Non-intrusive application that steers traffic from the user’s device to the Netskope cloud • Available for popular operating systems The Netskope Client is one of many deployment options of the Netskope solution. It is a forward proxy steering mechanism. It provides authentication through the Netskope Security Cloud Platform, or in other words, the data plane. With a forward proxy steering mechanism, traffic is steered from the Netskope Client to the Netskope Cloud or data plane. The proxy server generates trusted certificates for cloud app domains, serving them up to the requesting Clients to establish a trusted path. With the Netskope Client, we only steer traffic to the Netskope tenant and do not perform any packet inspection or policy processing on the endpoint. Let’s go over a forward proxy steering example as it relates to Netskope. A user that has the Netskope Client installed, browses to a website, for example, box.com. The Client steers this traffic, taking the connection with the destination IP address and destination name and runs it through a tunnel to the Netskope Cloud (dataplane). Netskope inspects the request and evaluates the policies set and if the policy permits, routes the request to the destination on the user’s behalf. The user’s computer doesn’t know that the request has been sent to Netskope and thinks that it is connecting directly to box.com. The Netskope Client connects to the Netskope Proxy which then connects to box.com. The source IP address will be a Netskope source IP address associated with that dataplane. You would normally connect to websites using HTTPs. (HTTPs = HTTP using TLS to encrypt normal HTTP requests and responses and digitally sign those requests and responses.) When you connect to a secure website, for example, www.box.com, the website sends back a server certificate. That server certificate is signed by a public certificate authority (CA). The public certificate authority is stored in your CA certificate store or database that is either built into your operating system or built into your application. Your web browser uses the CA authority certificate to authenticate content sent from web servers, verifying that the content you see is really coming from box.com. When the web request is sent to Netskope, the server certificate goes to the Netskope Proxy and Netskope issues a new server certificate that was not signed by the public CA. The original server certificate is accepted by the NS proxy and used to connect encrypted to box.com. The Netskope Proxy decrypts everything it gets from box.com and then if policies allow it, the Netskope Proxy re-encrypts the information with the new server certificate and sends it to your Client. This new server certificate is signed by a private certificate authority, namely the Netskope tenant. The Netskope’s CA certificate is one of the things that gets installed during a Netskope Client installation. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration Benefits of the Netskope Client 5 Deploying the Netskope Client enables you to: • Have visibility into all users on and off premises • Have visibility into all managed and unmanaged applications • Browser traffic and native application traffic supported 2024 © Netskope. All Rights Reserved. The Steering Configuration in the Netskope admin console defines the domains and apps to be steered to the Netskope cloud. This configuration is distributed to all the Clients and kept up-to-date on a regular basis. You can steer both browser and native application traffic, no matter if the user is on prem or off prem so you can have visibility and control of what users’ doing on their devices. ================================================ Native application = Examples of native applications are Box, OneDrive, and Salesforce. These applications are cloud-based applications, and the cloud-based application provider has created a cloud-based app that you can install outside of using it in a web browser. This is quite common on mobile devices, installing apps like Box, OneDrive, Salesforce, Okta, etc. from the Google Play store or the Apple App store. Native apps are also prevalent on desktop operating systems as well. There is a Google drive app you can install and the google drive shows up as a drive letter after the application installation. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration Netskope Client 6 • Introduction • Desktop Netskope Client • Mobile App • Administration and Configuration • Deployment Options 2024 © Netskope. All Rights Reserved. Let’s look at the components of the Desktop version of the Netskope Client. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 7 Netskope Client – Supported Hosts (1 of 2) Windows hosts • Windows 10 • Windows 11 • Windows Server 2016, 2019, 2022 Google hosts • Android OS 11 (Red Velvet Cake) 12 (Snow Cone) 13 (Tiramisu) • ChromeOS 84 and above • Android Runtime Version 9, 11 Linux hosts • Ubuntu 18.04 LTS desktop version • Ubuntu 20.04 LTS desktop version • Ubuntu 22.04 LTS desktop version • Linux Mint versions 19, 20, 21 (Cinnamon Edition) Multi-user Platforms • Windows Terminal Server 2016 2019 2022 • VDI Citrix Xen Desktop, XenApp 7.13 Azure Virtual Desktop Here are the lists of supported platforms that the Netskope Client can run on. Netskope supports a wide range of operating systems including Linux based hosts, Windows Terminal Server, and VDI systems like Citrix Xen Desktop and Azure Virtual Desktop. Netskope uses the standard Microsoft formatted installer file, or MSI package to install the Netskope Client on Windows platforms. No reboot is required for the installation and the Netskope Client runs on 7MB of RAM. The Netskope Client opens a TLS tunnel and uses services inside the operating system to redirect traffic to that tunnel. Running a TLS tunnel is easy with little RAM and processing power. No inspection is done locally – everything is sent to Netskope to inspect. ========================================================== Windows based hosts: • Netskope Private Access (NPA) is not supported for devices running Windows 10 and 11 on Snapdragon-based PC. • CASB/SWG is supported on Windows 11 with the Snapdragon chipset. • Netskope Private Access is not supported on any Windows device where multiple users are logged in concurrently. Examples include Citrix XenApp (Virtual Apps), Microsoft Terminal Servers, and Microsoft AVD with multiple concurrent users enabled. • Windows 8.1: Netskope will only provide bug fixes for identifiedsecurity vulnerabilities. New features (Cloud Firewall and Self Protection) will only be available on Windows 10 and later. • CASB/SWG is supported on Windows 11 with Snapdragon chipset. • Netskope will provide support for Windows 7 if you have the Microsoft extended support contract. • Netskope announced end of support for Windows 8.1 in September 2023. Linux based hosts: • Netskope Cloud Firewall (CFW) is not supported on the Linux Client. • Netskope Private Access (NPA) for Linux Client on Ubuntu 18 and 20 is currently in early availability. Please contact your account representative for early access. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration Google hosts: • Netskope has announced end of support for Android 9 and 10. Please check the Support website for more details. • Netskope Client does not support ARM32 based Android devices. • Cloud Firewall (CFW) is not supported on Netskope Client for Android devices. Multi-user Platforms: Citrix Xen Desktop – Supported OS: • Windows 2019, Windows 10 (single session only) • Windows server (multi session) Azure Virtual Desktop – Supported OS: Windows 10 and 11 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration macOS hosts • 11 (Big Sur) • 12 (Monterey) • 13 (Ventura) • 14 (Sonoma) 2024 © Netskope. All Rights Reserved. 8 Netskope Client – Supported Hosts (2 of 2) iOS hosts: • 15.1 • 16 • 17 A few items to consider here when installing the Netskope Client on macOS systems. Big Sur: Starting with macOS 11, Apple has stopped the support of kernel extension (KEXT) in lieu of Network extensions. Support for non-standard web ports has been added to Mac OS 11.x (Big Sur) and 12.x (Monterey). With macOS 13 (Ventura), Netskope has validated traffic steering and general Netskope Client functions. The macOS install package is a pkg based installer that can be distributed with JAMF (mac software distribution platform) with a small RAM footprint. ============================================================================== Notes: Netskope has observed a few known issues with macOS Ventura running as a virtual machine. To learn more, log in to support.netskope.com and view the article "Support for macOS Ventura." 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 9 Desktop Netskope Client – High Level Architecture TLS Tunnel The main job of the Netskope Client is to redirect traffic using a TLS tunnel to the Netskope cloud platform. The ST Agent Service is the technical term for the Netskope Client. The Netskope Client runs a service in the operating system that opens a secure tunnel to the Netskope Cloud (or Dataplane), as shown by the orange arrow. The Client service finds the dataplane closest to the public IP address of the ISP the Client system is connected to. The client periodically downloads files from the Dataplane – configuration changes, CA certificates, gateway host and port information, etc. When you need to make configuration changes to the Netskope client, the change is made from the Netskope tenant. For example, if you want to update steering exceptions, or set the Client to auto upgrade, you log in to the Netskope tenant and make the changes there. These configuration files do not control policy. Policy changes are done in the Netskope cloud – it takes less than a minute for policies to be applied from the cloud. For configuration changes, the Netskope Client will connect to the Netskope Cloud once an hour to check for configuration updates. If the Netskope Client needs to download certificates, it opens a TLS tunnel on TCP port 443 (the same kind of tunnel your web browser opens when connecting to your bank’s secure website). The ST Agent service sends information to the Netskope tenant about the user on the device --- for example, this user is millie.meter@acme.com. Netskope distinguishes users by their corporate email address, and this is how policies can be applied specifically to that user as well as determine what traffic to steer. How does the ST Agent service steer traffic? Normally, traffic would go straight through the NIC and out to the Internet. With the Netskope Client architecture, we use a native IPC (interprocess connection) filter driver which sends the traffic to the ST Agent service. This IP filter driver is built into the operating system (both for Windows and macOS systems). The filter driver listens for traffic connecting to certain public IP addresses. The yellow arrow represents a network connection between the filter driver process and the ST Agent service process so instead of sending the traffic out through the NIC, the IP filter driver redirects the traffic using the IPC connection to the ST Agent service (the Netskope Client service) and then sends the traffic through the tunnel to the Netskope Cloud where policies are applied. =============================================== Note: The IP filter driver can listen for traffic to certain IP addresses, and not hostnames, to redirect that traffic to the Netskope service. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 10 Desktop Client – Packet Flow 2 1 3 4 Browser ST Agent Driver ST Agent Service DNS server Netskope Cloud SaaS server Agent service establishes a TLS tunnel between the endpoint and NSGW Browser issued a DNS request for a SaaS domain (e.g., box.com) Browser receives DNS response (e.g., 74.112.184.73) Browser sends packets to SaaS server (e.g., 74.112.184.73) Driver captures the packets and indicates to ST Agent Service Driver captures DNS response. Creates a map of domain and IP address (e.g., box.com – 74.112.184.73) ST Agent service sends the packet to Netskope Gateway in the TLS tunnel Netskope proxy initiates a new connection to SaaS domain (e.g., box.com) 5 SaaS server (box.com) sends response back to the client.NSG sends the packets to the ST Agent service in TLS tunnel ST Agent service sends ingress packets to the driver Driver injects the ingress packets to the system stack 6 7 891011 Connection to SaaS domain is terminated here Browser receives the response Referring to the numbered circles: (1) Once the Netskope Client is installed and running, the ST Agent service establishes a TLS tunnel to the Netskope Cloud or Gateway (NSGW = Netskope Gateway) (2) When you browse to www.box.com, a DNS request is sent out for an A record for the public IP address of that SaaS domain (box.com). (3) The ST Agent service (Netskope Client) listens for the answer to that A record. If it’s traffic that doesn’t have a steering exception, the ST Agent service creates a map of the domain and IP address and programs the IP filter driver so whenever a user needs to connect to box.com, the IP filter driver will send the traffic to Netskope instead. This works for both native applications and web browsers because both do DNS requests. (4) The browser receives the DNS response with the IP address of 74.112.184.73. (5) The Browser starts to connect to the public IP address and the ST Agent driver captures the packets, listening on TCP ports 80 and 443 (if you are using Netskope for Web and Cloud) for the IP address. The ST Agent driver also indicates to the ST Agent service that there is a connection request. (6) The request gets redirected to the TLS tunnel to the Netskope Cloud. (7) Netskope applies policy, and if policy allows, the connection goes through to box.com. (8) Box.com sends the response back to the Netskope Cloud. (9) The Netskope Secure Gateway sends the packets through the TLS tunnel to the ST Agent service. (10) The ST Agent service sends the packets to the ST Agent driver and (11) The browser receives the response. 2024 © Netskope. All Rights Reserved.10 Netskope Security Cloud Operation and Administration Desktop Client – Advanced Features 11 • Support for transparent proxies (without SSL inspection) • Support for explicit proxies – Multiple proxy IP addresses – Static configuration – PAC file configuration – WPAD configuration • Interoperability support with most VPN clients (Layer 3 and 4 VPNs) • Client Fail-Open in case of tenant connection failure events – Heartbeat towards Netskope gateway – Client disables itself upon failure detection • Backwards compatibility for older versions – 1 release per month, 1 golden release per quarter – Backward compatibility, support for up to 2 golden releases 2024 © Netskope. All Rights Reserved. Transparent proxies sits between clients and the internet, intercepting connections. The proxy intercepts requests by intercepting packets directed to the destination, making it seem as if the request is handled by the destination itself. When a transparent proxy is used, the user’s actual IP address is made public in the HTTP header. The transparent proxy only verifies and identifies your connection; it does not protect or modify your IP address. The Netskope Client provides support for transparent proxies without SSL inspection. If there is SSL decrypting between the Netskope Client and the Netskope gateway, this will break the connection and disable the Client. A certificate validation is done between the Client and the gateway. The Netskope Client also provides support for explicit proxies. If you have an explicit proxy on-premise, Netskope then determines what HTTP CONNECT requests are being sent out. Some configurations will let the explicit proxy handle all the web traffic and the Netskope Client will steer cloud application traffic. You can set up an account on support.netskope.com and search support documentation about setting up interoperability between the Netskope Client with Cisco, Fortinet, and Palo Alto Networks VPNs interoperability. You may need to adjust the third-party VPN connections so that the VPNs wouldn’t be getting the Netskope traffic. Client Fail-Open (this is the default action): If the Netskope Client cannot get a connection to the Netskope Tenant, the Client does a Fail-Open. The filter driver stops trying to redirect traffic to Netskope. The Netskope Client will continue to send a heartbeat to the Netskope Gateway and find an available Netskope data plane. If a data plane is found, the TLS tunnel is reestablished, and traffic is routed to Netskope once again. Example: You are connected to a hotel guest Wi-Fi connection, and the connection is only valid for 24 hours. After that, your connection is dropped, and you must reauthenticate to get connected again. The Netskope Client is backwards compatible to two golden releases prior to the current release. There is a new release every month, and every third release is a golden release. This means that there is a golden release once every quarter. So how do you figure out what the golden release versions are? You can navigate to Settings > Security Cloud Platform > Netskope Client > Client Configuration. Click on the Default tenant config and under the Install & Troubleshoot tab, you can see the most recent release and most recent golden release. The screenshot shows the latest release is version 109 and the latest golden release is version 108. This means Netskope supports older Client versions down to version 102. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration 12 • During the installation process: – Client connects to addon-.(eu|de).goskope.com:443 – Client downloads “nsbranding.json” • After the installation: – Client connects to addon-.(eu|de.)goskope.com:443 – Client downloads the certificates Root, Tenant specific and User certificates – Client downloads the configuration files Managed domains, SSL-pinned bypass, Exception List 2024 © Netskope. All Rights Reserved. Desktop Client Installation High Level Overview During the installation of the Netskope Client, the Client connects to the add-on service on port 443 of your Netskope tenant and downloads the nsbranding.json file. This json file defines the identity of the Client: the user key, the organization ID, and the different hosts used by the Client for tenant connections. After the installation is complete, the Client connects again to the add-on service of the Netskope tenant and downloads root, tenant, and user specific certificates, and also the configuration files. The configuration files include: • Auto upgrade information • The version the Client is allowed to auto upgrade to • The Netskope tenant that the Client connects to • Any steering exceptions to bypass specific traffic =================================================== Architecture is consistent for both Windows and MAC systems. For email invitations sent to the user to download and install the Netskope Client, the installation package is unique to the user. (1) Netskope agent installs CA Cert, branding and configuration files from .goskope.com • Managed Domains for agents to steer • SSL Pinned Apps to bypass (2) Client establishes SSL Tunnel to gateway-netskope.goskope.com:443 In other Netskope Client installation methods, the installation package is not tethered to a specific user identity, and user identity is determined after the installation and service starts. 2024 © Netskope. All Rights Reserved. 12 Netskope Security Cloud Operation and Administration Desktop Client Installation Components 13 • nsbranding.json Defines the identity of the app: user key, organization ID, the different hosts used by the app for tenant connections, … • nsconfig.json – Configuration file for the Netskope app, containing update settings and versions – Allows you to set log debug level, packet capture, … • nsdomain.json The list of managed domains • nsbypass.json The list of bypassed applications (SSL Pinned Apps) • nsexception.json The list of configured exceptions (Settings > Applications > Exception List) 2024 © Netskope. All Rights Reserved. Here is a list of the json files that are downloaded during the Client installation. ============================================================ For reference: The installation files are stored in: MacOSx files: /Library/Application Support/Netskope/STAgent Windows files: /program data/netskope/stapp/data 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration Desktop Client Config Files and Logs 14 Client configuration files and debug logs are the primary sources of information for troubleshooting Client issues. They are found in the following locations: • Windows: Client configuration files: C:\ProgramData\netskope\stagent Debug logs: C:\Users\Public\netSkope • Mac: Client configuration files: /Library/Application Support/Netskope/STAgent Debug logs: /Library/Logs/netSkope 2024 © Netskope. All Rights Reserved. The client configuration files and debug log files are located as shown. These files provide useful information in troubleshooting Netskope Client issues. 2024 © Netskope. All Rights Reserved. 14 Netskope Security Cloud Operation and Administration 152024 © Netskope. All Rights Reserved. Desktop Client Operation Built-in Checks • The app checks if proxy is present (example: Cisco) • The app establishes a TLS tunnel towards: gateway-.(eu|de).goskope.com – The app verifies the offered certificate • Needs to be tenant or another trusted certificate • The app verifies the proxy (tenant) health (every minute) – Fail-open protection mechanism The built-in checks include checking for the presence of an on-prem proxy service. If you have an explicit proxy, for example, a Cisco proxy configured in the Client configuration files, Netskope checks for this and steers traffic through the local proxy service. ============================================================Certificate example: Certificate: Data: Version: 3 (0x2) Serial Number: 3315097 (0x329599) Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=CA, L=Los Altos, O=Netskope Inc, OU=a0086ca398d1354afb6e204634fc8cf2, CN=ca.emeaNSCOA.eu.goskope.com/emailAddress=certadmin@netskope.com Validity Not Before: Jan 7 11:25:48 2019 GMT Not After : Jan 4 11:25:48 2029 GMT Subject: C=US, ST=CA, L=Los Altos, O=Netskope Inc, OU=a0086ca398d1354afb6e204634fc8cf2, CN=dsinclair@netskope.com/emailAddress=dsinclair@netskope.com Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 2024 © Netskope. All Rights Reserved. 15 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 16 Linux Deployment 1 3 2 1 Currently, you need to contact Netskope Support to download the Linux installer. To install the Netskope Linux Client: 1. Download the Client to the end-user system. From your terminal, run the following command: sudo ./NSClient.run 2. After the installation is complete, a popup window displays to provide the Netskope Tenant name and select the tenant domain. 3. Click Next to continue with enrollment. The user is redirected to their IdP login screen. The Authentication status message is displayed in the browser. Once the user enrollment is complete, you can see the Netskope Client icon on the taskbar. 2024 © Netskope. All Rights Reserved. 16 Netskope Security Cloud Operation and Administration Netskope Client 17 • Introduction • Desktop Client • Mobile App • Administration and Configuration • Deployment Options 2024 © Netskope. All Rights Reserved. Let’s look at the deployment of the mobile versions of the Netskope Client. 2024 © Netskope. All Rights Reserved. 17 Netskope Security Cloud Operation and Administration Mobile Deployments iOS Profiles 18 • Support for iOS 15.1 and higher • The iOS profile consists of – A VPN configuration • Certificate based, split tunnel, on-demand VPN • Triggered by traffic towards any managed cloud application • Split tunnel mode instructs iOS to consult the PAC before DNS – A PAC file • Contains the list of managed applications • Resolves all apps to the unique proxy IP and port reachable through the VPN tunnel 2024 © Netskope. All Rights Reserved. The Netskope Client for iOS is called iOS mobile profile. For iOS deployments, we install a mobile profile with a split tunnel VPN and a PAC file. The Netskope iOS mobile profile you use in iOS consists of two things. One is a VPN tunnel that connects to a gateway service in the Netskope data plane and directs traffic through that tunnel. The VPN tunnel is set up to a unique proxy IP and port for the tenant instance. This isn’t all that different from what the desktop Netskope Client does. This is a certificate based split tunnel because only the domains that are being steered are being sent through it, anything else that isn’t steered goes out through the NIC. The split tunnel mode instructs iOS to consult the PAC file before checking DNS. The second item that is needed is a PAC profile that is on the iOS. The PAC file contains the tenant specific list of managed applications and resolves all the apps to the unique proxy IP address and port reachable through the VPN. We use this method because there isn’t a filter driver on mobile devices. 2024 © Netskope. All Rights Reserved. 18 Netskope Security Cloud Operation and Administration Netskope iOS Profile iOS Onboarding (1 of 2) 19 • When using manual deployment methods, the user is requested to install the mobile profile 2024 © Netskope. All Rights Reserved. The user needs to click Install to install the Netskope iOS mobile profile. 2024 © Netskope. All Rights Reserved. 19 Netskope Security Cloud Operation and Administration Netskope iOS Profile iOS Onboarding (2 of 2) 20 • Click on More Details to review settings 2024 © Netskope. All Rights Reserved. Settings > General Once the Netskope iOS mobile profile is installed, you can view Netskope’s CA certificates and user certificates on the iOS device. 2024 © Netskope. All Rights Reserved. 20 Netskope Security Cloud Operation and Administration Netskope iOS Profile Operation 21 • Managed cloud apps are steered to the Netskope tenant • The VPN badge appears in the top left corner 2024 © Netskope. All Rights Reserved. After installation, how does the mobile profile work? When you connect to an application on your iOS device, the application checks the PAC file first, then connects to the network proxy. When the on-demand VPN is connected, you will see the VPN badge in the top left corner. You are now steered to the Netskope Tenant. 2024 © Netskope. All Rights Reserved. 21 Netskope Security Cloud Operation and Administration Mobile Deployments Netskope Android App 22 • Support for Android 11 and higher* • The Android app traffic interception: – Closely resembles the desktop app design – At app start-up, a TUN interface is created (VPN virtual interface) Connecting to Netskope gateway associated with the tenant instance – Managed cloud apps are redirected into the TUN interface via TCP-IP stack integration * SSL traffic inspection is currently not possible on Nougat (7.x) onwards, due to a system level change in trust of certificate authorities (CAs) affecting ALL vendors. • Netskope will tunnel and bypass all HTTPs traffic and no corresponding events will be displayed in Skope IT. • Netskope will not perform man in the middle (MITM) due to hardcoded certificate restrictions 2024 © Netskope. All Rights Reserved. On Android systems, the Netskope Client is installed as a lightweight non-intrusive application that steers traffic from the user’s device to the Netskope Cloud. The Android Netskope mobile deployment is available on the Google Play store as an APK. The install is a VPN tunnel interface, connecting to the closest Netskope gateway or POP and associated with the Netskope tenant. Android has removed the ability to have non-public certificate authorities added to their operating system. SSL traffic inspection is limited to browser traffic since Android version 7.0 (Nougat). By default, Netskope will tunnel and bypass all HTTPs traffic and no corresponding events will be displayed in Skope IT. Netskope will not perform man in the middle (MITM) due to Android’s hardcoded certificate restrictions. ============================================================ Netskope Client on Google Play store: https://play.google.com/store/apps/details?id=com.netskope.netskopeclient 2024 © Netskope. All Rights Reserved. 22 Netskope Security Cloud Operation and Administration Netskope Android App Android Onboarding 23 • App installation from email invitation link • Accept the certificate name • Enable screen lock credentials 2024 © Netskope. All Rights Reserved. You can install the Netskope Client using the email invitation sent from the Netskope tenant admin console. Follow the instructions to install the Netskope Client from the Google Play Store. In Android devices, a CA certificate can only be installed in the user cert store irrespective of device ownership and enrollment method. Starting with Android 7.0 (Nougat), Netskope certificates stored in the user certificate store are not trusted by Android and 3rd party app services, since Google does not trust the certificates installed in the user store. This leads to errors during SSL inspection - native or 3rd party mobile applications would drop the SSL handshake because server certificates presented by Netskope SWG isn’t recognized as trusted certificates. However, web-browsers would still be able to verify chain of trust against the user cert store and therefore SSL inspection won’t cause issues. One option to get around this Android limitation is to disable SSL inspection for Android. At the time of Netskope client distribution and enrollment,CA certificate distribution can be skipped. The Netskope Client won’t find a CA certificate on the device and will signal the upstream proxy that SSL inspection should not be performed. The traffic will still be tunneled via NewEdge according to the steering configuration. 2024 © Netskope. All Rights Reserved. 23 Netskope Security Cloud Operation and Administration Netskope Client 24 • Introduction • Desktop Client • Mobile App • Administration and Configuration • Deployment Options 2024 © Netskope. All Rights Reserved. Let’s look at the administration and configuration of the Netskope Client. 2024 © Netskope. All Rights Reserved. 24 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 25 Netskope Client – Users & Groups Settings > Security Cloud Platform > Netskope Client > Users Settings > Security Cloud Platform > Netskope Client > Groups To see the list of users’ IDs that are running the Netskope client on their system, navigate to Settings > Security Cloud Platform > Netskope Client > Users. The second screenshot showing Groups displays the groups of users that you have in your Directory services. Users and Groups information can be obtained using Directory Importer. Directory Importer connects to a domain controller to periodically fetch user and group membership information, and then posts this information to the organization’s Netskope tenant instance in the cloud. Organizations that are using the Netskope client can leverage this user and group membership information to send client invitations and to set up cloud application policies. For a Netskope Client to connect as a particular user, the Netskope tenant needs to know their user IDs and what groups they are a member of. That way, Netskope can apply policy to that user when that user connects with the Netskope Client. Netskope obtains this list of users and groups from either Active Directory connector services or SCIM services. One of the crucial steps towards deploying the Client in your environment is importing your users into your Netskope tenant. Netskope Cloud Platform leverages its own directory to apply security policies across all deployment modes and operating systems. Email ID and User Principal Name (UPN) is a mandatory field during user import. • Email ID is mandatory in all deployment modes because it represents the user identity across the Netskope Secure Cloud Platform. • UPN is mandatory for the transparent deployment of the Netskope Client and is highly recommended. The supported methods to import users into your Netskope tenant are: • Manual Import • Using SCIM App • Using Directory Importer ====================================== SCIM – System for Cross-domain Identity Management defines a standard for exchanging identity information across different cloud app vendors. SCIM is used when a SSO or SAML provider is used. 2024 © Netskope. All Rights Reserved. 25 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 26 Netskope Client – Devices (1 of 2) Settings > Security Cloud Platform > Netskope Client > Devices To verify the state of and control the configuration of the Netskope Client, go to Settings > Security Cloud Platform > Netskope Client > Devices. You can configure when the Client performs upgrades, upgrades to what versions, whether to do auto upgrades, and to fail open or fail close. This example shows the devices that have connected to the Netskope Cloud in the last 7 days. You can view the hostname, Device classification, OS platform, the user that was logged into that device, installed and uninstalled devices, whether Internet Security and Private Access has been enabled, and what the last event was. ================================================== Note: You can also pull the information on the Devices page via the API. 2024 © Netskope. All Rights Reserved. 26 Netskope Security Cloud Operation and Administration 272024 © Netskope. All Rights Reserved. Netskope Client: Devices (2 of 2) Export User Key On the Devices page, click the ellipsis to the right of a device, and select View Details to see the details of the device and manage the device’s client. You can enable or disable traffic steering and pause or restart the Endpoint DLP service under the Manage Client button. (The option for Endpoint DLP service is available only if you have the license.) The Collect Log button will collect the logs for the specified device and send you an email when the logs are ready to be downloaded. Click the Download Log button when the logs are ready to be downloaded. The logs are encrypted with a tenant-specific encryption key. The ellipsis button is to export the user key. Event History, Group Membership, and Organization Unit details can be viewed further down on this page. 2024 © Netskope. All Rights Reserved. 27 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 28 Client Configuration – Default tenant config Settings > Security Cloud Platform > Netskope Client > Client Configuration As stated in the description under Client Configuration, the Default tenant config is the out of the box configuration that applies to all the Netskope Clients in your deployment. For more granular control over Client behaviors at a user group or OU level, you can create a new Client configuration. 2024 © Netskope. All Rights Reserved. 28 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 29 Client Configuration Options – Tunnel settings (1 of 3) Settings > Security Cloud Platform > Netskope Client > Client Configuration > New Client Configuration 1 2 Under Client Configuration, you can apply a new client configuration for different user groups or organization units. On the Tunnel Settings tab referring to the numbered circles: (1) Enable DTLS (Data Transport Layer Security): By default, network traffic is steered over a TLS tunnel. If you want to use DTLS instead, you can enable DTLS here. (2) On-Premises Detection: Enable on premises detection if you want the Netskope client to detect if it is on- prem (at a corporate office). This option is used if you want different steering configurations for when the Client is on-prem versus off-prem. For example, your company uses a firewall in your on-prem network to manage web traffic and only use Netskope to steer cloud traffic. Then for off-prem Clients, you configure Netskope to steer both cloud and web traffic. You can use dynamic steering to detect device location and use the appropriate steering methods. You need to set up on-prem detection rules to enable on-premises detection. There are two ways to set up on-premises detection rules. Select Use HTTP option to have the Client look for a web server that only exists on-prem by providing a web server IP address or hostname under the FQDN/IP Address field and adding a timeout setting. If the Client gets the HTTP response code of 200, the device is deemed to be on-premise. Select Use DNS option to have the Client do a DNS lookup for a DNS record that would only get an A record on-prem. 2024 © Netskope. All Rights Reserved. 29 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 30 Client Configuration Options – Tunnel settings (2 of 3) 3 4 Tunnel Settings tab – Referring to the numbered circles: (3) Pre-logon for Private Apps: The Client will connect to private apps when the user tunnel is not set up or if the user is not logged into the device. (4) Periodic re-authentication for Private Apps: Private Apps refer to the on-prem applications that are in your data center or private cloud that can be steered by Netskope. Enabling this option forces users to re-authenticate after a certain time period for greater security. You need to set the re-authentication interval and grace period. The re-authentication interval examplehere is to have users re-authenticate every 24 hours, with a grace period of 60 minutes after the authentication expires. You can only use this option if you are using a single sign-on provider because the Client needs to be able to direct the user to the SSO login screen to re-authenticate. 2024 © Netskope. All Rights Reserved. 30 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 31 Client Configuration Options – Tunnel settings (3 of 3) 5 6 7 Tunnel Settings tab - Under Advanced, referring to the numbered circles: (5) Interoperate with Proxy: If you enable this feature, you can configure proxies regardless of the Client’s location. You need to provide an on-prem proxy IP address and listening port, and enter a brief description about the proxy connection. The Netskope Client always detects and intercepts traffic that is sent to proxies listed here. It is not mandatory to select this feature, but you can use it whenever multiple proxies are deployed on the network. (6) Enable device classification and client-based end user notifications when the client is not tunneling traffic: Enable this option if you want the Client to show warning, block, or coaching notifications to end users but not tunnel traffic. This option is for when the Client is on-prem and you use a different steering method for on-prem devices but still want to show user notifications. (7) Perform SNI (Server Name Indication) check: Netskope steers traffic to public IP addresses. What if a public IP address had multiple domains behind it? Use SNI check in addition to DNS to make steering decisions. If a web hosting service uses a single public IP address for different types of websites, Netskope can perform a SNI check to get the domain name from SNI and the Client then validates the traffic based on the SNI check. For example: YouTube, drive.google.com, and plus.google.com are resolved with the same IP address. The unmanaged YouTube traffic is allowed to the Netskope proxy because the Client steers web traffic based on the IP address. To eliminate this IP address overlapping, you can configure the Client to steer the traffic based on SNI instead of IP address. The SNI feature is supported on Windows 7 and higher versions. 2024 © Netskope. All Rights Reserved. 31 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 32 Client Configuration Options - Endpoint DLP and Tamperproof Endpoint DLP tab: Enable Endpoint DLP: Select Enable Endpoint DLP to enable endpoint data loss prevention for the client configuration and apply content and device control policies to your users’ devices. Endpoint DLP is an add-on feature for the Netskope client. You need to contact your account manager or sales representative to enable this feature. Tamperproof tab: Allow disabling of Clients: Selecting this option allows users to disable the Netskope Client on their devices. If users disable the Netskope Client, their traffic is no longer tunneled to Netskope since Netskope fails open by default. If you uncheck this option, you also need to enable the Password protect client uninstallation option as well. This applies to Windows systems only. Why might you ask? If the user is a local administrator on the Windows system, the user can still stop the Netskope service and uninstall the Netskope Client unless you enable password protection. Hide Client Icon on System Tray: Hides the Client icon from the users’ devices system tray. This will also prevent Client notifications from being displayed to the user. Please note that if you choose to hide the Client icon, users will not be able to see notifications. Password protect Client uninstallation: Enabling this option prevents unauthorized uninstallation of the Client from users’ devices. Uninstalling the Client will require a password. The password protect uninstallation is supported on Windows, macOS, and Linux devices. Protect Client configuration and resources: Selecting this option prevents users from altering any files, folders, and processes of the Netskope Client installation. This prevents users from modifying, renaming, or deleting Netskope processes, folders, files, and registry keys. This option is supported on Windows 10 and higher versions. Fail Close: Blocks all traffic when a tunnel to Netskope is not established or a user device is not provisioned in the Netskope Cloud. If a Netskope tunnel fails to come up, we recommend that you block the steered traffic from that device. If you enable the Fail Close option, the Password protect client uninstallation option is also enabled and the option Allow disabling of Clients is disabled. 2024 © Netskope. All Rights Reserved. 32 Netskope Security Cloud Operation and Administration When you enable the Fail Close option, there are a few granular options to configure: • Exclude Private App Traffic: Use this option to allow private apps to keep working when Fail Close is triggered. • Show notification: Fail Close notifications will be shown even if the Client icon is hidden. A Fail Close popup message is displayed whenever the tunneling to Netskope is blocked. • Captive Portal Detection Timeout (minutes): This option temporarily disables Fail Close for the specified time value (up to 10 minutes) when users are behind a captive portal, allowing users to perform captive portal authentication. ======================================= Captive Portal: A captive portal is a webpage that the user of a public network is required to view and interact with before they can access the network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other public venues that offer free Wi-Fi hotspots for internet users. 2024 © Netskope. All Rights Reserved. 32 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 33 Client Configuration Options - Install & Troubleshoot Netskope Client menu 1 2 3 4 4 On the Install & Troubleshoot tab, referring to the numbered circles: (1) Upgrade Client Automatically to Latest Golden Release: You can choose from the upgrade options listed for the Netskope Clients. Click the down arrow and specify to automatically upgrade to the latest Golden release, the latest release, or a specific Golden release. Golden release versions includes hotfix release updates. You can set all clients to be upgraded to a specific golden release. Click the pencil icon to choose which Golden release you want your Netskope Clients to be upgraded to. The screenshot shows the latest golden release is version 108. This means Netskope supports older Client versions down to version 102. If you use a specific Golden release to upgrade to, you can also check the Opt-in dot upgrade option which will upgrade your Clients to the minor revisions of that version. For example, the latest release shown is version 108.1.0 – the 1.0 is a minor update after the release of version 108. Select the option Show upgrade notification to end users if you want to send notification to end users about an upcoming Client upgrade. If auto upgrade is disabled, updates should be installed using the System Center Configuration Manager (SCCM). By default, the Client will poll hourly for the latest configuration update; and poll every 4 hours for any upgrade packages if available and reboot the system to force an update. (2) Uninstall clients automatically when users are removed from Netskope: With this option, you can have the Netskope Client uninstalled automatically when users are removed from the Netskope tenant. Users does not need to manually uninstall the Client from their system. This option is supported on Windows and macOS systems.* (3) Allow users to unenroll: If the Netskope Client is provisioned using IdP, this option is available. The use case for this option is if you have a computer that multiple users log in to, usersNetskope client steers traffic that is destined for managed cloud apps through a secure tunnel to the Netskope Security Cloud, where policy actions are then applied. Netskope offers other methods for steering traffic to the Netskope Security Cloud as well. These include agents and profiles for mobile devices, proxy chaining and GRE and IPsec tunnels for on-premises devices, and Proxy Auto-Configuration files that can be used as an explicit proxy on operating systems that do not support the Netskope client. Additionally, Netskope offers a Reverse Proxy steering mechanism that supports managed cloud apps that can only be accessed through a web browser. In this course, we will focus mainly on the most commonly-used steering method, the Netskope client. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 8 Securing Managed SaaS with Near Real-time Visibility and Control • File name/owner/size/type and path • App and instance name • Audit trail with activity, user, access date • File version history • Encryption status • Shared link expiration • Slack messages and channels • ServiceNow incidents • Registered and owned devices • DLP policy triggers • External users (and access to internal files) • Search and filter on a variety of conditions • File access to external domains • Google and Slack ecosystems • DLP policies • Download • Restrict access • Revoke access • Change ownership • Quarantine • Legal hold • Encrypt/decrypt • Notify original owner / end user V IS IB IL IT Y C O N T R O L As mentioned earlier, Netskope CASB uses API connectors to hook into supported SaaS cloud apps and gain visibility and control over the apps. From a visibility perspective, Netskope can identify a wide range of file information, such as filename, ownership, size and type, and the paths of files stored on the managed cloud app. It can also provide a full audit trail of user activity on the files and folders stored on the app, as well as file version history, encryption status, and much more. With this visibility comes control. Once you identify issues that need to be addressed, Netskope API connectors enable you to apply DLP policies to examine the actual data and to block downloads, restrict or revoke access, change inappropriate file ownership, and more. 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 9 Public Clouds Data Centres PRIVATE APPS Remote workers Netskope Publisher CLOUD APPS WEBSITES Security Cloud Zero Trust Network Access (ZTNA) Fast and Scalable Access Next Generation Secure Web Gateway (NG SWG) Data and Threat Protection Managed Devices • NS Client installed and enabled • Forward Proxy Securing Real-time Traffic: NG SWG, ZTNA, Client, Fwd/Rvs Proxy Unmanaged Devices • NS Client not installed or disabled • Reverse Proxy Netskope provides a variety of methods for securing real-time internet traffic, whether that traffic is traveling to and from websites, cloud apps, or private apps hosted on IaaS resources or on premises in data centers. Earlier we talked about Cloud Inline protection. Netskope Next Generation Secure Web Gateway, or NG SWG, is the product that provides this real-time protection for both cloud apps and web traffic. NG SWG enables you to control access to websites, block users from uploading and downloading confidential files on cloud apps, block the transfer of files infected with malware, and so on. These real-time protection capabilities rely on traffic steering provided by the Netskope client and the Forward Proxy PAC file for managed endpoint computers, and Reverse Proxy for unmanaged devices. Netskope also offers Zero Trust Network Access capabilities as a replacement for VPN software to protect access to private apps hosted on-premises or on Infrastructure-as-a-Service resources. We will discuss Netskope's ZTNA product, Netskope Private Access, in more detail later in this chapter. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 10 Monitoring and visibility • Observe user behavior on the Internet • CASB monitoring SaaS apps and activities • Risk level for SaaS applications Source: Gartner – Critical Capabilities for Secure Web Gateways, Dec. 2018 Malware and advanced threat detection • Analyze Internet traffic bi-directionally • UEBA analysis of cloud account activity for compromise or insiders • AVs, IPS/exploits, script analysis, pre-execution heuristics, cloud sandboxing Connect offices and mobile workers • Rapid adoption of SaaS apps is driving remote offices direct-to-internet • Cloud based security stack protects remote and mobile workers Primary NG SWG Use Cases Before moving on to talking about securing data in the public cloud, let’s consider some use cases for Secure Web Gateways and how Netskope Next-Gen SWG addresses these situations. These use cases are based on a Gartner report summarizing critical capabilities for Secure Web Gateways. The first use case is monitoring and gaining visibility into user behavior and activity on the web and in cloud apps, as well as determining the risk level of cloud apps. Netskope NG SWG provides inline visibility into all HTTP, SSL, and TLS web traffic, including managed and unmanaged apps. For managed apps, it provides controls for real- time inline traffic as well as API controls for data at rest. It also provides controls for more than a thousand unmanaged apps via a custom API inline proxy, with the ability to learn new or custom apps. The Cloud Confidence Index provides risk ratings for tens of thousands of apps, as well as risk profiles based on CSA attributes including security, risk, privacy, compliance, vulnerabilities, and more. The second use case is protecting against infections from malicious websites and from web traffic containing known malware and ransomware, as well as unknown threats. Netskope Next Gen SWG inspects all HTTP, SSL, and TLS web traffic to provide inline visibility, including detection of macros and phishing URLs in webmail. It provides multi-layered threat prevention, including anti-malware, IoC hashes and URLs, pre-execution heuristics, and client traffic exploit prevention to detect known threats. It also provides multi-layered threat detection, including dynamic sandboxing and AI analysis of malware, ransomware, and cloud storage to detect unknown threats. The third use case is adapting to the evolution of networks away from hub-and-spoke architecture, where offices backhaul internet traffic over costly dedicated links, and remote users access central resources over Virtual Private Networks, leading to a poor user experience. Netskope Next Gen SWG addresses these challenges by providing direct-to-net cloud access over GRE and IPsec tunnels for both main office and remote office web traffic. It also provides a way to bypass sensitive traffic, such as encrypted traffic containing personal health or finance information, to keep data secure. Finally, Netskope Next Gen SWG provides direct-to-net cloud access for mobile workers via a lightweight steering client for all apps, or transparently to managed apps via Single Sign-on or Identity and Access Management solutions. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 11 Shadow IaaS Security Posture Management Data Exfiltration With inline, Netskope extends visibility into unmanaged IaaS and PaaS services Enhance visibility, prevent security exposure, and simplify governance and compliance Configuration Data in Motion (Real-time Visibility & Control) Control access to data and apps, and prevent sensitive data movement to unmanaged cloud infrastructure (e.g., S3) Data andneed to sign in and then sign out when they are done with the system so other users can log in and authenticate. (4) Enable advanced debug option: This option allows you to display the Advanced Debugging option from the Netskope Client menu on users’ systems and collect logs. You can set the log level to debug if there are issues with the Netskope Client. You would enable this option if you are working with Netskope Support, and they need to 2024 © Netskope. All Rights Reserved. 33 Netskope Security Cloud Operation and Administration see the Client logs. The best practice here is to only have the log level set to debug to troubleshoot issues. Once done, it’s best to change the log level back to info. ================================================= *Note: When selecting Uninstall clients automatically when users are removed from Netskope on macOS devices, the administrator needs to select the Removable System Extension option under the System Extension Type in the MDM profile used to deploy the Netskope Client. Otherwise, the uninstallation fails due to the macOS restriction. 2024 © Netskope. All Rights Reserved. 33 Netskope Security Cloud Operation and Administration Advanced Debugging 342024 © Netskope. All Rights Reserved. To continue reviewing the Advanced Debugging menu from the Netskope Client menu options: Log Management: Set the specific log level you need to capture logs. The log levels in nsdebug.log are displayed as info, warning, error, and critical. The log files are stored in the default locations: Windows devices: %PUBLIC%/Netskope/ndebug.log macOS devices: /Library/Logs/Netskope/nsdebusg.log Packet Capture: You can capture the inner and outer packets of the tunnel traffic connecting to Netskope. Speed Test: The speed test allows for testing downloads and uploads along with different file sizes. The recommendation here is to test with at least 10mb file size. This is testing the connection to the Netskope Cloud. Private Access: The Private Access tab shows your Client is steering private apps and its connection status with bytes sent and received. 2024 © Netskope. All Rights Reserved. 34 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 35 Client Installation Verification If the Netskope Client is installed successfully, you will see the Netskope Client spinner on the system tray. When you hover over the Netskope Client icon, it shows the Netskope Client is enabled. Right click on the Client icon to view the Netskope Client Configuration. 2024 © Netskope. All Rights Reserved. 35 Netskope Security Cloud Operation and Administration Steering Configuration – Steered Traffic 362024 © Netskope. All Rights Reserved. Settings > Security Cloud Platform > Traffic Steering > Steering Configuration As stated in the description under Steering Configuration, the steering configuration controls what types of traffic gets steered to Netskope for real-time deep analysis, and what types of traffic gets bypassed. The Default tenant config applies to all users. For more granular control over different user groups or OU, you can create a new configuration for that OU or user group. The screenshot of the Steered Traffic tab shows that all web traffic and all private apps are being steered to Netskope, except for any items listed on the Exceptions tab. 2024 © Netskope. All Rights Reserved. 36 Netskope Security Cloud Operation and Administration Steering Configuration Exceptions List and Certificate pinned apps 372024 © Netskope. All Rights Reserved. The Exceptions list is pre-loaded by Netskope with steering exceptions for certificate pinned applications. Certificate pinned applications refer to applications that users install on their system. When the app is installed, it is considered pinned. These pinned apps won’t affect browser traffic. Certificate Pinned Apps don’t allow SSL inspection because trusted certificates are hardcoded. There are no steering exceptions for browser-based traffic. The default action for certificate pinned apps is Bypass. The Bypass action means that this app won’t be steered to Netskope and is allowed to go directly to the Internet. If the app gets steered to Netskope, the app will not work. The Block action will block the app, so the app won’t work. If you select the action Bypass and Tunnel Mode, this sends the traffic to Netskope, but Netskope does not decrypt it. The purpose for selecting Tunnel Mode is if you want the traffic to go to that application but come from a Netskope public IP address. If the app is a managed app, you can set your managed apps to only accept traffic from Netskope public IP addresses and from your own on-prem IP addresses. Then, users with a personal device that does not have the Netskope Client installed cannot log into your managed apps because you configured the managed app (on the managed app website) to only accept traffic from the Netskope public IP addresses and your on-prem IP addresses. If you select the action Bypass and Managed Devices, this means only allow bypass if the device is classified as managed. ================================================================== To add steering configuration exceptions: 1. Navigate to Settings > Security Cloud Platform > Traffic Steering > Steering Configuration. 2. Select the steering configuration you are adding steering configuration exceptions to. 3. Click the Exceptions tab and add a New Exception or edit an existing Exception. 4. Under Edit Exceptions, you can see the Exception Type as Certificate Pinned App: Dropbox (on the screenshot example) 5. Under Actions, you can set which systems to bypass. 2024 © Netskope. All Rights Reserved. 37 Netskope Security Cloud Operation and Administration Steering Configuration Traffic steering & Non-standard ports 382024 © Netskope. All Rights Reserved. 1 2 3 4 What kind of traffic do you want to steer to Netskope? (1) Enable Dynamic Steering: You would enable dynamic steering and have different steering configurations if you need steering to be different for on-prem versus off-prem Clients. To enable dynamic steering, you need to first enable On-Premises Detection located under the Client Configuration section and then enable it in the Default tenant config, for this feature to be functional. (2) Traffic to be steered: Cloud Apps Only | Web Traffic | All Traffic • Cloud Apps Only: Steers only Cloud Apps, for example, all the cloud app web domains listed in Netskope’s Cloud Confidence Index (CCI). • Web Traffic: Steers all web traffic, HTTP and HTTPs to Netskope except any items listed on the Exceptions list. • All Traffic: Steers all web and non-web traffic, TCP, UDP, and ICMP to Netskope. The type of traffic Netskope will steer depends on the license you have. If you only have the CASB license, you can only steer Cloud Apps traffic. If you have the SWG license, you can steer web traffic, and if you have the Cloud Firewall license, non-web traffic like TCP, UDP, and ICMP are steered to Netskope. (3) Private Apps - Steer private apps: Select this option if you want to steer private apps and if you have the license to use Netskope’s Private Access feature. You will need to create policies to allow access to private apps and log events when enabling this feature. There is an option to steer all private apps or just specific ones and also the option to steer or not steer private apps in the presence of other steering methods. Non-Standard Ports tab: (4) Web Traffic – Steer non-standard ports: Enable this option if you need to steer web traffic running on non- standard ports. This is web traffic that is not using the standard TCP ports 80 or 443. In the example shown, a non- standard port has been added for Australia’s Medicare site which uses port 5447. 2024 © Netskope. All Rights Reserved. 38 Netskope Security Cloud Operation and Administration Device Classification - Managed Devices392024 © Netskope. All Rights Reserved. Settings > Manage > Device Classification To set a Netskope Client device as a managed device, you need to specify what constitutes a managed device. Here, we define managed devices as trusted devices. Navigate to Settings > Manage > Device Classification to set up a device classification rule for the specific operating system. The type of classification rules you have will be different for the different operating systems since different OSes have different things to check for. You can implement specific firewall policies for trusted, managed devices and more stringent firewall policies for unmanaged devices. 2024 © Netskope. All Rights Reserved. 39 Netskope Security Cloud Operation and Administration Device Classification - Managed Devices for Windows OS 402024 © Netskope. All Rights Reserved. You can set up a classification rule to identify a device by monitoring the encryption status, registry setting, process, file, joined to an Active Directory Domain or check for a certificate installed on the device. The example shown here is a classification rule set up for Windows operating systems which checks for a specific file called NetskopeManaged.txt. If this file is found on the system, then the device is classified as a managed device. The Netskope Client checks the device for the required configuration defined in the device classification rule and sends the notification to the Netskope Cloud whether the device is managed or unmanaged. The Netskope Client does not check for this configuration again until the service stops and starts again, which usually happens when a system reboots. Troubleshooting tip: If a device still shows as unmanaged, even though the device classification rule is enabled, the device may need to be rebooted so the Netskope Client service is restarted, and the classification check is performed. 2024 © Netskope. All Rights Reserved. 40 Netskope Security Cloud Operation and Administration Netskope Client 41 • Introduction • Desktop Client • Mobile App • Administration and Configuration • Deployment Options 2024 © Netskope. All Rights Reserved. Let’s look at the different deployment options for the Netskope Client. 2024 © Netskope. All Rights Reserved. 41 Netskope Security Cloud Operation and Administration Client Deployment 42 • Netskope Client can be provisioned in multiple ways: – Invitation via Email – Deployment via a Software Management Suite – Deployment via an MDM solution – Deployment via SSO app Enforcement 2024 © Netskope. All Rights Reserved. There are several ways to deploy the Netskope Client. The various ways are listed on the slide here and also an expanded list in the Notes section. ============================================================ Netskope supports the following options to deploy the Netskope Client on your device: • Email Invite • Deploy Netskope Client via IdP • Microsoft Endpoint Configuration Manager • VMware Workspace ONE • Microsoft Intune • Microsoft Group Policy Object (GPO) • JAMF • Kandji • MobileIron Cloud • MobileIron Core • XenMobile • Amazon WorkSpaces • Azure Virtual Desktop • Citrix Virtual Apps and Desktop 2024 © Netskope. All Rights Reserved. 42 Netskope Security Cloud Operation and Administration 43 • Once the user clicks on the link, downloader changes MSI and appends user hash key, tenant ID, and add-on manager host name • Installer uses these info to connect to the tenant/add-on manager and grabs nsbranding.json to complete the installation process • Once installation is done, client fetches certs & config files from Client services • Client uses certs to authenticate with the Gateway 2024 © Netskope. All Rights Reserved. Email Based Installation What Happens During Client Install From an administrator’s standpoint, the easiest way to deploy the Netskope Client is through an email invitation. Users’ email addresses are added into Netskope either manually or imported using a csv file and then the email invitation is sent out to the users. The email invitation is customizable and includes a link specific for the operating system the user is running and is specific only for that user. Installation of the Netskope Client requires administrator rights on the device. • Once the user clicks on the link, the downloader changes the MSI file and appends the user hash key, tenant ID, and add-on manager hostname. • The installer uses the information to connect to the Netskope tenant and the add-on manager, and also retrieves the nsbranding.json file to finish the installation process. • Once the Client installation is done, the Client retrieves the certificates and configuration files from Client services. • The Netskope Client uses the certificates to authenticate with the Gateway. 2024 © Netskope. All Rights Reserved. 43 Netskope Security Cloud Operation and Administration 44 • Onboarding of any supported device type • Invite – Individual Users – Active Directory Users/Groups • Customize – Email invitations – Download requests – Download errors 2024 © Netskope. All Rights Reserved. Client Deployment via Email Invitation (1 of 3) An email invitation can be sent to individual users or groups. The invitations are customized to the specific user. The caveat of using an email invitation is that the user just receives the email and does not need to be authenticated with Active Directory or SSO. The only verification is the email address, and the assumption is that the email address is sent to the correct user and the user’s email has not been compromised. The user can forward their specific email invitation to another user so after the Client installation, there are now two users registered as the same user. The recommendation here is to only use the email invitation deployment for small solutions or for a proof of concept to show what Netskope can do. 2024 © Netskope. All Rights Reserved. 44 Netskope Security Cloud Operation and Administration 452024 © Netskope. All Rights Reserved. Client Deployment via Email Invitation (2 of 3) Settings > Security Cloud Platform > Netskope Client > Users Users are added in Settings > Security Cloud Platform > Netskope Client > Users. Once the email invitation is configured, select the users, and click Send Invitation to send the email. There will be a popup message asking do you really want to send the emails with Client invitations to the selected users. 2024 © Netskope. All Rights Reserved. 45 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 46 Client Deployment via Email Invitation (3 of 3) Customize the email invitation: • Email address of the end-user • Email address of the tenant admin • Name of the company • URL download links for the different OSs • The URL to go to resume earlier activity To customize the email invitation template, go to Settings > Tools > Templates. The templates use HTML and the built-in variables to replace message links. Click on Insert Variable and insert the options listed to include in the email invitation. =========================================== Mac Client: {{NS_MACADDON}} Windows Client: {{NS_WINADDON}} iOS Profile: {{NS_IOSPROFILE}} Android Client: {{NS_ANDROIDCLIENT}} 2024 © Netskope. All Rights Reserved. 46 Netskope Security Cloud Operation and Administration 47 • Generic MSI is distributed (SCCM, LANDesk, …) • Once user logs in – SCCM instructs Windows to execute the installer with parameters – Package will get the UPN and download nsbranding.json to complete the installation process • Client fetches ‘certs & config files’ from the add-on manager • Client uses the certs to authenticate with the Netskope Gateway • Check the online help for deployment details • Prerequisite Components – Netskope Directory Importer – Netskope Client pre-processing package (MSI file) 2024 © Netskope. All RightsReserved. Client Deployment Using SCCM You can use most any system that can deploy MSI software packages in a Windows environment to deploy the Netskope Client. One method is SCCM (System Center Configuration Manager) with Active Directory. If you use SCCM with a directory service like Active Directory, you will need to also install the Netskope Directory Importer. Directory Importer is installed on any domain member (but not on an end user’s computer) and used to export the user information in Directory Services like Active Directory to the Netskope tenant database. Directory Importer reads the user information and group information from the Domain Controllers (DC) in the network and exports the information to the provisioner. Directory Importer monitors the addition, modification and deletion of user information in the Directory Servers and updates the information to Netskope Cloud. The MSI file used for SCCM is different than the MSI file used in the email invitation. The MSI file used for SCCM is not tied to any specific user identity. =================================================== Directory Importer monitors the following attributes of the user accounts: • User First Name • User Last Name • email ID • UserPrincipalName • OU information of the user • Set of Group Names user account is part of - This includes only the groups configured in the group filter or all groups the user is part of, if the group filter is left empty. Similarly, the following attributes of the groups are monitored: • Group Name • Canonical name In Windows Active Directory, a User Principal Name (UPN) is the name of a system user in an email address format. A UPN (for example: john.doe@domain.com) consists of the user name (logon name), separator (the @ symbol), and domain name (UPN suffix). 2024 © Netskope. All Rights Reserved. 47 Netskope Security Cloud Operation and Administration The branding file is required to bootstrap the Client. This file is downloaded during Client provisioning when the Client is installed for first time on the end user's machine. Future client updates will not change the contents of this file. On a Windows system, this file is installed in: %ProgramData%\Netskope\STAgent. On a Mac system, this file is installed in: /Library/Application Support/Netskope/STAgent folder. 2024 © Netskope. All Rights Reserved. 47 Netskope Security Cloud Operation and Administration 48 • Create a source distribution folder • Create a distribution package • Create installer • Specify Run with Admin privileges • Distribute package to endpoints • Create advertisement to install on all client machines • Install command example: 2024 © Netskope. All Rights Reserved. SCCM – Create Installer Package msiexec /I NSClient.msi token= host=addon‐ [.region].goskope.com [mode=peruserconfig [userconfiglocation=]] [autoupdate=on|off] [/l*v %PUBLIC%nscinstall.log] At a high level, to create the installer package, download the MSI file and insert into the software distribution system you are using. The steps listed here are specific to using SCCM to create and distribute the MSI file for installing the Netskope Client on a Windows operating system. First create a source distribution folder and the distribution package. Create the installer with the MSI file and run it with admin privileges. Then distribute the package to users’ systems. The generic format of MSIEXEC command to install the Client is shown here. Highlighted in blue are required parameters, and the parameters in black are optional, depending on the deployment mode used in your script. Check the Notes section for details about the parameters of this command. ============================================== Command parameters: The msiexec /I is the windows command used to mass deploy the Netskope Client (MSI packages) on Windows devices. The NSClient.msi is the MSI file downloaded from Netskope. The token is the token specific from your Netskope tenant and the host is the Netskope tenant to connect to download all the configuration files. The syntax here should be addon plus the full tenant URL. (Example: host=addon-academy-central.goskope.com) Optional parameters: • mode=peruserconfig: Use this option for installing in a multi-user system. Don’t specify a user mode if you want to use single user mode/config. • Userconfiglocation=: Specifies the user-specific directory used for storing the user configuration. This is recommended to be used only for the multi-user environment. By default, the path is: %AppData%NetskopeSTAgent. • autoupdate=on|off: This option tells the Windows OS to allow the Netskope Client to auto update during the installation. This option tells the Netskope client to allow auto updates. If the autoupdate is turned on, the Netskope tenant will automatically send out Client updates to the Netskope Client. • /l*v %PUBLIC%nscinstall.log: Specifies where to store the installation log. 2024 © Netskope. All Rights Reserved. 48 Netskope Security Cloud Operation and Administration 49 • Installing the Netskope Client on a macOS using JAMF requires the following downloads to the JAMF server – User configuration script: jamfnsclientconfig.sh – Netskope Client installer: NSClient.pkg – Post-install script: jampfpostinstallScript.sh • Modes of Deployment – Single-User mode: email-based (via UI or Directory Importer) – UPN mode: (requires Directory Importer) – Multi-user mode: (requires Directory Importer) 2024 © Netskope. All Rights Reserved. Client Deployment Using JAMF (macOS) One method to install the Netskope Client on macOS systems is using JAMF, which requires downloading the user configuration script, the Netskope Client installer, and the post-install script to the JAMF server. You can install the Netskope Client on macOS systems using single-user mode by email invitation, UPN mode that requires the Netskope Directory Importer, or multi-user mode also requiring Directory importer. =============================================================== JAMF: An enterprise mobility management tool that is used for endpoint management of macOS devices. For detailed information using JAMF to deploy the Netskope Client: https://docs.netskope.com/en/netskope-help/netskope-client/netskope-client-deployment-options/jamf/ The Netskope Adapters enable running various features that can integrate with your Active Directory and other directory services to collect user and user activity information. The Netskope Adapters provide three tools: • Directory Importer: Connects to a domain controller (DC) and periodically fetches user and group information from the DC and posts that info to your tenant instance in the Netskope cloud. • AD Connector: Connects to the DC and periodically fetches user login events, extracts the User to IP mapping, and posts that info to Secure Forwarder (deprecated) • DNS Connector: Integrates with a DNS server to populate the forwarding zones. To download the NSAdapters.msi package, go to your Netskope tenant and navigate to Settings > Tools > Directory Tools > On-Prem Integration and click on the Download Tools button. 2024 © Netskope. All Rights Reserved. 49 Netskope Security Cloud Operation and Administration Install the Client for a Multi-User System 50 For multi-user systems, the Client is installed with the peruserconfig parameter. For every AD user, a new branding file is installed so all the AD users are uniquely identified by Netskope. The Client tunnels the traffic only from the AD users. Since the branding file is not installed for local users, traffic from local users is not tunneled in this case. The Client operates as follows for multi-user systems: • AD User A logs into the PC for the first time after the installation. Branding information file is not available for the user for the first login. The Netskope Client installer identifies the logged-on user and uses the APIto download the configuration file. After the first download whenever User A logs in, the configuration file is already available and is used. • AD User B logs into the same PC. Branding information file is not available for User B. The Netskope Client installer will identify the logged-on user and downloads the configuration file for the user. • Local User C logs into the same PC. In this case, we cannot fetch the branding file and the Client will remain disabled. 2024 © Netskope. All Rights Reserved. This goes into more detail about using the peruserconfig parameter for multi-user systems. When the Netskope Client is installed with the peruserconfig parameter, it allows authenticated users to be uniquely identified by Netskope. For example, Bob logs into the PC for the first time after the Netskope Client installation. The Netskope Client installer identifies Bob as a legitimate user and uses the API to download the configuration file specific for Bob. After Bob is done with using the PC, Jill logs in to that same PC. There is no branding information file, but the Netskope Client installer identifies Jill also as a legitimate user and downloads the configuration file for Jill. If Tim comes along and logs into the same PC but as a local user and not an authenticated user, the Client will remain disabled and not steer any traffic. 2024 © Netskope. All Rights Reserved. 50 Netskope Security Cloud Operation and Administration 51 • Netskope apps / profiles can be pushed automatically using MDM to managed mobile devices • Supported platforms: – MobileIron (Core / Cloud) – VMware AirWatch – Citrix XenMobile – Microsoft Intune – IBM MaaS360 • Check the online help for deployment details 2024 © Netskope. All Rights Reserved. App Deployment - using an MDM solution The Netskope app or mobile profile can be pushed out automatically using Mobile Device Management (MDM) to manage mobile devices. Check out the online help for deployment details about the supported platforms listed here. =================================================================== Installing via MDM on Apple mobile devices Up to macOS 10.13.3, Apple made special consideration for software being deployed via MDM tools so that if the software is being deployed to enrolled devices, it will not require user approval to load any third-party kernel extensions. However, from macOS version 10.13.4 onwards, this consideration has been removed. This leads to two scenarios: • If the Netskope Client was installed on macOS 10.13.3 or earlier using JAMF, the user would not have been prompted to approve the kernel extension. However, when upgraded to 10.13.4, the Netskope Client would remain in disabled state until the user manually approves the kernel extension. • If the Netskope Client is installed on macOS 10.13.4, the user would need to manually approve the kernel extension. Subsequent macOS upgrades will not require approval. 2024 © Netskope. All Rights Reserved. 51 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 52 MDM Distributions Settings > Security Cloud Platform > Netskope Client > MDM Distribution You can also go to Settings > Security Cloud Platform > Netskope Client >MDM Distribution for the different MDM deployments with links to detailed instructions on docs.netskope.com. 2024 © Netskope. All Rights Reserved. 52 Netskope Security Cloud Operation and Administration 53 • SCIM can be used to provision the users onto the Tenant • User authenticates to the app via a SSO broker, app gets pushed before the user gets authorized • Supported SSO solutions: – Okta: source IP based enforcement (SAML) – OneLogin: source IP based enforcement (SAML) – Ping: custom connector (Multi-Factor Authentication) – ADFS Proxy: Endpoint URL or PowerShell Re-direct 2024 © Netskope. All Rights Reserved. Client Provisioning - via SSO App Enforcement To deploy the Netskope Client using Okta (SSO broker), the basic steps are: • Create an admin account with access to the Okta admin console. • Create a SCIM 2.0 app in the Okta admin console. • Configure a Netskope SCIM app with sign-on and user-attribute options. • Assign users to the Netskope SCIM app. You will need the SCIM URL from the Tenant. Log in to your Netskope cloud account and go to Settings > Tools > Directory Tools. In the Directory Tools page, select the SCIM Integration tab to get the SCIM Server URL. 2024 © Netskope. All Rights Reserved. 53 Netskope Security Cloud Operation and Administration 54 • If a user manually disables the Netskope Client – Rebooting the machine will not re-enable the Client – It must be enabled via the Admin Console or manually by the user • Switching between stacks/tenants should not be done on an existing install – Always uninstall and re-install the client instead of “upgrading” the client • The client will disable itself if the Netskope tenant is not available (Fail Open) – This is also the case for the short interruptions during upgrades • The client will always use/reconnect over the most optimal network interface • Manually killed client services will restart automatically 2024 © Netskope. All Rights Reserved. Netskope Client – Remarks Here are some closing remarks regarding the Netskope Client. If a user is allowed to disable the Netskope Client, rebooting the system will not re-enable the Client. The user must manually enable it again or a Tenant Admin can enable it via the Admin Console. It is highly recommended if you need a Netskope Client to switch to a different Tenant, always uninstall and reinstall the Client to do this. The Netskope Client will disable itself if the Netskope Tenant is not available (Fail Open). The Netskope Client will always reconnect over the most optimal network interface. Manually killed client services will restart automatically. 2024 © Netskope. All Rights Reserved. 54 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 55 Netskope Client Time Checks DescriptionFrequencyCheck-in Type Enabling or disabling of client, first-login one time retrieval of “branding file” On-demandOperational This interval is also used to do administrative tasks such as sending a Disable command (if done so by the admin) or collecting logs for supportability 5 minutesAdministrative Every client will reach out to their respective Netskope tenant once every 60 minutes to check if there has been a configuration update. 60 minutesConfig check Netskope provides a convenient feature for customers that are not already using an Enterprise software management tool. With this functionality, every client will reach out to the Netskope cloud service to determine if there is a new client software version available. 4 hoursAuto-update check Note: Customers will still need to establish a strategy for the initial rollout of the Netskope client. This table shows the Netskope Client time checks. • The Client checks every 60 minutes for configuration file changes • The Client checks every 4 hours for version changes • For large deployments, it is recommended to disable auto upgrade • Smaller deployments are easier to manage using auto upgrade • We recommend to stay on a Golden Release version for production environments. 2024 © Netskope. All Rights Reserved. 55 Netskope Security Cloud Operation and Administration Lab B: Netskope Client Time: 60 minutes 562024 © Netskope. All Rights Reserved. This chapter includes a lab to practice some of the concepts you learned about. 2024 © Netskope. All Rights Reserved. 56 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Threat Protection Netskope Security Cloud Operation and Administration Welcome to the Netskope Threat Protection chapter, in our Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope SecurityCloud Operation and Administration 2 • Explain the Netskope Threat Protection feature • Configure Threat Protection for Real-time Protection • Configure Threat Protection for API-enabled Protection 2024 © Netskope. All Rights Reserved. Objectives The objectives of this chapter are to explain the Netskope Threat Protection feature and how to configure different aspects of threat protection for real-time and API-enabled protection. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration Threat Protection 3 • Overview of Netskope Threat Protection • Configure Threat Protection for Real-time Protection • Configure Patient Zero Protection • Configure Threat Protection for API-enabled Protection • Integration with third-party solutions • Intrusion Prevention System (IPS) • Configure User and Entity Behavior Analytics (UEBA) 2024 © Netskope. All Rights Reserved. Let’s look at an overview of Netskope Threat Protection. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration Threat Protection – Standard vs Advanced 4 Standard Threat Protection • Anti-malware • Intrusion Prevention System (IPS) • True file type detection • Over 40 threat intelligence feeds • Cloud-enabled threat research from Netskope Threat Labs • Custom allow lists and block lists • De-obfuscation and recursive file unpacking to sandbox Portable Executable (PE) files • Sequential anomaly rules to detect; bulk uploads, downloads, deletes, rare events, failed logins, risky countries, proximity, and data exfiltration between company and personal instances Advanced Threat Protection • De-obfuscation and recursive file unpacking of over 350 families of installers, packers, and compressors • Pre-execution analysis and heuristics for over 3,500 file format families using over 3,000 static binary threat indicators • Bare-metal sandboxing to over 30 file types for analysis the ability to use behavioral analysis to defeat evasive techniques • Netskope Threat Labs manages multiple machine learning (ML) models for threat detection • Third party sandboxing for secondary threat analysis, plus proxy chaining to remote browser isolation (RBI) solutions • Patient Zero protection 2024 © Netskope. All Rights Reserved. Netskope provides two levels of threat protection: Standard and Advanced. Standard Threat Protection includes the following features: • An anti-malware engine applied to all files capable of delivering harm, based on the true file type detection. • Detection of hash and URL-based indicators of compromise, based on the Netskope Threat Lab own research, over 40 additional threat intelligence feeds, and custom URL and hash lists. • A machine learning (or ML) classifier, that scans Portable Executable (or PE) files, which is the executable file format for Windows and is the most common type of malicious files. • An ML classifier for detecting previously unknown phishing domains and web sites. • A web IPS engine that scans traffic directed to the user’s device for indicators of network-based attacks. • Standard sandboxing to corroborate anti-malware and machine learning detections. • Bidirectional threat intel sharing with EDR, SIEM, SOAR, and other types of solutions via the Netskope Cloud Threat Exchange platform. Standard Threat Protection is often bundled with Standard UEBA or behavior analytics. Standard Behavior Analytics can detect bulk uploads, downloads, and deletes; failed logins; simultaneous or nearly simultaneous logins from far away locations; data exfiltration between company and personal instances; and other unusual and rare events based on the configured rules. Advanced Threat Protection includes everything from Standard Threat Protection and additionally applies many more sophisticated engines to detect zero-day threats and provide a more detailed detection report. These advanced engines include: • Additional anti-malware engines, including the YARA engine with signatures developed by Netskope Threat Lab. • Pre-execution heuristic analysis for over 3,500 file format families using over 3,000 static binary threat indicators. • Cloud sandboxing for over 30 file types and bare-metal sandboxing for second verdicts. • Recursive unpacking and de-obfuscation of over 350 families of installers, packers, and compressors. • ML classifier for detecting malicious executables, PDFs, Microsoft Office files, and malicious URLs in files. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration • Patient Zero alerts when a threat is missed by the standard threat protection engines but detected by the advanced threat protection. • Patient Zero protection when a file is held until the final verdict from the advanced threat protection is produced. The following slides will discuss all these features in more detail. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 5 Threat Protection Bundle Comparison Advanced Threat ProtectionStandard Threat ProtectionThreat Protection Capabilities ✓✓AV ✓✓Threat Intelligence ✓✓Custom Allowlist/Blocklist ✓✓Advanced Heuristic Analysis ✓✓Cloud Sandbox ✓✗Ransomware Encrypted File Detection ✓✗Third-party Sandbox Integrations ✓✗Patient Zero protection ✓✓Third-party EDR Integrations ✓✓Export Netskope detections (file hashes) ✓✓Import Intel (hashes) into Netskope Here is a comparison chart between what is provided in Standard Threat Protection versus Advanced Threat Protection. Standard Threat Protection includes a set of static engines whose purpose is to detect known malware via signatures or static machine learning classifiers. The standard threat protection includes: • An OEM antivirus engine. • A proprietary machine learning classifier for Portable Executables. • The Netskope Threat Intelligence (a combination of feeds, research by Netskope Labs, and the Indicators of Compromise derived from the malware detected via the Advanced Threat Protection). • Standard sandboxing to provide additional corroboration by the Advanced Threat Protection engines for a detection made by the above Standard Threat Protection engines. The purpose of standard sandboxing is to provide more evidence for a positive detection rather than augmenting the detection capabilities. Advanced Threat Protection, on the contrary, augments the detection capabilities, by extending heuristic analysis, machine learning classifiers, and sandboxing to more file types, and by applying more, and more sophisticated static analysis engines. Advanced Threat Protection also provides more detailed reports, including forensics data derived from heuristic and sandbox analysis. And on top of that, Advanced Threat Protection has patient zero alerts and patient zero protection features and provides APIs for retrospective hash queries and for submitting portable executables to the sandboxing engine. For all these advanced features, the Advanced Threat Protection license is required, which is a part of enterprise- level bundles or can be purchased as an add-on. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 6 All-mode Threat Protection Risk Insights Identify malicious network activity Proprietary threat research Complemented by 40+ 3rd party feeds API-enabled Protection Scan Managed Cloud Applications Malware Scan Retroactive scanning Alert/Quarantine Real-time Protection Real-time Protection scanning for malicious files Full app protection Managed/Shadow Actions based on severity Allowlist / Blocklist Hash SHA / MD5 Threat protection is applied to the customer data across all the different data streams. At the Risk Insights or Discovery level, the threat detection is applied to the log data pulled in from proxies and firewalls and identifies maliciousURLs and IP addresses based on the various threat intel feeds that go into the engines. For the cloud application instances configured for API-enabled protection, the threat module provides introspection malware scanning, triggered by the user activities, as well as retroactive scanning to detect dormant threats. Available remediation actions will depend on the application and are determined by the application’s vendor and what is supported by their APIs. Besides alerting, these actions often include the ability to quarantine the malicious file. And for the traffic steered to the Netskope, thread protection is applied inline in real-time and allows blocking the threats for all kinds of applications both managed and unmanaged before the malware has any chance to cause harm. Both API-enabled Protection and Real-time Protection support different actions based on the severity level of the detected threat. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 7 Allow/ Block File received Metadata and IOCs Deepscan Service – Advanced Threat Protection Malware Detection Architecture: Threat Detection Flow Customer traffic (Data in Motion) or Customer data (Data at Rest) API/ Introspection Pre-execution & heuristics analysis THREAT SCANNING SERVICE regular updates Inline Fastscan Service Hash blocklists Tenant portal/UI Third parties Cloud Exchange Alert/ Quarantine Advanced Malware Analysis Engines Admin Event service AV engines, TFT Phishing ML classifier Domain, URL, web filtering IPS/ RBI Local allowlist/ blocklist ML classifiers (PE and doc malware) Malicious URL lookup Yara + additional AV engines Cloud sandbox Bare-metal sandbox Advanced Sandbox Engines Malware alert Alert/Quarantine Malware alert Malware alert Allow/ Block Allow/ Block File received Browse API access PE ML classifiers The diagram explains the flow of information between the different engines and subsystems. Depending on the source of the customer’s data, different engines are involved. For data intercepted in the traffic, or data in motion, the first layer of defense is hosted in the Netskope inline proxy. At this level, domain, URL and web filtering is applied to block connections to malicious or suspicious websites based on predefined or custom categories. Netskope inline proxy can also apply an intrusion prevention system, or IPS, and Netskope’s proprietary remote browser isolation technology, or RBI, to further reduce the surface of attack. All of these features are discussed in detail later in the course. The inline proxy then extracts the payload from the traffic and sends it to the threat scanning service. The threat scanning service is divided into the fast scan service and the deep scan service which roughly correspond to the standard threat protection engines and additional advanced threat protection engines. The fast scan service applies the standard threat protection engines: true file type detection, an OEM anti-malware engine, machine learning classifier for portable executables, and threat intelligence for IOC detection. All these engines produce a verdict in a short time and this verdict is then used to evaluate policies and apply policy actions at the proxy level, which in this context really means blocking. In other words, the decision to block certain activity because it represents a malware threat is made by the proxy based on the verdicts provided in real-time by the fast scan service. The deep scan service hosts the engines of the advanced threat protection: advanced heuristics, additional anti- malware engines and machine learning classifiers, and most notably, two sandbox engines. These engines take longer time to produce a result and therefore are not used for applying real-time policy actions. They will produce alerts and malware incidents, that can trigger further responses. The alerts and incidents can be processed by the administrator in the Netskope tenant UI. They can also be accessed through API for automated processing or shared via Netskope Cloud Exchange with 3rd-party solutions such as EDR, MDR, SIEM, and SOAR. These integrations can be used to set up automated responses. Netskope Cloud Exchange can share data in the opposite direction and supply additional threat intelligence from third-party solutions in the form of URL and hash lists, that can then be used for URL filtering and hash filtering at the inline proxy level and by the fast scan service respectively. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration There is also a feedback loop between the deep scan service and fast scan service. When the deep scan service detects a malware for any tenant, the hash of this malware and associated domains and URLs are shared with the fast scan service. Tenants with advanced threat protection receive these hashes within 1 hour, whereas tenants with standard threat protection receive these hashes within 24 hours. Threat intelligence created or curated by the Netskope Threat Labs is updated much more often. Hash blocklist is updated every 15 minutes and the URL threat feed is partially updated every 10 minutes and fully synchronized once a day. If the data comes not from the traffic but rather from a cloud app connector, there would be no processing on the inline proxy level, and therefore no domain or URL filtering, no IPS, and no RBI. The files would be sent directly to the threat scanning service. However, because API protection is not real- time and is not time-constrained in the same way, policy actions will be applied based on both the fast scan and deep scan services verdicts. A malicious file will be quarantined even if it is detected only by a sandboxing engine. The following slides will discuss threat detection engines in more detail. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration 8 AI/ML classifiers in Fastscan service • PE file classifier analyses Portable Executable files to detect novel malware. • Phishing classifier analyzes URL structure and web page content to detect novel phishing pages. AI/ML classifiers in Deepscan service Office document classifier detects novel malware in various document formats. 2024 © Netskope. All Rights Reserved. SkopeAI Threat Protection Let’s start with the engines that are using artificial intelligence and machine learning. AI and ML technologies play an important role in threat protection. They are one of the best tools for detecting novel malware that is not yet covered by signatures or threat intelligence. Trained on vast collections of known malicious and benign files they can learn subtle differences that can help identify novel malware files and zero-day attacks. Netskope Threat Scanning Service employs a few pre-trained ML classifiers. Two of them are in the fast scan service: • A PE file classifier analyzes portable executable files to detect previously unseen malware in Windows executables and libraries. • A phishing classifier similarly analyzes web pages and their URLs to detect phishing content. Unlike other anti- phishing engines in the pipeline that are based on URL filtering and only need the web traffic to be steered to Netskope, phishing classifier analyzes HTML files that constitute the web page and as such needs a threat protection policy to send HTML files to the Threat Scanning Service. Another ML classifier in the deep scan service analyzes office documents of various formats and detects novel malware in them. These are just the models that are used directly in the Threat Scanning Service. Netskope uses many more AI/ML models to, among other things, produce threat intelligence and optimize data processing. 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration 9 • Web Security– Visited by user • Not Blocked • Severity • Category 2024 © Netskope. All Rights Reserved. Malicious Sites Incidents Let’s now look at URL filtering that happens before any file analysis takes place. To find detected malicious web sites, use the side menu of the tenant UI to navigate to Incidents and then to Malicious Sites. There are very little pre-requisites for this kind of detection. As long as the organization has at least the Standard Threat Protection license and steers traffic to the New Edge, the Netskope Web Security will scan the traffic and detect malicious domains, URLs and IPs. There’s no need to create a policy or a threat protection profile to enable malicious sites alerts. You do need to create a policy to block malicious sites, though. This will be covered in the Web Security chapter. Some sites can also be blocked by the IPS feature that is discussed later in this chapter. The malicious sites page shows the primary metrics in the panels on top, and a table with more specific information below. The search field above the primary metrics allows you to filter the malicious sites shown on the page by entering keywords. The metrics shown at the top of the page include the following: • Under Sites Allowed, you will find the number of web sites that your users visited and were not blocked. • Under Total Malicious Sites, the total number of malicious sites that users have visited. • And under Users Allowed, the total number of users not blocked from visiting a malicious site. The table below for each detected malicious site shows these details: • Under Threat Match Value, the pattern used to detect the malicious web site. • Under Severity, the severity rating for the malicious site: Critical, High, Medium, or Low. • Under Category, the type of malicious site detected: for example, a phishing site. • Under Users Count, how many users tried to visit the malicious site. • And under Site Destination, the country that the malicious site is hosted in. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration 10 • Users Affected • Malware Detected • Total Incidents • Severity categories: – High – Medium – Low • Detection Date • and more… • Drill down to view comprehensive details 2024 © Netskope. All Rights Reserved. Malware Incidents Incidents > Malware In a similar way, you can find detected malicious files by using the side menu to navigate to Incidents and then to Malware. These detections won’t appear unless you have a policy with a threat protection profile or unless you have enabled threat protection for SaaS instances configured for classic API-enabled protection. We will cover both configurations later in this chapter. In the Malware section, you can find the overall detection statistics and a table of all detected malware that also leads to more details. The overall statistics shows, how many different types of malware were detected, how many incidents were created as a result, and how many users were affected. The table below lists all detected files indexed by their hash. If there were several files with the same hash but different names, the File Name column of the table will list all file names. This table also includes the names of the engines that produced a positive verdict, the names of the detected malware combined from all the engines, the severity level of the malware and other details. You can select which columns are visible in the table by clicking the gear-shaped icon in the upper-right corner of the table. Clicking on the file name in the table opens a new page which reveals detection details for the file from each of the detection engines: anti-malware, threat intelligence, heuristics, and sandbox. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration 11 • Signature-less malware detection • Static analysis without file execution • Scans binary files to identify indicators of malicious activity and analyses files against 3,000+ threat indicators • Decomposes, unpacks, and de-obfuscates files to extract all objects for analysis 2024 © Netskope. All Rights Reserved. Advanced Heuristic Analysis Incidents > Malware > [file name] Let’s look more closely at the Advanced Heuristic Analysis. Attackers are increasingly using layers of obfuscation and packing, to evade conventional detection and analysis tools. Netskope recursively unpacks files and extracts internal objects, to make them fully available for analysis. Advanced Heuristic Analysis of binary files performs a deep analysis of the file components without executing the file. This pre-execution analysis identifies over 3000 threat indicators across a wide range of file types, including Windows, Mac OS, Linux, iOS, and Android, and supports over 3500 file format families. To use advanced heuristic analysis, an advanced threat protection license is required. The Advanced Heuristic Analysis page shows the following information: • File Details shows certificate information for files that have a digital signature. And for container files, it shows how many files there are in the container and how many of them are malicious. • Network References lists all the URLs identified in the file body. • Key Capabilities shows what the malware can do in general terms. • And Indicators lists more concrete behaviors or artifacts related to the key capabilities. Importantly, the indicators are identified by a static analysis which does not involve file execution. The heuristic analysis can show that the file contains code to perform certain actions but does not show how these actions relate to each other or in what order they are executed or if they are executed at all. To understand how the file behaves requires a dynamic analysis in a sandbox. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration 12 • Detonates files in controlled, sandbox environment • Monitors for wide range of malicious behavior • Immune to common sandbox evasion techniques • Built on Netskope’s high performance, cloud-scale security platform to enable advanced threat protection at scale 2024 © Netskope. All Rights Reserved. Dynamic Sandbox Analysis Sandboxing is a kind of behavioral analysis and is a key technology for security teams to detect advanced threats. By detonating suspicious files, also called samples, in a controlled, sandbox environment, the detection engine can observe and log the file behavior and then analyze these logs for patterns of malicious activity. Netskope's cloud-based dynamic sandbox analysis engine is effective against malware evasion techniques and is built on Netskope's high-performance, cloud-scale security platform. To use cloud sandbox analysis, an advanced threat protection license is required. To view the Cloud Sandbox Analysis, go to Incidents, and then to Malware. Click on an item on the Malware page, which opens a page with details about the malware. In the File Name column, click on the file name, which opens the detailed detection report page. The Netskope Cloud Sandbox section of this page shows the following: • Under Observed Behavior, the detonated file activity observed in the sandbox grouped by the type of activity. • Under Screenshots, what appeared on the virtual machine’s monitor during the detonation process. Some of the screenshots may catch benign behavior, but others may provide important insights. • Under Processes Monitored, you will find the entire flow of what occurred when the analyzed sample was running. • Under Sandbox Files Dropped, there’s a list of file names and hashes of the files appeared in the sandbox during the sample execution. • And under Accessed Hosts, there’s a list and the geolocation map of the hosts accessed by the detonated sample. The details include the host name, IP address, country and protocol. 2024 © Netskope. All Rights Reserved.12 Netskope Security Cloud Operation and Administration • Integration with endpoint detection and response (EDR) solutions: – CrowdStrike Falcon – Carbon Black • Integration with advanced threat detection solutions: – Palo Alto Networks Wildfire – Check Point SandBlast – Juniper SkyATP • Netskope Cloud Exchange • Netskope REST API 132024 © Netskope. All Rights Reserved. Netskope Integration capabilities Besides the detection engines and policy actions provided by Netskope directly, you can integrate your Netskope solution with third-party solutions to take advantage of additional detections, actions, and analysis tools that those solutions can provide. Integration scenarios are mostly outside the scope of this training. To learn about how to integrate your Netskope solution with third-party applications for the purposes of using those application capabilities to extend and enhance the Netskope solution, you should sign up for the Netskope Security Cloud Implementation and Integration class. That said, in this section we will provide an overview of various integration options that can be used with Netskope Threat Protection. Some of these options may be available in your Netskope tenant UI, depending on your license and the tenant backend settings. Two of the solutions you can integrate with from your tenant UI, from Carbon Black and CrowdStrike, belong to the endpoint detection and response, or EDR, category. EDR solutions typically have an endpoint agent that monitors all activity on the computer, the collected telemetry data is then used for automated and human-powered threat hunting, and the endpoint agent then is used for various response measures: from fetching files for deeper analysis, to killing processes and deleting files, to blocking files network connections and more. By integrating with EDR solutions, Netskope can initiate endpoint responses following a threat detection in the traffic or in a cloud app. The other three solutions in the Netskope tenant UI, from Juniper, Check Point, and Palo Alto Networks, belong to advanced threat detection. These are basically third-party sandboxing solutions that can provide a second look at suspicious files. Netskope Threat Scan Service can send either all or only a subset of files to these services and add their verdicts into the alerts. Integrating with EDR solutions, among other things mentioned above, lets Netskope share its detections as indicators of compromise. This in turn lets the EDR agents block threats on the endpoints, where Netskope cloud platform can’t reach. The same result can be achieved for a much broader range of third-party solutions by using Netskope Cloud Exchange, an appliance that can be deployed in the cloud or on premises and that can share threat intelligence bidirectionally between Netskope and SIEM, SOAR, EDR and other solutions that can either provide their own threat intelligence feeds or can benefit from injecting threat intelligence from the Netskope tenant. 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration Under the hood, Netskope Cloud Exchange interacts with the Netskope tenant using Netskope REST API. These can be used directly to support custom integration scenarios. In this training, we do not cover either Netskope Cloud Exchange or REST API. To learn more, sign up for the Netskope Security Cloud Implementation and Integration class. 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration Threat Protection 14 • Overview of Netskope Threat Protection • Configure Threat Protection for Real-time Protection • Configure Patient Zero Protection • Configure Threat Protection for API-enabled Protection • Integration with third-party solutions • Intrusion Prevention System (IPS) • Configure User and Entity Behavior Analytics (UEBA) 2024 © Netskope. All Rights Reserved. Let’s now look at how to configure threat protection for inline traffic, also called real-time threat protection. 2024 © Netskope. All Rights Reserved. 14 Netskope Security Cloud Operation and Administration Configure Real-time Protection Policy 15 • Source and destination • Threat protection profile • Action and notification template • Remediation Profile (EDR) 2024 © Netskope. All Rights Reserved. Policies > Real-time Protection To apply threat scanning service to the steered traffic, all you need is a real-time protection policy with a threat protection profile added. As long as your tenant has the threat protection functionality enabled, it will have a predefined threat protection profile called Default Malware Scan that you can use in the policies out of the box. You can also create custom threat protection profiles and we will cover this shortly. To create a threat protection policy, follow the steps below: 1. In the tenant UI, navigate to Policies and then to Real-time Protection. 2. Click Add policy and select Threat Protection from the drop-down menu. This will automatically add the field to select a threat protection profile to the policy settings. Alternatively, you can select a Cloud App Access policy or a Web Access policy and then use the Add profile option in the Profile & Action section of the policy settings to add a threat protection profile to your policy. 3. Select source and destination conditions. The best practice is to apply threat protection to all traffic. This can be achieved by a combination of two settings. First, in the Source section of the policy, set the User parameter equal to All Users. Then, in the Destination section, selecting Category from the drop-down list of destination types, and after that select All categories. 4. In the Activities field, add Download and Upload. 5. In the Threat Protection Profile field, select a predefined or a custom threat protection profile. 6. For each of low, medium, and high threat severity levels, select the action. The available action choices may depend on other settings in the tenant, but the best practice for a global threat protection policy is to set Action to Block for all severity levels. When you select the Block action, you should select the template for the blocking message the user will see. There is a default template out of the box, but you can create a custom template to better explain to the user what’s going on. There is also an option to select a remediation profile for each severity level. This refers to remediation via the 3rd- party EDR integration and we will cover this feature later in the chapter. Finally, name and save your policy. You will then be asked where to put it in the policy list. The best practice is to put threat protection policies at the top, before any other kind of processing and control could be applied. You don’t 2024 © Netskope. All Rights Reserved. 15 Netskope Security Cloud Operation and Administration want to analyze malicious files for DLP violations, you just want to block them regardless of who accesses them. That said, the threat protection policy should not necessarily be the very top policy. For example, utility policies, such as a policy to block DNS over HTTPS, should go before any other policies. You will find more best practices throughout this course. 2024 © Netskope. All Rights Reserved. 15 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 16 Real-time Protection Threat Protection Profile Policies > Profiles > Threat Protection The predefined threat protection profile simply applies all appropriate Netskope scanning engines to the analyzed data. This profile cannot be changed. In a custom profile you can add block lists to augment detection or an allow list to exclude certain files from scanning. A block list, for example, can be a result of IoC sharing from a third-party solution via Netskope Cloud Threat Exchange appliance. To create a custom threat protection profile, follow thesesteps: 1. Select Policies from the main menu, then select Threat Protection in the Profiles section of the menu. 2. Under Malware Detection Profiles, click New Malware Detection Profile. 3. Under Threat Scan, just click Next. This step shows you the the selected file scanner which cannot be changed. 4. Under Allowlist, select zero or more preconfigured file profiles with scan exclusions. 5. Under Blocklist, select zero or more preconfigured file profiles with additional files to block. 6. Under Set profile, give your profile a name. Once you create a custom threat protection profile, you can use it in your real-time protection policies and next gen API protection policies. You may have noticed, that in order to customize a threat protection profile you need to have a preconfigured file profile to act as a block list or an allow list. Next, we will cover, how to configure such a file profile. 2024 © Netskope. All Rights Reserved. 16 Netskope Security Cloud Operation and Administration File Hash List 17 • Used for Allowlist / Blocklist • MD5 and SHA256 Support • Upload via CSV • Add manually one hash per line • Use API – https://.goskope.com/api/v1/updateFileHashList 2024 © Netskope. All Rights Reserved. Policies > Profiles > File > New File Profile File profiles are not exclusive to threat protection, they can also be used for DLP purposes to restrict the scope of files undergoing DLP analysis. For the purposes of threat protection, the standard practice is to base block lists and allow lists on file hashes. There are other conditions you can use in a file profile, such as file name or extension, file type, and file size, but in general, they are not precise enough to be useful for threat scanning, neither as exclusions, nor as additional indicators of compromise. Netskope file profiles support the most commonly-used types of file hashes: MD5 and SHA256. You can either copy and paste them into the list, upload from a CSV file or use API to automate adding hashes into a file profile from some external source. And if automation is your goal, there’s an even better way to ingest third-party threat intelligence into your tenant, and it is by using Netskope Cloud Exchange appliance. We don’t cover Netskope Cloud Exchange in this course. If you’re interested, you should attend our Netskope Security Cloud Integration and Implementation training. For the purposes of threat protection, block lists are typically used for ingesting 3rd-party threat intelligence and are usually populated automatically. Allow lists, on the other hand, are mostly used to exclude false positives, benign files that are detected as malicious. As such they are more typically populated manually. A security analyst would start from a malware alert or a malware incident in the Netskope tenant, copy the file hash from the incident details and add it to the file profile acting as an allow list. This should be a temporary measure, though. If you believe that Netskope falsely blocks a benign file, create a support ticket and use an allow list only for mitigating the issue until the ticket is resolved. 2024 © Netskope. All Rights Reserved. 17 Netskope Security Cloud Operation and Administration Threat Protection 18 • Overview of Netskope Threat Protection • Configure Threat Protection for Real-time Protection • Configure Patient Zero Protection • Configure Threat Protection for API-enabled Protection • Integration with third-party solutions • Intrusion Prevention System (IPS) • Configure User and Entity Behavior Analytics (UEBA) 2024 © Netskope. All Rights Reserved. Next, we will discuss protection against zero-day threats which is directly related to real-time threat protection. 2024 © Netskope. All Rights Reserved. 18 Netskope Security Cloud Operation and Administration 19 • Patient Zero protection includes Patient Zero alerts and Patient Zero prevention policies. • Patient Zero alerts are raised when the fast scan hasn’t detected a threat, but the deep scan has. • Patient Zero prevention is a feature of real-time protection policies that: – Guards against unknown threats by blocking downloads/uploads of previously unseen files until a “benign” verdict from the deep scan has been returned. – Is recommended primarily for high-risk cases (risky file types, users, applications, and locations; unknown web sites). 2024 © Netskope. All Rights Reserved. What is Patient Zero protection? Patient zero is the user who becomes the first victim of a novel malware or other kind of threat. Even though sometimes a new malware can be detected through its similarity to previously known malware, or through obvious indicators of malicious behavior, that’s not always the case. However, even though zero-day threats are inevitable, there are ways to mitigate risks associated with them. Netskope Patient Zero protection has two aspects. There are Patient Zero alerts which don’t require any special configuration beyond having a threat protection policy. These alerts are raised automatically every time the fast scan service doesn’t detect a file as malicious, and the deep scan service does. The deep scan service is much better equipped to detect zero-day threats and targeted attacks by using advanced heuristics and sandboxing. But these advanced engines take time and are not used for policy actions to avoid creating delays across the board. They inform about zero-day threats after the fact with alerts. You can only get Patient Zero alerts if you have Advanced Threat Protection. Patient Zero prevention is a feature that can be enabled in a real-time threat protection policy. Patient Zero prevention guards your organization against unknown threats that have not yet been detected by Netskope’s signature-based threat protection analysis. For example, if a user attempts to download a file that has never been analyzed by the Netskope’s fast scan service (and consequently does not yet have a file hash to identify it), Patient Zero prevention blocks the download until the file has been submitted to the deep scan service for more thorough analysis and a “benign” verdict has been returned for the file. After the deep scan determines that the file is safe, this verdict is communicated to the fast scan so that subsequent attempts to download the file will be allowed. Generally, the deep scan analysis can take up to 10 minutes, and the verdict will be communicated back to the fast scan within an hour for customers who have the Advanced Threat Protection license. For customers with the Standard Threat Protection license, hashes of new files that have been analyzed by the deep scan will be shared with the fast scan after 24 hours. Note that to use Patient Zero prevention, you may need to request enablement of this feature on your Netskope tenant. You don’t need any special accommodations for Patient Zero alerts. Netskope recommends that Patient Zero prevention be used with discretion, primarily for high-risk cases such as risky file types, risky users (that is, users with a low Behavior Analytics User Confidence Index), risky applications (that is, applications with a low Cloud Confidence Index score), risky locations, and unknown websites. 2024 © Netskope. All Rights Reserved. 19 Netskope Security Cloud Operation and Administration 202024 © Netskope. All Rights Reserved. Patient Zero Protection: Process flow for “malicious” verdict Deepscan service (Advanced Threat Protection) Fastscan service (Standard Threat Protection) Advanced sandbox engines User attempts to download or upload file; file is sent to Fastscan No malware is detected, but file is unknown (i.e., no matching file hash) Malware is detected Standard block message is displayed SkopeIT alert is generated Upload/download is blocked; file is sent to Deepscan File hash is reported back to Fastscan File is sent to Deepscan for further analysis User attempts to downloador upload the same file later Let’s follow the flow of a file through threat protection pipeline in the presence of a patient zero prevention policy. When the file is intercepted in the traffic it is first of all analyzed by the policy engine. If the file matches the conditions of a threat protection policy, it is sent to the threat scanning service for analysis. The threat scanning service first sends the file to the Fast scan service and when the Fast scan service returns a verdict, reports this verdict to the policy engine. Up until this point there is no difference between how this works for a normal threat protection policy and for a policy with patient zero prevention. A policy action is always taken based on the verdict from the Fast scan service. Without patient zero prevention, a threat protection policy has two choices. If the file is detected as malicious, the configured policy actions is applied, which usually blocks the file in the traffic. If the file is not detected as malicious, the policy applies no action. The file may still be blocked by other policies, but as far as this policy is concerned, it is allowed. Now when the patient zero prevention option is enabled, the policy has not two, but three choices. Files detected as malicious are still blocked. Those detected as known benign files are allowed. And files, detected as neither, meaning they are not present in the global allow list, are blocked with a special notification to the user that the file is unknown and requires further analysis. Meanwhile, the threat scanning service sends the file for further scanning to the Deep scan service. Once the Deep scan produces a verdict, this verdict is propagated back to the Fast scan service via the global allow list and block list. And from that point on the file is no longer unknown. It is either a known malicious file and is blocked with the standard blocking message, or it is a known benign file and is allowed. If the Deep scan service finds the file malicious after the Fast scan service didn’t, a patient zero alert is raised. This happens regardless of whether patient zero prevention is enabled or not. The mismatch between the Fast scan and Deep scan verdicts is enough for alerting. 2024 © Netskope. All Rights Reserved. 20 Netskope Security Cloud Operation and Administration 212024 © Netskope. All Rights Reserved. Configuring a Patient Zero prevention policy (1 of 3) Select risky categories. Select activities. Add the File Type activity constraint. Policies > Real-time Protection > New Policy > Threat Protection 2 3 4 Select risky users or groups.1 Here’s how to create a Patient Zero prevention policy. Before planning to implement this type of policy, remember that patient zero prevention should be used judiciously, focusing only on the highest risk areas of your organization. Patient Zero prevention policies that are configured to be too broad can have a negative impact on user experience and can reduce productivity across your organization (for example by blocking harmless files that users need to do their jobs, such as downloading routine reports). To create a Patient Zero prevention policy, navigate to Policies and then to Real-time Protection, then click the New Policy drop-down menu and select Threat Protection. To configure the policy, follow these recommendations: 1. For Source, select risky users or groups. This is not something you have out of the box, but you can create and maintain a risky users group in the user directory that is synchronized with your tenant. Or, instead, you can add the User confidence source criterion and apply the policy to users whose confidence index is lower than certain threshold. We cover user confidence index in the user and entity behavior analysis section of this chapter. 2. For Destination, select those categories you consider highest risk for your organization. 3. For Destination, Activities, select the activities you want to protect (for example, Download and Upload). 4. Add the File Type activity constraint. 2024 © Netskope. All Rights Reserved. 21 Netskope Security Cloud Operation and Administration 222024 © Netskope. All Rights Reserved. Configuring a Patient Zero prevention policy (2 of 3) Limit file type selections to high-risk file types. 5 6 5. Once you’ve added the File Type constraint, under Activity Constraints, click Select File Type. 6. Select the types of files you want to analyze. Netskope recommends that you limit your selections to high-risk file types (such as, Binary and Executable, Spreadsheet, Word Processor, and File Type Not Detected). 2024 © Netskope. All Rights Reserved. 22 Netskope Security Cloud Operation and Administration 232024 © Netskope. All Rights Reserved. Configuring a Patient Zero prevention policy (3 of 3) 7 8 9 Select a threat protection profile. Set severity-based actions to Block. Select Block till benign verdict. 7. Select a threat protection profile. 8. Set severity-based actions to Block. 9. Select the option Block till benign verdict by dynamic threat analysis. This is the option that instructs Fast scan to block unknown files until Deep scan has returned a “benign” verdict. If you don’t see the Block till benign option, double-check that your policy has the following parameters: • Activities: Download, Upload, or both; • File Type constraint; • Block action for at least one of the severity levels. Finally, name and save your policy. When asked where to put the new policy in the policy list, make sure to put the patient zero prevention policy above all other threat protection policies. And no – a patient zero prevention policy can’t be your only threat protection policy because it doesn’t and shouldn’t cover all users, destinations, and files. You need a general threat protection policy that covers all users, categories, and files, besides the patient zero prevention policy. 2024 © Netskope. All Rights Reserved. 23 Netskope Security Cloud Operation and Administration 242024 © Netskope. All Rights Reserved. Example of a Patient Zero alert Here is an example of a Patient Zero alert that was generated when a user in the “Risky Users” group attempted to download an unknown file, and Deep scan returned a verdict that the file contained malware. Deep scan subsequently reported the file’s hash to Fast scan so the file will be immediately recognized as malware in the future and blocked by the Netskope with a standard block dialog displayed to the user. Note that Patient Zero alerts are generated whenever Deep scan detects malware in a previously unknown file. These alerts only require an Advanced Threat Protection license; they do not require enablement of the Patient Zero prevention feature on your tenant or the configuration of a Patient Zero prevention policy. If you want to do more than just receive alerts about zero-day threats, however, and you want to prevent users from downloading unknown files until Deep scan has returned a benign verdict, you must both request enablement of Patient Zero prevention on your tenant and configure a Patient Zero prevention policy. 2024 © Netskope. All Rights Reserved. 24 Netskope Security Cloud Operation and Administration Threat Protection 25 • Overview of Netskope Threat Protection • Configure Threat Protection for Real-time Protection • Configure Patient Zero Protection • Configure Threat Protection for API-enabled Protection • Integration with third-party solutions • Intrusion Prevention System (IPS) • Configure User and Entity Behavior Analytics (UEBA) 2024 © Netskope. All Rights Reserved. Next, let’s see how to configure threat protection for API-enabled protection. 2024 © Netskope. All Rights Reserved. 25 Netskope Security Cloud Operation and Administration 26 • Malware scan is enabled per application instance • Action settings are shared by all instances • No policies • No custom threat protection profilesThreat Protection Identify sensitive data in Cloud Storage Data at Rest Detect malware in Cloud Storage Private Access Secure and transparent access to private applications without needing to backhaul via traditional VPN API Inline Securing Data in the Public Cloud To secure data in the public cloud, Netskope offers Cloud Security Posture Management, which provides multi- cloud visibility and control over your IaaS inventory and configuration in Amazon Web Services, Microsoft Azure, and Google Cloud. One of Netskope’s differentiators is our Data-at-Rest security, which includes DLP and malware scans for IaaS storage buckets. You can protect your IaaS resources with the same policies you've built to protect your SaaS applications. Everything to the left in the illustration on the slide, indicated in orange and gray, is API-based and provides deep visibility into your managed IaaS resources. For visibility and control over real-time activities in unmanaged IaaS resources, Netskope offers Data-in-Motion protection, as indicated to the right in blue. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 12 DATA PROTECTION Scan content in buckets to identify sensitive data AzureAWS GCP THREAT PROTECTION Scan content in buckets to identify malware • Exact match • Fingerprinting • OCR Across 1,000+ file types, using 3,000+ data identifiers. • Pattern/keyword matching • Proximity analysis • Metadata extraction • Pre-filter • AV • Threat Intel Supported by Netskope Threat Research Labs (uniquely focused on cloud security threats) • Cloud sandbox • Heuristic analysis Data & Threat Protection for Cloud (IaaS) Storage To expand a bit on what we mentioned in the previous slide, Netskope can scan files in managed IaaS storage buckets using techniques such as exact matching, fingerprinting, OCR, pattern and keyword matching, and more. Netskope DLP supports more than 1000 file types and uses more than 3000 data identifiers to identify sensitive data. In the Threat Protection department, Netskope scans IaaS storage using pre-filtering, antivirus, threat intel, a cloud sandbox to detonate suspicious files and observe their behavior, and heuristic analysis. 2024 © Netskope. All Rights Reserved. 12 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 13 Securing Managed IaaS / PaaS with Near Real-time Visibility and Control • Perform DLP inspection on S3 buckets • Leverage Cloud Trails integration to monitor and audit activities and detect anomalous behavior • Identify non-standard configurations of AWS resources • Leverage GCP integration to monitor and audit activities and detect anomalous behavior • Identify non-standard configurations of GCP resources • Leverage DLP Scans to prevent and remediate data loss activities • Utilize Threat Protection capabilities to identify malware and other threats • Leverage Security Posture and Forensic capabilities Here are some examples of how Netskope secures managed instances of Amazon Web Services, Google Cloud, and Microsoft Azure. For all three services, Netskope can monitor and audit activities to detect anomalous behavior, as well as identify non-standard or incorrect configurations that could put your IaaS and PaaS resources at risk. For AWS and Azure, Netskope can perform DLP scans on IaaS storage. For Azure, Netskope can provide Threat Protection to identify malware and other threats. 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 14 Web Private Apps SaaS CASB Web Security Zero Trust Data center Single Console Single Client Netskope Private Access: Unified Secure Access as a Service for SaaS, Web, and Private Apps The Netskope Security Cloud platform unifies Zero Trust Network Access, CASB, and SWG, into an integrated Security Service Edge solution, with one client, one policy engine, and a single management console. This provides organizations with clear visibility, consistent policy enforcement, and ease of management. Netskope Private Access is network-agnostic and can be deployed as an overlay on top of your existing network infrastructure, enabling your organization to reap the benefits of Zero Trust Network Access immediately. A modern alternative to remote-access Virtual Private Networks, Netskope Private Access dynamically connects your users anywhere to your private apps on-premises, in private data centers, or in public cloud environments. With application discovery and API for automation, Netskope Private Access further simplifies the operations around private application management, user access provisioning, and ongoing maintenance. 2024 © Netskope. All Rights Reserved. 14 Netskope Security Cloud Operation and Administration Netskope Cloud Confidence Index TM (CCI) 152024 © Netskope. All Rights Reserved. We’ve briefly referred to the Cloud Confidence Index earlier in this chapter. Although this topic will be covered in greater detail later in this course, here’s a brief review of the importance of the Cloud Confidence Index as a resource for evaluating the enterprise-readiness of the cloud apps being used in your organization, as well as assessing apps you might be considering for use in the future. The Cloud Confidence Index is a database of cloud apps that Netskope has evaluated based on objective criteria adapted from the Cloud Security Alliance. These criteria measure the enterprise-readiness of cloud apps, taking into consideration an app’s security, auditability, and business continuity. The app database is updated frequently, adding new applications and updating enterprise-readiness scores for apps that are already in the database. There are currently more than 70,000 apps in the Cloud Confidence Index, which you can filter by name, domain, and app properties to determine the enterprise-readiness of specific cloud apps. For cloud apps detected in your organization, you can view usage statistics, such as how many users are accessing an app, when it was first accessed, and how much data is being downloaded from and uploaded to the app. 2024 © Netskope. All Rights Reserved. 15 Netskope Security Cloud Operation and Administration An Objective Assessment of Enterprise Readiness 16 • Based on rating of ~50 different attributes For example: Password rules, MFA support, encryption, file-sharing features, security certifications, etc. • CCI attribute automation using Netskope’s Machine Learning (ML) model – 26 CCI attributes are processed using ML – Hybrid process improves both velocity and accuracy by integrating ML results into the research workflow • Scores are objective; no cloud trust “marketing” with partners • No app score is fixed; adjusted when apps have un-remediated vulnerabilities • App weightings may be adjusted by customers; weightings applied to app or category • App scores can be used in policies 2024 © Netskope. All Rights Reserved. 16 To determine the level of enterprise-readiness for a cloud app, the Cloud Confidence Index takes more than 50 attributes into consideration. These attributes include such things as password complexity requirements, support for multi-factor authentication, file encryption and sharing features, and security certifications. The app assessment process is partially automated using a Machine Learning model for 26 attributes, significantly improving the speed and accuracy of the results. Cloud Confidence Index scores are objective and are not subject to marketing agreements with partners. App scores can either go up or down over time, depending on how vendors respond to gaps in security. Additionally, your organization can adjust the weightings of attributes at the app and category levels to better reflect the importance you place on specific items. Finally, you can use Cloud Confidence2024 © Netskope. All Rights Reserved. Classic API-enabled Protection Settings > Configure App Access > Classic Currently, Netskope offers two frameworks for API-enabled protection: classic and next gen. In general, an application is supported for either the classic or next gen framework. And with each framework come different capabilities and configuration workflows. Eventually all SaaS applications that are currently available under the classic framework will be migrated to next gen framework. Until then, you need to understand how to configure threat protection for SaaS applications connected to both frameworks. And we will start with the classic framework. In the classic API-enabled protection framework, you can enable and disable threat protection on a per instance basis. First, in your tenant, navigate to Settings, then to Configure App Access, and then to Classic, and select one of the cloud applications that has instances configured for API-enabled protection. In the lower half of the page, you will see a table with configured instances and activated features. Threat protection status is displayed in the Malware column. If you want to enable or disable threat protection for an app instance, click the instance name and toggle the Malware checkbox under the Instance Type label. As soon as you enable threat protection for a SaaS application instance, Netskope API connector will start sending files, accessed by the app users, for scanning according to the global threat protection settings. 2024 © Netskope. All Rights Reserved. 26 Netskope Security Cloud Operation and Administration 27 • Severity-based action: Alert, Quarantine, Remediation • Profiles: Quarantine, Remediation • Zip Password for files in Quarantine • Notifications 2024 © Netskope. All Rights Reserved. Configure Classic API-enabled Protection Settings Settings > Threat Protection > API-enabled Protection Under classic API-enabled protection framework, there are no threat protection policies. Instead, there are global threat protection settings that are applied across all classic SaaS instances. You can access these settings in the tenant UI by navigating to Settings, then to Threat Protection, and then to API-enabled Protection. These global settings define actions for each of the three malware severity levels: low, medium, and high. The available actions are alert and quarantine. If you have integration with a supported EDR solution and configured a remediation profile, you can enable the remediation option for some or all malware severity levels. We will explain EDR integration capabilities and benefits later in this chapter. Since API-enabled protection scans the files already stored in the cloud applications after the fact, blocking is not possible. Therefore, the next best thing is the ability to quarantine the malicious file. Quarantining means copying the malicious file into a separate folder and replacing the original file with a so-called tombstone. A tombstone is a document with a message explaining what happened to the original file and where to address any questions. The destination folder for quarantined files and the parameters of the tombstone file are defined in the quarantine profile, which we will discuss shortly. Under global protection settings you only have to select which quarantine profile to use. It is a good practice to have separate quarantine folders and hence separate quarantine profiles for malware and for DLP violations. When a malicious file is moved to the quarantine it is compressed into a ZIP archive with a password. This is a precaution against accidentally running the malware. You can define the password in the global threat protection settings. Lastly, you can select whom to notify by email when a malicious file is detected in a cloud app instance. The options are: users whose emails are listed in the quarantine profile, file owner, cloud app instance admin, and everyone who has access to the file in the cloud app instance. 2024 © Netskope. All Rights Reserved. 27 Netskope Security Cloud Operation and Administration Policies > Profiles > Quarantine > New Quarantine Profile 2024 © Netskope. All Rights Reserved. 28 Quarantine To be able to quarantine malicious files you need a Quarantine profile. The profile will define which cloud app instance will host the quarantine folder, and what should the malicious files be replaced with. The cloud app instance to host the quarantine folder should not necessarily be the same instance or even the same cloud app where the malicious file was found. Considering that for Classic API-enabled protection, the action settings, including which quarantine profile to use for the quarantine action, are global, it is not even possible to keep quarantined malware in the same cloud app as long as you have more than one cloud app. The cloud app instance for quarantine can be selected from the instances configured for API-enabled protection. Besides that, the Quarantine feature should be enabled in the instance settings, in your Netskope tenant. To view or change instance settings, navigate to Settings, then to Configure App Access, and then to Classic, and click the instance name. Then enable the Quarantine checkbox under Instance Type. Netskope supports creating a quarantine folder only for some cloud apps. If the instance settings lack the Quarantine checkbox, it means that this cloud app can’t be used to host the quarantine folder. In general, apps that belong to the Cloud Storage category are good for this purpose. Once you have at least one instance with the Quarantine option enabled, you can create a quarantine profile. To do this follow the steps below: 1. Navigate to Policies, then to Profiles, and then to Quarantine, and click New Quarantine Profile. 2. Select the cloud app of your instance and the instance itself. 3. For User Email, type the email identifier of one of the users of the selected cloud app instance. The quarantine folder will be created in this user’s workspace. Usually this should be the instance administrator. Other settings are optional. If you switch to the Tombstone tab in the quarantine profile settings, you will be able to type a custom text for the tombstone file. There are text boxes for both DLP tombstone files and threat protection tombstone files. Although this allows you to have a single quarantine folder for both DLP violations and malicious files, it is better to have them separated, just because malicious files are dangerous and files with DLP violations usually are not. It could be a costly mistake if somebody opens a malicious document by accident. Of course, malicious files are protected by a password, but in this area the more layers of protection the better. And keeping the malware quarantine apart from the DLP quarantine is another such layer. 2024 © Netskope. All Rights Reserved. 28 Netskope Security Cloud Operation and Administration When you configure your profile to use default or custom text for tombstone files, this implicitly sets the file format as plain text. This can be confusing for the user, since the tombstone file will assume the name and extension of the original file. Let’s say malicious code was found in a Microsoft Excel spreadsheet called finances.xls. The file will be quarantined and its contents will be replaced with tombstone text as plain text. Now, when a user tries to open the file either in the cloud app or locally on their computer, they will very likely receive the message that the file format is damaged or unknown. That is because the cloud app or the computer operating system will try to parse the file as an Excel spreadsheet, and the file doesn’t have that format anymore. A more user-friendly way to handle the situation is to replace the original file with a tombstone file of the same format. You will need to prepare such tombstone files in advance. Once you have them, you can use the customtombstone files option in the Quarantine Profile settings to select different replacement files based on the original file extension. 2024 © Netskope. All Rights Reserved. 28 Netskope Security Cloud Operation and Administration 292024 © Netskope. All Rights Reserved. 1. Create a Next Gen API Data Protection policy. 2. Select application instances to protect. 3. Select Threat Protection for Profile. 4. Select a Threat Protection profile. 5. Select Action. Configure Next Gen API-enabled Threat Protection Policies > API Data Protection > Next Gen > New Policy 2 3 4 5 In the Next Gen API-enabled Protection framework, Threat Protection configuration more closely resembles that of Real-time Protection than of Classic API-enabled Protection. You don’t need to enable or disable threat protection on a per instance basis and you don’t have global threat protection settings. To control the scope of threat protection and the actions, you use policies and threat protection profiles, just like with real-time protection. To create a threat protection policy for application instances configured under the Next Gen framework, follow these steps: 1. Navigate to Policies, then to API Data Protection, and select Next Gen. Then click New Policy. 2. Select protected application instances. You can select specific instances, all instances of a particular cloud application, all instances of all cloud application belonging to a category, or just all instances of all categories. Additionally, you can select specific resources to scan, or exclude specific resources from scanning, and restrict the scan scope by file type. 3. In the Profile menu, select Threat Protection. 4. Select one of the threat protection profiles. These are the same threat protection profiles that are used in real- time protection policies. 5. Configure actions. Available actions differ depending on the application and if the policy is applied to multiple applications, only the actions common to all of them will be available. If you want to take advantage of more flexible actions for a particular application, create a separate threat protection policy for that application. To summarize the threat protection under the Next Gen framework, compared to the classic framework: • You don’t need to enable Threat Protection in the managed instance settings; you only need to directly or indirectly select the instances that need protection in the policy settings. • You have the flexibility to create different Threat Protection policies for different applications or instances with different Threat Protection profiles or different actions. • Retroactive threat scans are not tied to retroactive DLP scans; you simply create a retroactive scan for a Next Gen instance and configure a retroactive scan policy with a threat protection profile. 2024 © Netskope. All Rights Reserved. 29 Netskope Security Cloud Operation and Administration Threat Protection 30 • Overview of Netskope Threat Protection • Configure Threat Protection for Real-time Protection • Configure Patient Zero Protection • Configure Threat Protection for API-enabled Protection • Integration with third-party solutions • Intrusion Prevention System (IPS) • Configure User and Entity Behavior Analytics (UEBA) 2024 © Netskope. All Rights Reserved. Now, let’s discuss integration options that provide remediation actions via third-party solutions. 2024 © Netskope. All Rights Reserved. 30 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 31 Threat remediation with EDR integration EDR Endpoint • Threat scan service scans a file and identifies the file to be malware • Netskope tenant contacts the EDR service and sends the file name and hash • The EDR service queries its DB to determine the IP addresses of the machines with the mentioned file hash • Configured actions are performed by the EDR on the end machines EDR CLOUD Netskope Security Cloud Let’s see, how integration with an EDR service can enhance threat detection responses. In the following description we assume that the threat protection policy is configured with a remediation profile, linked to an EDR service that the Netskope tenant is integrated with. When a malicious file is detected, the Netskope tenant sends a request to the EDR service with the malicious file details: hash and name. The EDR service will query its database for the IP addresses of the endpoints where this file had been seen before, if any, and send these addresses back to the Netskope tenant. The tenant will then add these addresses to the malware alert data. In addition to that, Netskope tenant can send a query to add the detected file hash to the EDR service’s own list of indicators of compromise. This will cause the EDR service to treat this file as a threat and apply its own configured actions whenever this file is detected by the EDR agents. Finally, Netskope can send a third kind of request to the EDR service, to apply the isolation action to the affected endpoints. This is supported for Carbon Black EDR only, and entails blocking network connections to and from the endpoint to prevent malware from spreading. The above chain of events can be triggered by detecting malware both in the traffic by a real-time threat protection policy and in the cloud apps by the introspection engine. 2024 © Netskope. All Rights Reserved. 31 Netskope Security Cloud Operation and Administration 32 • Select EDR Vendor: Carbon Black or CrowdStrike • Enter authentication credentials – Carbon Black: API Key – CrowdStrike: API Client ID & Secret • Select Cloud or (Carbon Black only) On-premises • Enter EDR Server address • (On-premises only) Select Secure Forwarder • Name your integration instance 2024 © Netskope. All Rights Reserved. EDR Integration (1 of 2) Settings > Threat Protection > Integration To take advantage of the described scenario, you need to have one of the two supported EDR solutions deployed in your organization. This can be a cloud deployment, or in the case of Carbon Black, also an on-premises deployment. If you have that, then you need to configure two entities in your Netskope tenant: • An integration with the EDR service. • And a remediation profile tied to that integration. To configure the integration, navigate to Settings, then to Threat Protection, and then to Integration, and click the tile with the EDR vendor: Carbon Black or Crowd Strike. Then configure the connection parameters: 1. Configure the authentication settings. For Carbon Black it’s a single API key. For Crowd Strike it’s a pair of API client ID and API client secret. 2. Configure the address of the EDR service, that your Netskope tenant will send the requests to. For Crowd Strike, only the cloud deployment is supported, and you need to put the service URL into the Server field. For Carbon Black, you can configure integration with either the cloud server or an on-premises server. Cloud integration is analogous to that of CrowdStrike. Integration with an on-premises Carbon Black server has an additional step. Since requests to the EDR service are send from the Netskope tenant in the cloud they will not be able to reach an on-premises server without additional accommodations. The proper way to deliver these requests across the perimeter is to set up a Secure Forwarder in the same network as the on-premises Carbon Black server. Secure Forwarder is one of the roles of the Netskope virtual appliance, and in that role, it maintains a secure connection to the tenant which the tenant uses to communicate with on-premises servers, such as the EDR server. Once you have deployed Netskope Secure Forwarder on your premises and connected it to your Netskope tenant, you will have to select this Secure Forwarder in the Carbon Black integration settings. Finally, you need to name your EDR configuration instance. You will use this name later when configuring a remediationprofile. 2024 © Netskope. All Rights Reserved. 32 Netskope Security Cloud Operation and Administration 33 • Select EDR integration • Select actions – Isolate – Alert – Add to watchlist/blocklist 2024 © Netskope. All Rights Reserved. EDR Integration (2 of 2) Policies > Profiles > Threat Protection And once the integration settings are in place, you can go on and create a remediation profile. To start, navigate to Policies, then to Profiles, and then to Threat Protection, and select the Remediation Profiles tab. Then click New Malware Remediation Profile. To configure the profile, follow these steps: 1. For Remediation Profile Name, type a recognizable name. 2. For Connect to EDR Server, put checkboxes next to the configured EDR server instances that you want to use in this profile. For a cloud EDR service you would most likely have just one instance. In the case of an on- premises EDR deployment you may have different servers in different regions, and you may want to configure different remediation profiles for those regions. 3. For Take Actions, select which actions you want to take upon malware detection: • Isolate means to apply the isolate action to the endpoints, where the EDR service has seen the detected file hash in the past. This action is supported for Carbon Black only, and the precise meaning of the action depends on the Carbon Black settings, but generally means blocking incoming and outgoing network connections on the endpoint to prevent malware spreading. • Alert means requesting the addresses of the affected endpoints from the EDR service with the purpose of adding them to the SkopeIT alert details in the Netskope Tenant. • Add to watchlist/blocklist means sharing the detected file hash as an indicator of compromise with the EDR service. The EDR service will start treating this hash as a threat and applying its own actions according to its own policies. CrowdStrike will only accept this indicator of compromise if it has already been seen on some of the endpoints. Remember that you need to select the remediation profile in the threat protection policies for real-time and next gen API-enabled protection and in the global threat protection settings for classic API-enabled protection. 2024 © Netskope. All Rights Reserved. 33 Netskope Security Cloud Operation and Administration Threat Protection 34 • Overview of Netskope Threat Protection • Configure Threat Protection for Real-time Protection • Configure Patient Zero Protection • Configure Threat Protection for API-enabled Protection • Integration with third-party solutions • Intrusion Prevention System (IPS) • Configure User and Entity Behavior Analytics (UEBA) 2024 © Netskope. All Rights Reserved. Next, we will discuss Netskope Intrusion Prevention system. 2024 © Netskope. All Rights Reserved. 34 Netskope Security Cloud Operation and Administration 35 • Scans network traffic to protect against exploits delivered by compromised or malicious applications, services, and websites • Scans HTTP/S traffic after Real-time Protection policy actions have been performed • Is enabled with a simple on/off switch (there are no IPS policies to configure; however, you can override signatures of the default profile) • Supported with the following steering methods: – Netskope client – GRE – IPsec – Explicit proxy mode (standard HTTP/S ports only) • Included in both Standard and Advanced Threat Protection for Netskope NG SWG 2024 © Netskope. All Rights Reserved. Netskope Intrusion Prevention System (IPS) (1 of 2) Intrusion Prevention System, or IPS, is a technology that scans network traffic to protect against client-side attacks delivered by compromised or malicious applications, services, and websites. IPS scans are run on the HTTP and HTTPS traffic after all Real-time Protection policies have been evaluated and their associated actions (for example, block actions) have been performed. You can enable IPS functionality in the Netskope tenant settings with a simple on/off switch. There are no IPS policies to configure, although you can specify signature overrides for the default profile. IPS is supported with the following steering methods: • Netskope client. • GRE tunnel. • IPsec tunnel. • And Explicit proxy (for standard HTTP and HTTPS ports only). IPS is included in both the Standard and Advanced Threat Protection licenses for Netskope Next Gen Secure Web Gateway. 2024 © Netskope. All Rights Reserved. 35 Netskope Security Cloud Operation and Administration Netskope Intrusion Prevention System (IPS) (2 of 2) 36 • Detects IoCs by means of 20,000+ signatures updated twice monthly – Signatures based on CVEs published by the National Vulnerability Database – Safeguards popular applications/products • Microsoft products, Adobe products • Browsers: Microsoft IE, Mozilla Firefox, Google Chrome, Safari, etc. • Databases: Oracle, MySQL, etc. – Protects against vulnerabilities and attacks • File format vulnerabilities (PDF, MS Office, executables/binary files, etc.) • JavaScript exploits • Cross-site scripting (XSS) • Browser exploits • OS vulnerabilities (Windows, Linux, MacOS, Android, iOS, etc.) • Malware (backdoor, C&C, shellcode, obfuscation, etc.) • Part of the Microsoft Active Protections Program (MAPP) 2024 © Netskope. All Rights Reserved. IPS offers more than 20,000 signatures to enable detection of known IoCs (or Indicators of Compromise) for exploits. These signatures are updated twice monthly, with one of the updates coinciding with Microsoft Patch Tuesday. IPS signatures come from different sources, including Netskope Threat Lab’s own research, Netskope security partners and cybersecurity community, and, importantly, CVEs published in the National Vulnerability Database. CVEs are Common Vulnerabilities and Exposures, a list of publicly-disclosed cybersecurity vulnerabilities maintained by the National Cybersecurity Federally Funded Research and Development Center operated by the MITRE Corporation. Besides that, Netskope participates in the Microsoft Active Protections Program (MAPP), a program for security software providers where Microsoft gives early access to vulnerability information so that Netskope and other cybersecurity companies can more quickly provide updated protections to customers. IPS safeguards such popular applications and products as: • Microsoft and Adobe products. • Web browsers, including Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Safari, etc. • Databases such as Oracle, MySQL, and others. IPS protects against vulnerabilities and attacks, including: • File format vulnerabilities (in such files as PDF, MS Office, executables and binary files, and more). • JavaScript exploits. • Cross-site scripting (or XSS). • Browser exploits. • OS vulnerabilities (in Windows, Linux, MacOS, Android, iOS, etc.) • Malware (such as backdoor, C&C (or Command and Control), shellcode, obfuscation, and others). 2024 © Netskope. All Rights Reserved. 36 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 37 IPS Settings (1 of 2) IPS on/off switch Traffic to exclude from IPS scans Settings > Threat Protection > IPS Settings You can find IPS settings in the Netskope tenant by going to Settings, then Threat Protection, and then IPS Settings. As mentioned earlier, IPS does not require any policies and is enabled or disabled with a simple on/off switch. The settings you can modify to customize the behavior of IPS are User Notification, Allow List, and Signature Overrides: • User notification is what the user sees in their web browser when IPS blocks a threat. You can customize the default template with your own message and corporate logo by going to Policies, then Templates, and then User Notification in the Netskope tenant and editing the IPS Default Template. • On the Allow List tab you can select domains and source and destination IP addresses or address ranges that you want to excludefrom IPS scans. Before you can select allow lists on this tab, you must first create the lists. You can do it by navigating to Policies, then to Profiles, and then to Network Location. 2024 © Netskope. All Rights Reserved. 37 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 38 IPS Settings (2 of 2) Signature overrides allow you to do two things. First, you can enable Alert Only Mode so that IPS only generates alerts and does not block web traffic when threats are detected. Second, you can override the default IPS behavior for specific threat signatures. For example, if you want to exclude a signature from being detected, you can set its status to Disabled. Or if you only want to prevent blocking, you can override the default action and set it to Alert rather than Block. To add a signature override, click New Override and search by signature number or a keyword in the signature name. You can also filter the signature list by the CVE reference number, or the CVSS severity level. As mentioned earlier, CVE stands for Common Vulnerabilities and Exposures database, and CVSS stands for Common Vulnerability Scoring System. Follow the links below for more information on CVE and CVSS: • https://cve.mitre.org/cve/search_cve_list.html • https://nvd.nist.gov/vuln-metrics/cvss 2024 © Netskope. All Rights Reserved. 38 Netskope Security Cloud Operation and Administration Threat Protection 39 • Overview of Netskope Threat Protection • Configure Threat Protection for Real-time Protection • Configure Patient Zero Protection • Configure Threat Protection for API-enabled Protection • Integration with third-party solutions • Intrusion Prevention System (IPS) • Configure User and Entity Behavior Analytics (UEBA) 2024 © Netskope. All Rights Reserved. Now, in the last section of this chapter, let’s discuss the user and entity behavior analytics feature. 2024 © Netskope. All Rights Reserved. 39 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 40 User and Entity Behavior Analytics (UEBA) SANCTIONED UNSANCTIONED PRIVATE INTERNET Detect malicious insiders, compromised accounts, data exfiltration, brute force, and other attacks. Behavior Analytics gathers information about users using sanctioned and unsanctioned apps, private and public internet, and then creates a profile to look for unusual behavior. User and Entity Behavior Analytics, or simply Behavior Analytics, or just UEBA, gathers information about users as they are using sanctioned and unsanctioned apps, as well as private and public internet, and then creates a user behavior profile and correlates all of it together to look for unusual behavior. The Behavior Analytics page in the Incidents menu provides information about the various types of detected insider threats and compromised accounts. You can use the Behavior Analytics dashboard to address some common use cases, such as insider threats, compromised accounts, compromised devices, and data exfiltration. • For compromised accounts, an example would be an external attacker who is abusing stolen account credentials to impersonate an employee and access cloud resources. • A compromised device is a device that has been accessed by an attacker or infected with malware and may communicate with attacker-controlled infrastructure to phone home, receive commands, or fetch malicious content. • Data exfiltration happens when an attacker is abusing a compromised account or a compromised device to steal data from the victim. Many campaigns have been found using cloud-based services, such as webmail and file- sharing services, as C&C servers to blend in with normal traffic and avoid detection. • Insider threats refer to security risks caused by malicious users within a corporate network. This type of attack is different from one caused by a compromised credential, where an external attacker has used valid stolen account credentials to impersonate an employee and access a network. In the case of a malicious insider, the user typically is acting with intent and likely knows that they are breaking policy and potentially the law. 2024 © Netskope. All Rights Reserved. 40 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 41 Data Flow Into UEBA Inline and API Connector Data Sources UEBA • Trigger rules • Build Models • Find Anomalies • Adjust UCI Netskope UI • Incidents • UCI Scores Alerts Application Events Network Events At the core of Netskope Behavior Analytics is the following data flow. The UEBA engine ingests alerts and different kinds of events generated by various other modules in the Netskope Tenant. These include application events detected both in real-time and through API access; alerts from most detection engines, such as DLP, threat protection, web security, etc., as well as other events. The UEBA engine uses incoming data to trigger rule-based policies as well as to train machine-learning-based models, establish baselines and detect abnormal behaviors. UEBA detections then adjust users’ risk scores, so called user confidence index. This score can then be used in the policies to drive different actions depending on the user risk. You can also observe user scores directly in the tenant UI as well as analyze and process UEBA alerts and incidents. 2024 © Netskope. All Rights Reserved. 41 Netskope Security Cloud Operation and Administration Standard vs Advanced Behavior Analytics 42 Standard UEBA • Sequential anomaly rules (9) to detect cloud app bulk uploads, downloads, deletes, plus proximity, failed logins, shared credentials, rare events, risky countries, and data exfiltration between company and personal instances • Instance awareness for apps in sequential anomaly rules Advanced UEBA • Machine learning (ML) based anomaly detection for insiders, compromised accounts, and data exfiltration • User Confidence Index (UCI) scoring and event correlation timelines with the ability to invoke policy actions based on score • REST API for UCI export + Cloud Risk Exchange for risk curation and remediation actions with technology partners • UEBA custom sequential anomaly rules with pre- defined templates for 8 inline apps and 6 API apps 2024 © Netskope. All Rights Reserved. The exact capabilities available in your tenant depend on the UEBA feature pack included in the license. Just like Netskope Threat Protection, Netskope Behavior Analytics has two functional levels: Standard UEBA and Advanced UEBA. Standard Behavior Analytics gives predefined anomaly detection rules based on looking for a certain sequence of events. There are 9 such rules in the Standard UEBA and they are designed to detect bulk uploads, downloads, and deletes using cloud apps; proximity detection, when credentials are used from different distant locations; failed logins; access from risky countries; data exfiltration between company and personal instances; and rare event detection. Advanced Behavior Analytics offers much more. In addition to many more predefined sequential anomaly detection rules, there’s support for custom rules. Then, there are machine learning based anomaly detection policies with user and tenant level models. With Advanced UEBA each user is assigned a risk score, called User Confidence Index or UCI, with the ability to invoke policy action based on that score. There’s also support for sharing the UCI with third-party solutions directly via Netskope REST API or in a more guided manner via Netskope Cloud Risk Exchange. 2024 © Netskope. All Rights Reserved. 42 Netskope Security Cloud Operation and Administration User Confidence Index To Find Risky Users 43 1. Unknown threats exhibit unusual behaviors 2. UEBA detections identify individual anomalous behaviors 3. UEBA engine combines anomalies into a score: User Confidence Index (UCI) 4. Organization investigates users with poorUCI scores 2024 © Netskope. All Rights Reserved. Insider threat ✖ Corporate Downloads ✖ Personal Uploads ✖ DLP violations UEBA Detections 🔔Sensitive Corporate Data Movement Anomalies Risk Score Risky Users 332 Netskope Behavior Analytics encapsulates risky user behavior into a risk score (User Confidence Index or UCI) and applies it to each user. The risk score is presented on the UI, showing which users constitute the most risk to the organization at any given time and are in need of further investigation. The UCI can be used in policies to base policy actions on the user’s risk score. The UCI can also be shared with third-party solutions via the Cloud Risk Exchange feature of Netskope Cloud Exchange to promote risk-based policies beyond the Netskope solution. 2024 © Netskope. All Rights Reserved. 43 Netskope Security Cloud Operation and Administration How is the User Confidence Index (UCI) calculated? 44 • A dynamic score assigned to each user, which indicates risk • Starts at 1000 • Reduced for each alert • Previously accumulated deduction decays over time 2024 © Netskope. All Rights Reserved. Let’s look in more detail into how the User Confidence Index is calculated. The initial value of UCI for a new user is 1000. Each time the user triggers a Behavior Analytics alert, the score is reduced by a fixed numerical value defined in the violated Behavior Analytics policy settings. The score is dynamic. At the beginning of a day the total score deficit from the previous day is reduced by a certain percentage, thus increasing the score. This way the risk score gradually improves over time, unless new alerts keep reducing the score. You can see on the screenshot how the user’s score incurred a new penalty of 101 from a triggered UEBA rule and that was added to 387, which is the accumulated and depreciated penalty transferred from the previous day. This makes the total deduction for the day equal to 488 and amounts to the User Confidence Index of 512. This day’s total deduction of 488 will be multiplied by a depreciation factor and transferred to the next day. Note, that user confidence index is only available with Advanced Behavior Analytics. 2024 © Netskope. All Rights Reserved. 44 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 45 User Risk-Based Policies You can use this risk score in real-time protection policies to dynamically restrict user access if their score falls below a certain threshold. To do that, follow the steps below: 1. Navigate to Policies, then to Real-time Protection. 2. Create a new real-time protection policy. A Cloud App Access policy would be a good candidate for this feature. 3. Next to Source, click Add criteria and select User Confidence. The User confidence field will appear in the policy settings. 4. Click in the User confidence field and select the criteria Less than or More than, then select the Threshold. You can type your own custom threshold too. You should then fill the policy with other appropriate details, such as the Cloud App or Category, possibly a DLP profile, and the Action. 2024 © Netskope. All Rights Reserved. 45 Netskope Security Cloud Operation and Administration Sequential anomaly rules 46 • Trigger based on specific set conditions • Do not include behavioral baselines • Can be customized to suit an organization’s needs • (with Advanced UEBA) support custom rules and UCI Example of rule-based detection for Bulk Downloads: • Rule-based Behavior Analytics policy will alert on a user downloading 500 files, even though this may happen on a regular basis. • Must be manually tuned if this is not relevant. 2024 © Netskope. All Rights Reserved. Let’s now look at how Behavior Analytics can detect risky behavior, starting with sequential anomaly rules. “Sequential” here refers to the fact that these rules trigger when a certain sequence of events is observed. For example, a rule may trigger after 100 file download events observed within 1 hour. These events can come from both the API-enabled protection and from real-time protection. Sequential anomaly rules don’t support training and don’t have any baseline to compare with. You can manually change the threshold from 100 to 500 or 50, based on what’s more relevant for the organization. You can also change the observation window from 1 hour to a different period. And you can further fine-tune the rule in terms of which users and which applications it pays attention to. Remember, that under Standard Behavior Analytics, there’s no user confidence index. Instead, when a rule is triggered, only an alert is generated. You can customize the severity level of the alert in the rule properties. With Advanced UEBA, you get more types of predefined rules, the ability to define your own event sequences to look out for in custom rules, and you can set the user confidence index penalty associated with each rule. 2024 © Netskope. All Rights Reserved. 46 Netskope Security Cloud Operation and Administration Predefined Rule-based Policies Standard UEBA 47 • 9 predefined rules with configurable parameters: – Threshold – Tracked users – Tracked apps or app instances – Severity • Proximity tracks Reverse Proxy access method only • Shared Credentials has a fixed Medium severity 2024 © Netskope. All Rights Reserved. Policies > Behavior Analytics With just Standard UEBA, there are 9 pre-defined rule types also called rule-based policies. There is only one policy of each type that can be either enabled or disabled, if you decide that the rule is not relevant for your organization. That means that for each of the 9 scenarios you can only have a single set of parameters for the entire organization. It’s impossible to have different bulk download thresholds for different apps or user groups. Advanced UEBA overcomes this restriction with custom rule-based policies and machine-learning-based policies. All rules have tags which point to the scenarios in which the rules can be used. All Standard UEBA rules have the corresponding eponymous tag, so that you can easily find them even if you have Advanced UEBA enabled for your tenant. More importantly, the rules have such tags as Real-time Protection and API-enabled protection. These show what kind of events can trigger the rule. Nearly all Standard UEBA rules have both these tags, meaning that they process events coming both from traffic analysis and API-based introspection. The only exception is the Proximity rule that relies exclusively on real-time protection events and among those only on the events coming from the Reverse Proxy access method. 2024 © Netskope. All Rights Reserved. 47 Netskope Security Cloud Operation and Administration Tuning Rule-based Policies Recommendations 48 The following Rule-based policies would track for sanctioned app instances only: • Bulk Delete • Bulk Download • Bulk Failed Logins • Suspicious Data Movement • Proximity • Rare Event • Risky Countries Before tuning the rule-based policies, make sure to create all required app instances. • Add all relevant app instances • Set appropriate threshold • Set the severity by configuring the UCI score 2024 © Netskope. All Rights Reserved. By default, the rules are not fine-tuned in any way. They will dutifully count relevant events for all users and for all applications, including possibly personal application instances. Depending on the scenario, this may or may not produce the best results. For example, in the bulk delete scenario an organization would care much more if this happened to a corporate application instance rather than some user’s personal instance. With bulk uploads it is arguably the other way round. And to meaningfully detect suspicious data movement, both a corporate and a personal instance must be involved. This all raises the question of defining corporate application instances and using this information in the policy settings.In the rule settings such applications or application instances are called ”sanctioned”. There are a few way to delineate sanctioned applications and instances in the Netskope tenant. First of all, any application instance configured for API-enabled protection is sanctioned. In this sense, any events coming from API-based introspection are events about sanctioned application instances. Netskope introspection cannot monitor activities in users’ personal applications. Real-time protection can generate events about any instance, as long as user’s activity in the instance is captured in the traffic. To separate activity in corporate and non-corporate instances, you need to mark corporate instances as sanctioned. The steps to do that will be discussed shortly. Note, that application instances configured for API-enabled protection and therefore sanctioned in relation to introspection or API connector access method, are not automatically sanctioned in relation to inline activity detection. Out of the box there are no sanctioned instances for inline. 2024 © Netskope. All Rights Reserved. 48 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 49 Instance Awareness (inline) To make an application instance sanctioned for inline processing and consequently for UEBA, follow the steps below: 1. Navigate to Skope IT, then to Application Events, and find events related to the application instance you consider corporate or sanctioned. 2. Click View details to display event data in the side bar. 3. Scroll the event details down to the Application section. 4. Next to Instance Name field, click the New App Instance link. 5. In a new window, give this instance a recognizable name, and select an appropriate tag: sanctioned or unsanctioned. 6. Click Save. This creates a named instance, which can be tagged as sanctioned, unsanctioned, or neither. If you want to find all named instances, navigate to Policies, then Profiles, then App Instances. There you can change the instance tag or delete the instance. These sanctioned instances are important for UEBA but can also be used as conditions in real-time protection policies. 2024 © Netskope. All Rights Reserved. 49 Netskope Security Cloud Operation and Administration Example: Bulk Delete 50 • Goal: track bulk deletes in corporate instances of cloud apps • Recommendation: limit coverage to sanctioned instances of cloud apps for both real-time and API- enabled instances • (Optionally) select users • Set file count and time interval • Severity (Standard UEBA) or UCI score impact (Advanced UEBA) 2024 © Netskope. All Rights Reserved. Let’s now look at the configuration options for a pre-defined rule-based UEBA policy. Most of the parameters of pre-defined rules are common to all rule types, but there can also be unique settings specific to a particular rule. We will use the Bulk Delete rule as an example. To change the rule settings, hover your mouse pointer over the rule tile and then click the pen-shaped Edit icon in the lower-right corner of the tile. Then configure the following parameters: 1. Severity. You can choose between Informational, Low, Medium, High, and Critical. The severity level of the rule defines the severity level of the alerts generated when the rule is triggered. You can choose severity directly only if your tenant doesn’t have Advanced Behavior Analytics. Otherwise, you will configure the User confidence index score impact, which will define the severity level. 2. User confidence index score impact. This is available with Advanced Behavior Analytics and not available with Standard Behavior Analytics. When available, this parameter has a numerical value, which is deduced from the user’s UCI score when the rule is triggered. 3. User. You can select which users the rule will track. Only events associated with selected users will be used to evaluate the rule conditions. You can select individual users, which is not very practical, or user groups, or organizational units. 4. App. You can select which application instances will be considered when evaluating the rule conditions. Here, too, you have several options. First, you can select applications by name, which again is not very practical because it doesn’t allow you to distinguish between sanctioned and unsanctioned instances. Second and better option, is to select configured application instances. These will be instances configured for API-enabled protection, and named instances configured for inline protection, discussed previously. And there’s the third option to apply the rule to sanctioned apps. Sanctioned apps are not the same as sanctioned instances. To mark the entire application as sanctioned, you need to find it in the CCI database and apply a predefined Sanctioned tag to the application. This will be less accurate than tagging application instances. Other rule settings will depend on the rule type. For the Bulk Delete rule these include two parameters that define the threshold of what is bulk: Count of files deleted and Time interval. The meaning of the parameters is self- explanatory. Note, that the rule counts deleted files, rather than deletion events. This is achieved by analyzing activity details such as file ID within the cloud app and provides better accuracy by avoiding double counting. 2024 © Netskope. All Rights Reserved. 50 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 51 Custom Rule-based Policy from Template Policies > Behavior Analytics Advanced Behavior Analytics extends rule-based policies in two ways. First, there are over 30 predefined rules with Advanced Behavior Analytics, compared to Standard Behavior Analytics. Second, Advanced Behavior Analytics allows you to create custom sequential rules. There are two way to do this. You can create a new rule from a template, or you can create a new rule entirely from scratch. The templates simply provide default values for some parameters and mostly serve as examples of the kinds of rules you can create. They don’t offer any unique capabilities compared to rules created from scratch. There are three templates for custom rule-based policies in Advanced Behavior Analytics: • Download / Delete to detect twenty repetitions of download followed by delete in one hour on Box. • Share / Delete to detect ten repetitions of share followed by delete in one hour on Dropbox. • Upload / Share to detect ten repetitions of upload followed by share in one hour on Google Drive. All these activities can be a sign of data exfiltration either by an attacker using a compromised device, or by a malicious insider. Every parameter of the template can be modified before saving the rule: the number of repetitions, the time period, the activities, and the app. To create a custom rule-based policy from scratch follow the steps below: 1. Navigate to Policies, then to Behavior Analytics. 2. Click New Custom Rule Policy and select New. You can also select New From Template and choose a template. This will only provide you with default values for some of the rule settings but will not restrict you from customizing the rule the way you want. 2024 © Netskope. All Rights Reserved. 51 Netskope Security Cloud Operation and Administration 52 • UCI impact • Tracked users • Tracked apps • Risky countries • Activity sequence: – Activities – Rigid order or not – Repeats – Duration 2024 © Netskope. All Rights Reserved. Custom Rule-based Policy from Scratch 3. Name you rule-based policy. 4. For Scan Type, select Real-time Protection or API Data Protection. This defines the source of events that the rule will pay attention to. Your choice will also automatically add the corresponding tag to your custom policy and let you search for it by tag later. 5. Set the value of User Confidence Index Score Impact. The value will be subtracted from the offending user’s UCI score and alsodefine the severity of the alerts generated by the policy. UCI score impact from 0 to 50 corresponds to Informational severity level, 51 to 100 means Low, 101 to 150 means Medium, 151 to 250 means High, and 251 or more means Critical. 6. Select the users whose activities the rule will track. You can select individual users, user groups, or organizational units. 7. Select applications to track. Like in predefined rules, it is recommended to select from previously configured application instances, but you can also apply your policy to all applications, selected applications from the CCI database or applications with the Sanctioned tag. 8. Optionally, select risky countries. These would be the countries the user connects from. When a user connects from a risky country, even relatively benign activities could be considered suspicious and warrant creating a rule to alert about them. 9. Under Sequence, use the Add activity button in the lower-left corner to built a sequence of activities you want to detect. This could be a single activity, such as a failed or successful login. Or this could be a sequence such as upload and then delete. If the order of the activities is important, enable the Rigid flag in the lower-right corner. Otherwise, the policy will trigger for activities performed in any order, as long as all the selected activities are detected. Note that when the policy evaluates a sequence, it always matches events for the same application, user and object. If one user uploads a file to the application and then a different user deletes a file, this would not match the sequence, because the user is different, even if the app and the file are the same. 10. Still under Sequence, set the maximum duration and number of repeats. The policy will trigger only if the specified number of repeats is detected within the specified duration. Each repetition of the sequence can be 2024 © Netskope. All Rights Reserved. 52 Netskope Security Cloud Operation and Administration about a different file, user, or application. The user, app, and file must be the same only within one sequence. 11. Finally, set the policy status to Enabled and Save the policy. Custom rule-based policies can be edited, deleted, or cloned. Cloning allows you to quickly create similar but different policies for different apps or user groups. 2024 © Netskope. All Rights Reserved. 52 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 53 Machine Learning Behavior Analytics Policies Even with custom rule-based policies you need to spend time fine-tuning the thresholds before finding a good balance between useful alerts and false positives. And this is exactly the kind of tedious process that machine- learning approaches can automate. With Netskope Advanced Behavior Analytics you get dozens of ML-based policies, and the list is constantly growing. These ML-based policies target the same scenarios as the rule-based policies, but also other scenarios that sequence-based detection can’t capture. You can easily find either all Machine Learning policies, or the ones targeting a specific scenario using the filter options on the left. 2024 © Netskope. All Rights Reserved. 53 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 54 User vs. Tenant Level Models User Models Tenant Models ● Each user is modeled separately ● Anomalous behavior was only found compared to the model for this user ● One model for the whole tenant ● Anomalous behavior was found compared to the overall tenant model Example: Colin normally downloads 10 files per day, but today he downloaded 1,000 files. There are other people in the organization who download 2,000 files per day. Example: Colin normally downloads 10 files per day, but today he downloaded 1,000 files. Everyone else in the organization downloads no more than 500 files per day. Lower Severity Higher Severity The ML-based detections are meant to capture baselines from customer environments and alert on large deviations from the baseline. This is done through two kinds of models that can be applied in two different ways. The two kinds of models are quantitative and categorical. Quantitative models learn typical values for a certain statistics such as total number of files downloaded or uploaded over a certain period of time, and alert when significant deviations from the baseline happen. There are numerous statistics that Netskope Behavior Analytics learns and alerts about. Categorical models alert about rare or first-time events, such as a first-time login to a corporate instance of AWS from a particular country or by a particular user. Both kinds of models can be applied as user-level models or tenant-level models. User-level models build a model for each user independently of all other users. First, a baseline is established for that user only, and then when an anomaly is found, the system will trigger on that anomaly for that individual user. For example, Colin from accounting normally downloads 10 files a day, but on this day, he downloaded 1,000 files. Other people in the organization sometimes download up to 2,000 files per day. But in Colin’s case, this is not their normal behavior, so the system generates an anomaly just for Colin. Tenant-level models build one baseline for the entire tenant, or in other words, for the entire organization. A tenant-level model triggers on behavior that is abnormal to everyone in the organization. For example, everyone in the organization downloads no more than 500 files per day. So, when Colin downloads 1,000 files in a day, their behavior isn’t normal compared to everyone else in the organization. In this case, their behavior triggers an anomaly compared to the rest of the organization. This should be considered a higher severity anomaly compared to just a user-level deviation from the baseline. This is reflected in the default UCI score impact set for ML-based policies. Tenant-level ML-based policies have a higher UCI impact than corresponding user-level policies. 2024 © Netskope. All Rights Reserved. 54 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 55 What are ML-based detections? Model a feature (Example: bytes downloaded per day) Learn patterns Track over time (3+ weeks) Model a feature (Example: bytes downloaded per day) Learn patterns Track over time (3+ weeks) Filter events (feature and entity) Compare to the model Calculate the probability Filter events (feature and entity) Compare to the model Calculate the probability Build ModelsBuild Models Analyze Relevant EventsAnalyze Relevant Events Mature models only (minimum data requirement) All conditions are met Spikes / First Time / Rare Mature models only (minimum data requirement) All conditions are met Spikes / First Time / Rare Trigger AnomaliesTrigger Anomalies Here’s a simplified description of how ML-based detections work. A machine-learning model is an algorithm that is trained to recognize certain patterns. In the case of Netskope Behavior Analytics, models recognize patterns of normal behavior in the stream of events. A non-machine-learning model would be coded by humans to recognize these patterns. This is how sequential detection rules work. A machine-learning model is not entirely coded by humans. It starts as a generalized model with a vast number of undetermined parameters and through a process of training automatically fine-tunes the parameters for better and better recognition of the desired patterns. Netskope Behavior Analytics models are not pre-trained and start from a blank slate. Therefore, they start by building specific detection models based on the customer data. Each model has certain minimum data requirements typically expressed in terms of minimum observation time, usually about 3 weeks, and minimum number of events. Both are important.A model may happen to meet its data requirements in a single day, if it’s a particularly busy day for the organization. But this may not necessarily be a typical day and if the training were stopped after just this one day, the model could produce a lot of false positives. Likewise, if a user-level model has been learning a user’s behavior for 3 weeks, it may still lack data for good predictions. The user may have been on vacation most of that time and there simply wasn’t enough data to build a good baseline. That’s why until all minimum data requirements are met, the model doesn’t produce any alerts. It is in a purely training mode. Once the minimum data requirements for the model are satisfied, the model becomes a mature model and switches into a hybrid training and evaluation mode. If the model detects a large deviation from the baseline, it will trigger an alert. But it will also use incoming data to continue adjusting its baseline. After all, user behaviors are not constant and can change over time. 2024 © Netskope. All Rights Reserved. 55 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 56 User Confidence Alerts You can find UEBA Alerts among other alerts on the Alerts page in Skope IT. And you can also find them on the Behavior Analytics page in the Incidents menu, where incidents are organized around users and presented in a more informative way. Let’s explore an example screenshot of that page. Here on the left, you have the list of all users and their current user confidence score. You can filter the list by UCI brackets: Poor, Moderate, Good, or All. And you can search users by their name. On the right, you can see the breakdown of the user’s UCI score. The graph shows how the score changed over time, and below the graph you can see which alerts contributed to the score on a particular date, as well as how much deduction was transferred from the previous date. By default, the current date is selected, but you can select any date by clicking the points on the graph. Although the incidents page gives you a good overview of which users have a low score and may require attention, you may also want to be alerted when a user’s score falls below a certain threshold. To enable these kinds of alerts, click User Confidence Alert in the summary tile at the top, switch on the flag to raise an alert when the user’s UCI drops below the set threshold, and select the threshold. 2024 © Netskope. All Rights Reserved. 56 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 57 Behavior Analytics Incidents Management As with all alerts, Behavior Analytics alerts should be processed in a proper manner. Once an operator reviewed the alert details and taken any appropriate escalation measures, they should acknowledge the alert. To do this, click the alert under the UCI graph and then click Acknowledge Alert. This simply marks the alert as acknowledged and it stops being displayed in the default view of the Alerts page in Skope IT. Occasionally you may find that what Behavior Analytics detected as an anomaly turned out to be a normal user behavior with a legitimate purpose. In such cases you wouldn’t want to penalize the user. This can be done by clicking the Mark Allowed button. What this does is set the UCI impact for this particular alert to 0, recalculates the user’s risk score accordingly and suspends the triggered Behavior Analytics policy for the same user for a certain time. The action is permanent and can’t be undone. 2024 © Netskope. All Rights Reserved. 57 Netskope Security Cloud Operation and Administration 582024 © Netskope. All Rights Reserved. Compromised Credentials To wrap up the discussion of threat protection, there’s one more topic that is not directly tied to neither threat scanning nor behavior analytics, although still important. The topic is compromised user credentials. Netskope Threat Lab keeps track of data breaches and user data being shared on the dark web. If Netskope notices one of the known compromised usernames in its data sources, whether its customers logs ingested via the risk insights feature, app activity monitored through an API connector, or activity in the traffic, a compromised credentials alert will be raised. You can find such alerts on the Compromised Credentials page in the Incidents menu. For each compromised username you can see the timestamp when the user’s activity has been detected, the date of when the username is known to have been compromised and the name of the corresponding data breach. You can also see where the tenant detected the activity, or in other words, what access method was used to detect it. Note that Netskope doesn’t track the use of the compromised password, only the use of a compromised username. This means a compromised credentials alert doesn’t necessarily mean the data is in danger. The password that’s become known to criminals may be for an entirely unrelated app, or the user may have already changed their password after the breach happened. Still, these alerts are important to follow through, contact the user and ensure they are following best practices of credential hygiene. 2024 © Netskope. All Rights Reserved. 58 Netskope Security Cloud Operation and Administration Lab C: SaaS Threat Protection Time: 45 minutes 592024 © Netskope. All Rights Reserved. This chapter includes a lab to practice some of the concepts you learned about. 2024 © Netskope. All Rights Reserved. 59 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Reporting Netskope Security Cloud Operation and Administration Welcome to the Reporting chapter, in our Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2 • The Reports interface allows you to: – Create, edit and manage reports • Reports provide a deep level of visibility • Generate reports that satisfy: – Regulatory standards – Determine how to best steer traffic 2024 © Netskope. All Rights Reserved. Reporting Overview The Reports interface allows you to create, edit, and manage reports. Reports provide a deep level of visibility to generate reports that satisfy various regulatory standards, and helps you determine how to best steer traffic to protect your organization. Standard reporting allows you to include up to the last 90 days of data from Skope IT. A quick note here: If you have Advanced Analytics on your tenant, you will not see the Reporting option. This chapter describes the primary components in the Reports interface. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration Reports Interface 3 • The first time you access reports, you will see the screen shown below. • On subsequent log-ins, you will see the main reports list page. 2024 © Netskope. All Rights Reserved. To open the Reports interface, click Reports in the Netskope admin console. The first time you access reports, you will see this screen. For subsequent log ins, you will see the main reports list page. You have a choice to either create a report using Netskope’s Template Library or create a new report from scratch. To view the template library, click the Checkout our Template Library tile. Click the Create a New Report from scratch to create a completely customized report. Each report has a template, historical runs, and ad hoc runs available. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration 4 • A report can include a combination of: – New and predefined widgets – Saved queries • For example, a cloud risk assessment report can include lists and widgets (table, bar, column, pie, line) side-by-side to help you analyze a wide range of data more easily. 2024 © Netskope. All Rights Reserved. Generating a ReportThese reports are a collection of new and predefined widgets and saved queries. If you choose to use a template with predefined widgets, click Template Library, and select a predefined template from the list. You can also choose to clone a report from the existing reports located in the Created By Me or Shared With Me lists, Regardless of the method you use, you are creating a template that you either add widgets to or already has widgets already in it. ================================================= More information on creating reports: https:/docs.netskope.com/en/create-a-report.html 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration 52024 © Netskope. All Rights Reserved. Create a new report from scratch Use the New Report button to build a template from scratch. Choosing to create your own custom widget requires a bit more effort. You can create your own custom widgets by writing a Skope IT query to define what data you want to include from Skope IT to use for your custom widget. The results of a data query is called a data set. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration Template Library 62024 © Netskope. All Rights Reserved. Widgets Reports > Template Library To use the predefined templates, choose a template from the Template Library. In this example, the App Usage Summary template is selected. You can see the three widgets that make up the App Usage Summary. The first two widgets provides data on what are users uploading and downloading based on the applications’ CCI levels for the last 90 days. The third widget provides information about the top applications users are running for the last 90 days. After you select the template, click Use Template. The template is copied to your reports folder where you can use the template as is or make changes to it. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration Build A Template 72024 © Netskope. All Rights Reserved. Next, name your report. You can customize the template by changing the Time Range, editing the existing widgets in the template, or adding new widgets. You can customize the Time Range for all the predefined widgets or per widget for newly added widgets. For the widgets, you can clone, rename, delete or add new widgets to the template. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration Add Widgets 82024 © Netskope. All Rights Reserved. Choose whether you want to query: • An Alert event • An Application event • A Page event When you click Add Widget, this opens the Add Widget side panel and guides you through the Add Widget process. Each widget you create is based on the event, format, and value options you select. You can add up to 20 widgets per template. You can choose whether you want to query an alert event, application event, or page event: • Alerts are generated when a policy, DLP, or watchlist is matched. For log discovery using Palo Alto Networks (PAN) firewall logs, alerts show the list of apps blocked by the PAN firewall. For every event blocked by PAN we generate a corresponding alert. • Page events are generated for the actual HTTP connection and contain the app, app category, CCL, source, destination, bytes and latency details. For log discovery using PAN firewall logs, connection events also show the details of all the cloud apps that are allowed in the network. • Application events record more details of the user activity inside the cloud app. For log discovery using PAN firewall logs, this is identified using the URL recorded in the PAN logs. • You can enter a query to execute. For example, if you want to query the users who use Box, enter app eq Box in the query field. When you enter words in the query field, a list of options opens and changes to help you find the specific code strings needed to create a query. You can also choose from your saved queries. Click the Choose from Saved Queries link to open a dialog box which lists your saved queries, and also search for specific queries as well. 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration 92024 © Netskope. All Rights Reserved. Create Report Schedule A report can be scheduled Daily, Weekly or Monthly or run ad hoc, when needed. There is a maximum of ten report runs that can be saved per report. Once you select the frequency of when the report runs, you then select the time and time zone. To get the results of the report, you can either log in to the tenant and look at the report or have the option to notify users through email and attach the report as a pdf. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration List of Reports 102024 © Netskope. All Rights Reserved. You can view your reports under the Created By Me list. The Shared With Me list are reports shared with you by other tenant administrators. Click the report name to view options for the report. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration Reports – Historical Runs 112024 © Netskope. All Rights Reserved. The Historical Runs tab shows scheduled reports. A best practice tip here is to schedule your reports to run automatically and have them emailed to users as a PDF. Up to 10 historical runs can be stored. After the report is generated, you can download the report as a PDF or CSV with your choice of rows (up to 100K). Click on the ellipse menu and you can see the options for this report including editing the schedule and sharing the report. The option Move to Another Group allows you to move reports to different groups or folders for organization if you have a lot of reports. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration Reports – Ad Hoc Run 122024 © Netskope. All Rights Reserved. Ad Hoc Run • Report Can Be Exported o PDF o CSV The Ad Hoc option runs the report on demand. Use ad-hoc runs to generate a report outside of a regularly scheduled time period using the latest data. Only one ad-hoc report run can be stored at a time and is replaced with each ad-hoc run you generate. After the ad-hoc report is generated, you can also download the report as a PDF or CSV (with your choice of rows up to 100K). 2024 © Netskope. All Rights Reserved. 12 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Netskope Advanced Analytics Netskope Security Cloud Operation and Administration Welcome to the Netskope Advanced Analytics chapter, in our Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration Netskope Advanced Analytics - Features 2 • Custom dashboards with all available data: – Create custom reports on 500+ data fields logged for events & alerts including Active Directory data & custom attributes – Use numerous visualizations like geomap, scatter plot, sankey etc – Slice & dice all data – Export, Share, Schedule – Interactive reports with ability to drill down • Predefined dashboards: – Customizable predefined operational and executive dashboards targeting different personas – Automated Cloud Risk Assessment 2024 © Netskope. All Rights Reserved. The Advanced Analytics platform offers access to an extended set of data — over 500 fields logged for events and alerts including Active Directory data and custom attributes. The platform offers numerous visualization options such as geo-maps, scatter plots, and Sankey plots. You also can export the data, share reports with team members, and schedule recurring reports. Advanced Analytics reports are interactive, with the ability to drill down to underlying data. Netskope offers a set of predefined dashboards to addresskey use cases such as operational reporting, executive reporting, and threat protection. You can further customize these dashboards easily for your specific analytical needs. We will take a closer look at some of these use cases in the next slides. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 3 Advanced Reports - CISO Dashboard Policy violations Traffic blocked/allowed Unsanctioned/risky applications Risky users Different types of threats Total threats defended and adoption metrics Advanced Analytics provides a customizable dashboard with a comprehensive view of the activity across applications to help drive CISO level decision making. For example, The Cloud Risk Assessment reports provide visibility into which risky applications are being used or where risky users may be located. Next, the Threat Prevention dashboards build on that information to provide insights on the types of threats and malware that are prevalent in the applications being used, as well as metrics on how the current security setup is defending the organization against them. In addition, the Data Protection dashboards provide information on the types of data being handled by the different applications and whether that data is being used appropriately. Note that a CISO dashboard with Organization Units (OUs) is available for organizations with Active Directory integrations. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 4 Advanced Reports - Data Protection Dashboard • The Data Protection dashboard provides an overview of information related to data security and data loss. One key aspect of this dashboard is the numeric count at the top which metrics on what kinds of data violations are taking place, their severity and whether they are related to PII/PHI/PCI data. • The DLP Policy/ Profile Hits Sankey graph provides information on which policies and profiles have been activated as well as the locations of users and which applications were involved. • In the Top Policy & Risky Users section, you can see the top 20 policies, users, and applications related to DLP violations. • The Data Exfiltration section provides a look at the Top 20 applications involved in uploading of data to an unsanctioned instance or application, as well as downloading of data from a corporate resource. • The Exposure section provides an overview of Risk related to files being exposed externally to users outside the organization. • Convertor Applications provides a perspective on data ownership for different kinds of data. Remember that CCI data is also available in Advanced Analytics to use along with data on incidents and alerts for a more holistic perspective on data ownership. Finally, trending data is available to see overall trends in DLP violations by application or destination country. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 5 Advanced Analytics - Cloud Risk Assessment The Cloud Risk Assessment dashboard provides a comprehensive view of risk related to cloud applications, highlighting different aspects of risk. For example, the Risky Cloud Applications chart shows the percentage of currently used applications in the network that are deemed risky according to the their CCI level. The doughnut charts alongside provide further breakdown of the cloud applications by CCL, number of bytes flowing through these applications, and how many of these are uploads vs. downloads. The next section provides information on the usage of risky applications by Organizational Units. The Data Protection section is a high-level view of top policy hits and top users. The Compliance section provides instance-level visibility for key aspects of compliance such as GDPR or certain certifications. The Users section provides the locations of users using different representations, similar to the CISO dashboards. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration • Application name • Category • Cloud Confidence Level • Instance • Sanctioned 2024 © Netskope. All Rights Reserved. 6 Data logged by Netskope Application User Activity File Source & Destination Alerts Others • Activity • Bytes uploaded/downloaded • Source IP address and location • Destination IP address and location • AD data (OU, user group, etc.) • Custom attributes (manager, department, etc.) • User name • User agent • Browser, OS • Device • Device classification • File name • Size • Exposure • Type • Path • Language • Shared with • Data Loss Prevention o Severity o Profile o Rule hits • Maware and malsites • Anomalies • User justification reason 500+ fields logged/derived As discussed before, Advanced Analytics provides access to the complete set of Cloud XD data. Almost anything available in the tenant UI can be included in your reports as a data attribute (with over 500 fields). You can combine and recombine this data in different ways to gain multiple perspectives on the security of your network. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 7 The Netskope difference Instance Awareness Managed vs Unmanaged Contextual visibility in cloud activity Advanced Analytics provides extensive visual customizations. The type of diagram shown here is the Sankey report, where you can see Netskope’s instance awareness capabilities to help you identify which applications are being used with which instances and then map them back to security concerns such as unmanaged cloud activity. The Sankey report provides contextual visibility into the type of cloud activity and provides details on what types of actions are being performed. These kinds of visualizations are powerful because they enable you to zero in on what kinds of actions your organization may need to take to strengthen the security posture or modify and shape user’s behavior. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 8 Extensive Visual Customizations Advanced Analytics also offers several other visualizations options such as geo-maps, trends, and thermometers for risk. Depending on whether the audience you need to communicate with is from the Risk team, upper management or the application owner, you can select from the different options to represent the data to the specific audience and drill down to the dataset to investigate further. 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 9 Standard Reports vs Advanced Analytics Capabilities Advanced AnalyticsStandard Reporting • Slice and dice ~500+ attributes for events and alerts • Report on API Protection, Incidents, Policies & CSA data sets • Availability of Active Directory data & custom attributes • Ability to report on detail & summary data • Slice and dice ~40 key attributes for events and alerts • Report on summary data Data Availability • Numerous visualization options to choose from: Bar, Pie, Area, Trend lines, Table, Pivots, Scatter plots, GeoMap • Advanced options like Sankey, Treemap, Gauge & others Basic visualizations: bar, pie, table, trend lines Visualizations • Additional predefined canned reports addressing different personas: such as security operations or executives; in different areas such as DLP, threats, usage etc. • Automated Cloud Risk Assessment • Interactive widgets & reports - ability to drill down 10 predefined canned reportsDashboards/Reports • Simplified report building experience • More export options like excel, txt, csv, pdf • Scheduling, sharing • Custom fields andIndex scores in your policies to determine what actions to take based on an app’s enterprise readiness. 2024 © Netskope. All Rights Reserved. 16 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Architecture Netskope Security Cloud Operation and Administration Welcome to the Architecture chapter in the Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2 • Describe how Netskope data center locations are set up • Explain Netskope steering methods 2024 © Netskope. All Rights Reserved. Objectives When you complete this chapter, you will be able to describe how Netskope data center locations are set up and explain Netskope steering methods. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration Architecture 3 • Data center locations • Steering • Netskope tenant admin UI 2024 © Netskope. All Rights Reserved. First, let’s talk about Netskope data center locations. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration The NewEdge Global Security Network * Indicates single DP regions where LZs increase resilience, in addition to ensuring a localized experience 2024 © Netskope. All Rights Reserved. 4 Here you can see the data centers that make up the NewEdge global security network. Today there are data centers in 70 regions globally, and more than 200 localization zones. Localization zones extend NewEdge global coverage by providing the same experience as direct-to-net, with native language and localized content support for all websites, even when there’s no in-country Data Plane. Netskope also has extensive peering with many of the leading cloud and SaaS providers, such as Microsoft, Google, Amazon Web Services, and more. Peering enables users to get onto the Netskope security network and access their applications as close to their geographical location as possible. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration 5 Management Plane (MP) • The system backend • Where metadata is processed, stored, and presented to admins • Where the web interface, API connections, and SMTP Proxy (Email DLP) functionality are located • Typically has large databases The Three Platforms of the Netskope Security Cloud Data Plane (DP) • Typically located remotely, close to users, to reduce latency and to increase performance and stability • Inline with customer traffic • Sends metadata to the MP for analysis Non-production environments Where the software is developed and tested before deployment to production environments 2024 © Netskope. All Rights Reserved. There are several components that make up the NewEdge network. The first of these is the Management Plane. This can be equated to the system backend, where metadata is processed, stored, and presented to Netskope tenant administrators, and where the tenant user interface, API connections, and Email DLP functionality reside. The Management Plane typically hosts a series of large databases that accommodate all the information that is presented in the Netskope tenant UI. The next component is the Data Plane. Typically, these are located remotely, as close to end users as possible to reduce latency and to increase performance and stability. The Data Plane examines inline user traffic in real time, sending metadata to the Management Plane for further analysis. Finally, there are non-production environments where Netskope develops and tests its software before deploying it to customer production environments. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 6 Tenant Config Data Store (Local) Customer Tenant Data Plane Data Store (NoSQL) Data Store (OLAP) Event Service Query Service Anomaly Detection Engine Management Plane from 50k Feet API SMTP ProxyUI Here is a graphical representation of the Management Plane, showing its relationship to the Netskope tenant UI, the API connectors, the SMTP Proxy Service, and the Data Plane. When you log in to the Netskope tenant, the web interface and tenant settings you interact with are stored in the Management Plane. When you create new policies, malware scanning profiles, and so on, all this information is stored in the Management Plane as part of the tenant configuration. When you configure a policy to perform DLP operations or scan for malware in data at rest in a SaaS or IaaS environment, or to detect misconfigured settings in a cloud resource as part of Security Posture analysis, these API calls are handled by the Management Plane. Additionally, the SMTP Proxy service used for Netskope Email DLP operations resides in the Management Plane. For real-time traffic that is steered through the Data Plane, events generated by user actions (such as files being blocked by a DLP policy or websites being blocked by a web category filtering policy) are sent from the Data Plane to the Management Plane’s Event Service and are then stored either in an OLAP data store or a NoSQL data store, depending on the version of your tenant. This enables you to log in to your Netskope tenant UI and use the Query Service to view and investigate these events. Finally, information about detected anomalies, such as anomalous user behavior, is fed into the Anomaly Detection Engine, which also resides in the Management Plane. This information is also stored in the Management Plane’s data stores, where it can be queried and analyzed. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration Management Plane Availability 7 • Management Plane (MP) is not globally distributed like the Data Plane (DP) • MP is designed to be highly available and fault tolerant within a single data center only • MP for a tenant cannot be renamed • MP cannot be moved 2024 © Netskope. All Rights Reserved. Unlike the Data Plane, the Management Plane is not distributed globally. The Management Plane is designed to be highly available and fault-tolerant within a single data center. However, it is not designed to fail-over to a different Management Plane. When Netskope is setting up your tenant for the first time, it is important that you communicate to your sales representative the exact naming structure you want to use, because once your tenant has been created, it can not be renamed. If you do decide you want a different name for your tenant after it has been created, you must ask for your existing tenant to be deleted and a new tenant to be created with the new name. Similarly, once you have selected the geographical zone where you want your Management Plane to reside, you can not move this location at a later date. For example, if your organization is located in the European Union, you would initially have your Management Plane created in this region to satisfy regulatory requirements, but if your organization later moves to a different region, you can not simply ask that your Management Plane be moved to the new location. Instead, you must request the removal of your existing Management Plane and have a new Management Plane created in the appropriate region. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration Data Plane Availability 8 The Netskope Data Plane is globally distributed across all data centers. • A Data Plane hosts multiple services (gateways, VPN, etc.). • By default, organizations are served by any data center globally, and they are automatically routed to an optimal Data Plane. • As new data centers are built, your organization will only be able to access the Data Plane in these new facilities if it’s in your assigned zone. • In almost all cases, organizations are assigned to the Global Zone, so they willfilters, table calculations, more sorting options Export to csv/pdf, scheduling, sharingOther features Here is a summary of the comparison between the capabilities of Standard Reporting and Advanced Analytics. Most important to note here is the significant additional number of data attributes that Advanced Analytics provides access to, enabling you to gain a more complete picture of the applications, users, incidents, and policies in your network. The advanced visualization options such as the Sankey, GeoMap, and Trendlines can help you represent the data in meaningful ways for specific audiences and analytical needs. Advanced Analytics has many more features and options available over Standard Reporting such as more export options, and more scheduling and sharing options. It also offers the ability to create custom fields and calculations. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 10 Advanced Analytics License Advanced Analytics is available for use with the purchase of a license. If you would like to enable it for your organization, please contact your Netskope representative for more information. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration Lab D: Netskope Advanced Analytics Time: 35 minutes 112024 © Netskope. All Rights Reserved. This chapter includes a lab to practice some of the concepts you learned about. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration Netskope Digital Experience Management 2024 © Netskope. All Rights Reserved. Netskope Security Cloud Operation and Administration Welcome to the Netskope Digital Experience Management chapter, in our Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 2 Objectives 2024 © Netskope. All Rights Reserved. Utilize the Digital Experience Management (DEM) dashboard to: – Monitor traffic speeds from your Netskope tenant – Identify traffic latency issues – Get insight into the performance of applications managed through the Netskope Cloud – Monitor the health and status of the Netskope platform 2 The objectives covered in this chapter explain how to utilize the Digital Experience Management dashboard to view and evaluate the traffic and performance of your tenant. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Implementation and Integration Netskope Digital Experience Management Agenda • DEM Features • Tenant Overview • Network Steering • Client Steering • NPA • Bandwidth Consumption 2024 © Netskope. All Rights Reserved. 3 Let’s look at the features of Netskope Digital Experience Management. Netskope Security Cloud Operation and Administration Digital Experience Management (DEM) 42024 © Netskope. All Rights Reserved. Netskope DEM provides insight to answer some important questions like: • What is the latency between the end user and Netskope Data Centers (Netskope NewEdge? • What about the latency between the Netskope NewEdge and Cloud Apps? • What is the amount of Client Connection Requests from the users to each Netskope Data Center? • How many Netskope clients are installed on your network? What client versions are running? • What IPsec and GRE tunnels are configured in your infrastructure? Digital Experience Management (DEM) provides insight into the performance of applications that are managed through the Netskope cloud. You can monitor the traffic speeds from your Netskope tenant and identify latency issues. Using real user traffic monitoring and analysis, you can improve user experience. DEM enables you to: • Monitor all traffic for a tenant in near real-time • Gain greater visibility into the health and status of the Netskope platform • Proactively monitor the user experience for SaaS, web, and private applications ============================================================================== Important terms used in network troubleshooting and performance: Latency: Amount of time that a packet takes to get from its source to its destination. It is measured in milliseconds (ms). Round Trip Time (RTT): The time it takes a packet to go from a source to its destination and back again to its original source (request-response). It is also measured in milliseconds (ms) Note: Netskope Sales or CSM team must be contacted to enable DEM on the Netskope Tenant. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration DEM Features 52024 © Netskope. All Rights Reserved. Summary of activity over the last seven days, including users, service consumption, traffic volume, sessions, data centers accessed. Filtered views by application, data center, or time frame are available to drill into client-side or cloud-to-application latency, as well as trend data on bytes transferred. Map view of configured GRE and IPsec tunnels, with insights into global distribution and number of tunnels in use at each data center, as well as near real-time status of tunnel health with details on throughput per tunnel. Visibility on users including active user counts, licensed seat counts, client versions being used, as well as uploaded and downloaded bytes. Filtered views by data center or time frame provide additional per-minute granularity on client connection requests, daily session counts, and client version usage trends. Specifically, for NPA, summary information on bytes transferred, data centers accessed, user and session counts, active publishers, and discovered applications. Filtered views by user, application, publisher, or time frame provide deeper insights and trend data on top applications, user activity, session counts, bytes transferred, triggered policies, and more. Provides information about the bandwidth consumption of various applications that can be filtered by event timestamp, application, user, source, IP, Netskope, POP, and access method. The options available in Digital Experience Management depends on the Netskope licensed products you have. One of the options listed here, NPA displays summary information on bytes transferred, data centers accessed, user and session counts, active publishers, and discovered applications. You can filter views by user, application, publisher, time frame, and more. 2024 © Netskope. All Rights Reserved. 5 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Implementation and Integration Netskope Digital Experience Management Agenda • DEM Features • Tenant Overview • Network Steering • Client Steering • NPA • Bandwidth Consumption 2024 © Netskope. All Rights Reserved. 6 Let’s look at the Tenant Overview section of Netskope Digital Experience Management. Netskope Security Cloud Operation and Administration Tenant Overview 72024 © Netskope. All Rights Reserved. Select the Netskope POP to get info from Select a Monitored App to get data. The list of Netskope Monitored Apps will grow as Netskope launches new DEM releases. Select access method. This option depends on the steering methods configured on the tenant. 1 2 3 Note: If you leave the option selected as “any value” it means that all POPs, Apps, and Access methods available will be shown. The widgets on the Tenant Overview page give you an overview of the traffic and performance of your tenant. There are two sets of widgets on this page. The widgets in the top section provide a summary of the last 7 days and cannot be filtered. The Filtered Widgets section provides information based on the timeframe you select using the filters on top of the page. In the filtered widgets section, you can select the Netskope POP to get information from, select a monitored app to get data, and select the access method. The access method option depends on the steeringautomatically be able to access all new DCs. 2024 © Netskope. All Rights Reserved. The Data Plane is globally distributed across all Netskope data centers. It hosts multiple services, such as client, IPsec, GRE, and Netskope Private Access gateways, as well as VPN gateways and other services. By default, an organization’s users are served by any data center globally, and they are automatically routed to the optimal Data Plane closest to their location. For example, if an employee of a company based in the United States travels to Australia, that user will connect to a Netskope Data Plane located in Australia. As a result of this design, users experience reduced latency, increased throughput, and fewer network issues. As new Netskope data centers are built throughout the world, an organization’s ability to access the Data Plane in these new facilities depends on the geographical zone that was assigned to them when their Netskope tenant was created. By default, Netskope customers are assigned to the Global Zone, so most organizations will automatically be able to access the Data Plane in every new data center that comes online. However, if a customer requested to be assigned to a more specific zone, such as the United States Zone, they will only be able to access new data centers in that zone. For example, if a new data center is built in Paris, France, organizations who are assigned to the United States Zone will not be able to access the Paris Data Plane. However, companies in the United States who are assigned to the Global Zone will be able to access this Data Plane. 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration Netskope Security Cloud Platform: High Availability 9 • Local traffic management within a data center location makes use of load-balanced redundant hardware. • Optional Global Traffic Management (GTM) between data center locations is load-balanced across redundant sites. • “Fail open” design for all Real-time Protection deployment methods; all protocols have built-in heartbeat mechanisms. 2024 © Netskope. All Rights Reserved. For high availability of the Netskope Security Cloud Platform, data centers are equipped with load-balanced redundant hardware. If any of that hardware goes down, Netskope uses Global Traffic Management to provide load-balancing across redundant sites. This causes traffic to be sent to the next nearest data center. Additionally, Netskope’s real-time protection models all use a fail-open design. In other words, if a failure occurs, Netskope allows all traffic to pass through, rather than using a fail-closed model where all traffic is blocked. All Netskope protocols have built-in heartbeat mechanisms that help determine whether to go into fail-open mode. For example, the Netskope client creates an SSL tunnel between itself and the Netskope tenant and sends out a heartbeat once per minute inside that tunnel. This mechanism determines whether the tunnel is up or down. If the tunnel is down, the client goes into fail-open mode and sends traffic out to the proxy firewall just like it was doing before. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration Architecture 10 • Datacenter Locations • Steering • Netskope tenant admin UI 2024 © Netskope. All Rights Reserved. Next, let’s discuss how the Netskope Security Cloud Platform steers traffic. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 11 How We Gather Data and Steer Traffic Out of Band ► Risk Exposure ► Visibility ► Data Governance ► Policy Control (Data at Rest) Inline ► Real-Time Policy Control ► Mobile Device Support ► Single Sign On (Reverse Proxy) ► SMTP Proxy www Log Streaming APIs Netskope Client GRE, IPsec Mobile Profile Explicit Proxy Proxy Chaining Reverse Proxy SMTP Proxy As discussed earlier in this course, Netskope provides out-of-band protection for data at rest in cloud apps, and inline protection for data in motion. These types of protection use a number of methods to gather data and steer traffic to the Netskope Security Cloud. Items in blue on this slide indicate methods used for out-of-band protection. • With log streaming, proxy or firewall logs are gathered from your on-premises network devices and sent to the Netskope Security Cloud, either directly or via a virtual Netskope appliance. Netskope extracts traffic information from this data and identifies the cloud apps being used in your organization and how these apps are being used. • Netskope APIs protect data stored in the cloud by authenticating and connecting to managed cloud apps and enforcing DLP and threat protection policies on files stored on those apps. Items in orange on the slide indicate steering methods for inline protection. • The most commonly-used steering method for inline traffic is the Netskope client. Client software is available for Windows, Mac, and Linux. • With IPsec and GRE tunnels, you can securely send port 80 and port 443 traffic to Netskope. • Available for IOS and Android devices, mobile profiles provide similar functionality to the Netskope client. • The Explicit Proxy steering method uses a PAC file on users’ computers to direct traffic to Netskope. • A PAC file is also used with the Proxy Chaining method, where users’ computers are first steered to an on- premises proxy server, which in turn steers traffic to the Netskope Security Cloud. • The Reverse Proxy steering method enables you to protect data flowing through unmanaged devices. It involves integrating with Identity Providers and Single Sign-On and applying different DLP policies depending on the user’s location, such as allowing sensitive files to be downloaded from a corporate instance of a cloud app if a user is in a corporate office, but blocking this activity if the user is in a remote location. • With the SMTP Proxy method, email traffic from Microsoft and Google email services is steered to Netskope, where the contents of the mail can be scanned and DLP policies can be enforced. 2024 © Netskope. All Rights Reserved. 11 Netskope Security Cloud Operation and Administration Differentiating Traffic 12 The Netskope platform can enforce different policies based on how a user is accessing resources (i.e., from a managed or unmanaged device). • On work laptop (Policy A) • On unmanaged device (Policy B) 2024 © Netskope. All Rights Reserved. Auth Proxy 3 4 5 Data Activity App (Instance) Identity TCP/IP SSL/TLS HTTP DAPII OS, Device, Browser SNI, UserID IP, GEO Location Micro Services A cc es s C on tr ol D LP T hr ea t P ro te ct io n E nc ry pt io n A ud it an d F or en si cs W E B Netskope PROXY … … META DATA ANALYTICS CCI UNIFIED POLICIES MANAGEMENT PLANE DATA PLANE REVERSE PROXY AUTH PROXY The Netskope Security Cloud platform can determine whether a user is accessing cloud resources from a managed or an unmanaged device. This opens up the possibility of enforcing different policies based on different access methods. For example, if you are on a work laptop, you might have Policy "A" applied to you which allows you to download and upload files on a corporate cloud app because you're accessing data from a managed device. However, when you come in on an unmanaged device through Reverse Proxy, for example, you might have Policy "B" applied to you which only allows you to view files but not transfer them. So whether you’re accessing cloud resources through the Netskope client, Reverse Proxy, GRE or IPsec tunnels and so forth, Netskope can apply different controls to data based on the delivery mechanism or access method. 2024 © Netskope. All Rights Reserved. 12 Netskope Security Cloud Operation and Administration Differentiating Traffic: Netskope Client 13 • A device is managed when it has the Netskopeclient installed and enabled. • When a managed device has the client installed, the SSL termination request comes from an SSL Tunnel IP. • The authentication request can be viewed in the client certificate. – This device is using a client. – It is a trusted device. – The device is using a Real-time Protection deployment method. 2024 © Netskope. All Rights Reserved. Subject: C=US, ST=CA, L=Los Altos, O=Netskope Inc, OU=a0086ca398d1354afb6e204634fc8cf2, CN=dsinclair@netskope.com/emailAddress=dsinclair@netskope.com Auth Proxy 3 4 5 Data Activity App (Instance) Identity TCP/IP SSL/TLS HTTP DAPII OS, Device, Browser SNI, UserID IP, GEO Location Micro Services A cc es s C on tr ol D LP T hr ea t P ro te ct io n E nc ry pt io n A ud it an d F or en si cs W E B Netskope PROXY … … META DATA ANALYTICS CCI UNIFIED POLICIES MANAGEMENT PLANE DATA PLANE REVERSE PROXY AUTH PROXY Let's take a closer look at how traffic differentiation works when data arrives at the Netskope tenant from a managed device, or more specifically, from a device where the Netskope client is installed and enabled and has passed security posture checks. As part of the process of installing the Netskope client on an endpoint device, a certificate is downloaded to the endpoint. This establishes a trust relationship between the endpoint and the Netskope tenant and enables the tenant to decrypt SSL traffic coming from the device. Additionally, the client is deployed with admin rights, so it can look up the user that is currently logged in to the device and send that information to the Netskope tenant for correlation with the user information already in the tenant. When the Netskope client is installed and enabled on a device, traffic arriving at the Netskope tenant from that device always travels up the Netskope stack. First, it goes through the TCP/IP level, where the device's IP address is extracted and its geolocation is determined. Next, the traffic is sent to the SSL decryption engine, where the Server Name Indication value and the User ID are extracted. At this point, the traffic is clear text and can be sent through an HTTP process, where the operating system, device, and web browser are identified. Next, the data is sent to the Deep API Inspection Engine. From here, the identity of the user, the application or application instance that is being used, and any activities that are being performed are all extracted. Lastly, the data the user is working with is extracted and sent to the microservices such as access control, DLP, threat protection, encryption, audit, forensics, web, and so on. At this point, policy decisions are made, such as blocking or allowing file downloads or uploads, delivering notifications to train users, and so forth. 2024 © Netskope. All Rights Reserved. 13 Netskope Security Cloud Operation and Administration Differentiating Traffic: Reverse Proxy 14 When an unmanaged device uses SAML to authenticate with the Auth Proxy, the SSL termination request comes from the Reverse Proxy IP. A device is identified as unmanaged when it does not have Netskope client installed, or the client has been disabled. • It is an untrusted device. • A unique policy set can be created for untrusted devices. 2024 © Netskope. All Rights Reserved. Auth Proxy 3 4 5 Data Activity App (Instance) Identity TCP/IP SSL/TLS HTTP DAPII OS, Device, Browser SNI, UserID IP, GEO Location Micro Services A cc es s C on tr ol D LP T hr ea t P ro te ct io n E nc ry pt io n A ud it an d F or en si cs W E B Netskope PROXY … … META DATA ANALYTICS CCI UNIFIED POLICIES MANAGEMENT PLANE DATA PLANE REVERSE PROXY AUTH PROXY SAML IdP Next, let's talk about how traffic differentiation works when data arrives at the Netskope tenant from an unmanaged device. An unmanaged device could be a personal device that does not have the Netskope client installed on it, or it could be a corporate device that has the Netskope client installed but not enabled, basically turning it into an unmanaged asset. In either case, Netskope sees the device as untrusted. This is a use case for Reverse Proxy. With the Reverse Proxy method, when traffic from an unmanaged, untrusted device arrives at the Netskope tenant, it does not immediately go up the stack like traffic from managed devices does. Instead, the unmanaged device will be integrated with SAML via an Identity Provider such as Okta, and that Identity Provider will communicate with the Netskope Authentication Proxy. The Authentication Proxy then communicates back to the Reverse Proxy component. Note that the Authentication Proxy and the Reverse Proxy components are both located on the Netskope tenant. Once the unmanaged device is identified by SAML and authenticated to go through the Reverse Proxy, its traffic goes up the Netskope stack just like the Netskope client example. The ability to differentiate Reverse Proxy traffic as it arrives at the Netskope tenant means that you can create a unique policy set for unmanaged, untrusted devices. 2024 © Netskope. All Rights Reserved. 14 Netskope Security Cloud Operation and Administration Proxy Chaining 15 Netskope requires: • The public NAT’d IP of your organization’s on-premises proxy • Installation of the Netskope CA cert on your on-premises proxy • The X-Forwarded-For and X-Authenticated-User headers 2024 © Netskope. All Rights Reserved. IP Proxy NAT Now let's consider the Proxy Chaining method of steering. There are a couple of requirements that must be met to use Proxy Chaining. First, you must configure your Netskope tenant with the public NAT'd IP address of your organization's on-premises proxy server so your tenant knows to expect traffic from the proxy. Next, you must install the Netskope Root Certificate on your proxy server to establish a trust relationship between your proxy and the Netskope Security Cloud proxy. Finally, you must configure the Netskope tenant with the X-Forwarded-For and X-Authenticated-User headers originating from your source user traffic. The X-Forwarded-For header provides the IP address of the endpoint device where the traffic originated from. Without this information, the Netskope tenant would only receive the IP address of your on-premises proxy server. The X-Authenticated-User header provides information about the specific user who is generating the traffic on their endpoint device, as opposed to just a user account or service account on your on-premises proxy. Without this header, all the traffic arriving at the Netskope tenant from your onsite proxy, regardless of how many individual users are actually generating the traffic, would appear to be coming from a single user on the proxy server. 2024 © Netskope. All Rights Reserved. 15 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 16 Unmanaged DevicesManaged Devices Off-PremisesOn-PremisesOff-PremisesOn-Premises Managed App Unmanaged Instance or App Netskope Client IPSec GRE SD-WAN Explicit Proxy IPSec GRE SD-WAN Netskope Client Explicit Proxy Netskope Client Explicit Proxy IPSec GRE SD-WAN Netskope Client Explicit Proxy IPSec GRE SD-WAN Recommended Steering Method Note: SSL Decryption will need to be bypassed for devices without a certificate Comparing Traffic Steering Methods The table on this slide provides a side-by-side comparison of the various methods available for steering traffic to the Netskope tenant and when each method can be used. It also indicates the recommended method for a given set of circumstances, such as whether the traffic is coming from a managed or unmanaged device, on premises or off premises, or from a managed or unmanaged cloud app. 2024 © Netskope. All Rights Reserved. 16 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. Cloud Confidence Index (CCI)Netskope Security Cloud Operation and Administration Welcome to the Cloud Confidence Index chapter in the Netskope Security Cloud Operation and Administration Course. 2024 © Netskope. All Rights Reserved. 1 Netskope Security Cloud Operation and Administration 2 • Explain the functionality of the Cloud Confidence Index (CCI) • Discuss how to use CCI 2024 © Netskope. All Rights Reserved. Objectives The objectives of this chapter are to explain the functionality of the Cloud Confidence Index and to discuss how to use this index. 2024 © Netskope. All Rights Reserved. 2 Netskope Security Cloud Operation and Administration Cloud Confidence Index™ Use cases 3 • Discover cloud applications and application overlap. • Optimize app license usage. – Detect apps for which you have more licenses than users. – Detect apps for which you have more users than licenses. • Identify non-compliant apps. – Which apps don’t encrypt my data at rest? – Which apps have unclear ownership terms? 2024 © Netskope. All Rights Reserved. The Cloud Confidence Index, or CCI, helps you discover cloud applications in your organization and understand how these applications are being used. For example, if Netskope discovers that Box is being used in your company, it keeps track of such information as top users, session counts, the amounts of data being downloaded from and uploaded to Box, and so forth. All of these details are sent to CCI. CCI also helps you identify similar cloud applications being used in your environment so that you can consolidate to make administration easier. For example, if you discover that 10 cloud storage apps are being used in your organization, CCI can help you identify the 5 best cloud storage apps that meet users needs. CCI can also help you optimize application license usage by showing you which apps have more licenses than users, enabling you to reduce the number of licenses you have and save money. Conversely, CCI can help you identify if you have more users than licenses and need to purchase more licenses for your most-used cloud applications. CCI also enables you to identify apps that are not compliant with your organization's security requirements so you can find better alternatives. There are many reasons why an application might be non-compliant. For example, if you are a regulated industry that deals with payment card data, a non-compliant cloud app would be one that does not encrypt data at rest. If your organization deals with important intellectual property, a non-compliant cloud app might be one that has unclear terms about who owns the data once it is stored on the app. 2024 © Netskope. All Rights Reserved. 3 Netskope Security Cloud Operation and Administration Cloud Confidence Index™ The Database 4 • Netskope database (70,000+ apps) • Quickly verify an app’s enterprise readiness • Find the best apps per category • Search engine/ advanced queries 2024 © Netskope. All Rights Reserved. The Cloud Confidence Index database currently includes more than 70,000 applications, and that number is constantly increasing with every platform release. As we mentioned earlier, the CCI database enables you to quickly verify the enterprise-readiness of a cloud app and to find the apps with the best security ratings in each category. Additionally, you can use the CCI search engine to perform a simple search for a specific app, or you can use advanced query capabilities to filter by sets of app properties. 2024 © Netskope. All Rights Reserved. 4 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 5 CCI filtering CCI apps can be filtered by: ExamplesAttribute Excellent, High, Medium, Low, Poor, Discovery Only Cloud Confidence Level (CCL) Application Suite, Cloud Storage, Cloud Backup, Webmail, etc. Application category All, Discovered, CustomizedApplication range sanctioned, consumer, departmental, enterprisePre-defined tags Any customer-created tagsCustom tags For help on advanced CCI queries, go to docs.netskope.com and search for: Skope IT Query Language Here are the different categories of app properties or attributes that can be queried using the Advanced Search functionality in CCI. First, you can filter by Cloud Confidence Level. We will talk about these levels in more detail on the next slide. You can also filter by application category, such as Application Suite, Cloud Storage, Cloud Backup, Webmail, and so forth. Note that in the context of the CCI search engine, application category refers to CASB app categories only. This differs from the categories you can select in Real-time Protection policies, which encompass both CASB and website categories. Next, you can filter by application range. The available ranges are All, Discovered, and Customized. If you want to filter by applications that the Netskope tenant has not yet seen on your network, you should filter by the All application range. To filter by apps that have already been seen on your network, use the Discovered range. If you want to filter by apps whose attribute risk weights you have adjusted in CCI, you would select the Customized range. Next, you can filter by pre-defined tags that have been applied to apps, such as sanctioned, consumer, departmental, or enterprise. Note that pre-defined tags are just text values built into the system for the sake of convenience, and they do not hold any particular significance to CCI. You can manually apply pre-defined tags to apps as you see fit. Finally, you can filter by custom tags. You can assign any text to custom tags and then apply the tags to apps in the CCI database so you can filter searches by tags that have significance to you. For more detailed information on writing advanced CCI queries, visit the docs.netskope.com website and search for “Skope IT Query Language”. 2024 © Netskope. All Rights Reserved. 5 Netskope Security Cloud Operation and Administration The Cloud Confidence Level (CCL) 6 • Based on a score (between 0 and 100) representing the enterprise readiness of a cloud app • Consists of 5 score groups and a “Discovery Only” group: – Poor = 0 to 49 – Low = 50 to 59 – Medium = 60 to 74 – High = 75 to 89 – Excellent = 90 to 100 – Discovery Only 2024 © Netskope. All Rights Reserved. Each app in the Cloud Confidence Index database is assigned an enterprise-readiness score of 0-100. Based on that score, the app is placed into a Cloud Confidence Level. These levels are Poor, Low, Medium, High, and Excellent. Each level consists of a specific range of CCI scores and is represented by a color-coded icon in the CCI interface. If an app is discovered in your environment but does not yet have an entry in the CCI database, it is assigned to the Discovery-Only group. 2024 © Netskope. All Rights Reserved. 6 Netskope Security Cloud Operation and Administration Cloud Confidence Index™ How does Netskope gather the information? 7 Netskope has a team of engineers and legal specialists to investigate applications. 2024 © Netskope. All Rights Reserved. Public Non-Technical Information Information from App Website Business Name Physical Address Favicon App Capability Years of Existence And more … Public Technical information Myip.ms info – IP, Hosting Provider, DNS host, IP range DR and Business Continuity features Data Retention Polices Data Ownership Policies Log Policies And more … Derived Information Information from Hosting Provider like AWS or Equinix Compliance and DR information from Hosting Providers Hosting Provider Locations and Geography Private SaaS Provider information Application Specific Information Trials and decoding of Application Questionnaire with pre-filled answers to SaaS provider introducing Netskope as a Security Broker Netskope has a dedicated team of engineers and legal specialists who are tasked with keeping up with changes to the enterprise-readiness of apps inthe CCI database, as well as investigating cloud apps that have not yet been added to CCI. The engineers on the team pull apps apart from a technical perspective, seeing how they work and how they process data, and verifying vendor claims about product features and functionality. The legal specialists verify vendor claims about secure handling of customer data and meeting regulatory compliance requirements. The team gathers as much information as possible from a variety of sources. As shown on the slide, these sources include the following: • Public non-technical information available on the app vendor's website, such as business name, physical address, advertised app capabilities, the length of time the vendor has been in business, and so on. • Public technical information, such as hosting provider, DNS host, business continuity plans, data retention and data ownership policies, and more. • Derived information, such as compliance and disaster recovery policies of hosting providers and the physical locations of hosting provider facilities. • Private SaaS provider information, which is collected by testing the app in a lab environment to observe its behavior and see how it handles data. The team then sends their findings to the app vendor in the form of a questionnaire with the answers filled out, presents themselves as a security broker, and asks the vendor to verify the accuracy of their findings. 2024 © Netskope. All Rights Reserved. 7 Netskope Security Cloud Operation and Administration Customizing attribute risk weights 8 • Organizations might want to change the default risk weights of the app attributes used to determine CCI scores. 2024 © Netskope. All Rights Reserved. • Custom weighting is: – Performed on a per-attribute basis. – Accomplished by moving a slider left to a negative value (less important) or right to a positive value (more important). – Added to the penalties associated with the app to determine the final CCI score. The CCI score is an objective score determined by examining a wide range of cloud app attributes. Netskope assigns a default risk weight to each attribute, but your organization might find that it places a different degree of importance on some attributes. For example, you might find it very important for an app vendor to maintain a backup of customer data in a different geographic location than their main datacenter, while Netskope assigns a medium importance to this consideration by default. To accommodate the need to adjust risk weights, Netskope enables you to personalize settings on a per-attribute basis. The risk weight for each attribute is expressed as an integer. By default, Netskope assigns a risk weight of 0 to each attribute. You can adjust a weight to a negative value if you consider an attribute to be less important to you, or to a positive value if you consider it more important. Netskope adds your customized risk weights to the penalties associated with the app to determine the app’s final CCI score. 2024 © Netskope. All Rights Reserved. 8 Netskope Security Cloud Operation and Administration Viewing application details 92024 © Netskope. All Rights Reserved. To view app details and edit attribute risk weights, search for the app by name and click the app's link in the search results. 2024 © Netskope. All Rights Reserved. 9 Netskope Security Cloud Operation and Administration CCI attribute refresh 10 • P1 apps = 6 months • P2 apps = 12 months • All other = On demand To request re-evaluation of an existing app in CCI, click Report/Request on the app’s details page. 2024 © Netskope. All Rights Reserved. To request evaluation of an app not currently in CCI, click Request New App on the CCI landing page. Netskope updates information in the Cloud Confidence Index on a prioritized basis. Priority 1 apps are re- evaluated at least every 6 months, while Priority 2 apps are re-evaluated every 12 months. All other apps are updated on request. If you want to request re-evaluation of an app because you think that Netskope's information about specific app attributes is incorrect, you can click the Report/Request button in the app's detail page. If you want to request a new evaluation of an app that is not currently in the Cloud Confidence Index database, you can click Request New App on the CCI landing page. 2024 © Netskope. All Rights Reserved. 10 Netskope Security Cloud Operation and Administration 2024 © Netskope. All Rights Reserved. 11 CCI Score Cloud Confidence Level ENTERPRISE-READY Excellent90 – 100 High75 – 89 NOT ENTERPRISE-READY Medium60 – 74 Low50 – 59 Poor0 – 49 The seven categories of the Cloud Confidence Index and their relative importance Disaster Recovery and Business Continuity How robust is the app vendor’s data infrastructure? Auditability What level of detail/traceability (if any) is provided in the audit logs? Attack Surface Management Is the app susceptible to attacks that could lead to a data breach? Data Protection What data protection capabilities are offered? What data classification, encryption, and security features are employed? Legal and Privacy How does the app handle data ownership and privacy? How is privacy handled in mobile vs. browser environments? Certifications and Standards Does the app comply with data center regulations or compliance certifications? Access Control How does the app manage role-based access or enforce authorization policy? CLOUD CONFIDENCE INDEX • Uses a system of rewards and penalties to derive a score for every cloud service. • Rewards and penalties are based on 40+ security attributes within seven categories. • Only attributes relevant to the cloud service (or category) are used, e.g.: • Consumer cloud services are not penalized for lacking encryption at rest. • Finance cloud services are penalized significantly for lacking encryption at rest. • Scores are normalized to take into account the highest possible score in each category. This is used to calculate each cloud service’s score and provide parity across categories. Cloud Confidence Index: What determines score? ⇢ The application attributes on which Netskope bases its CCI scores are grouped into the 7 different categories shown on the left side of this slide. Note that these categories carry different weights of importance in calculating a CCI score, as indicated by the colored bars in the diagram. The “Legal and Privacy” category carries the greatest weight of importance, while “Disaster Recovery and Business Continuity” carries the least weight, with the other 5 categories falling somewhere in between. When you customize risk weights for various app attributes by moving sliders to a higher or lower value, you are in effect increasing or decreasing the weight of importance of these 7 categories. Your changes to the default values are fed into the algorithm that is used to calculate the final CCI score. Once final scores are calculated, apps are assigned to one of the Cloud Confidence Levels, as mentioned earlier. You can use these levels in Real-time Protection policies to control users' access to cloud apps. For example, you could build a policy for cloud storage applications that only allows users to upload files to those apps if they are at a Cloud Confidence Level of “Excellent” or “High”, and to block all access to apps that are at the “Medium”, “Low”, or “Poor” level. When you are using policies based on Cloud Confidence Levels, keep in mind that CCI scores are dynamic. For example, a cloud app might have a CCI score of 59 today, placing it in the “Low” Cloud Confidence Level. However, if the app's vendor significantly improves the enterprise-readiness of their app in the coming months, its CCI score might increase to an 80 at a later time, placing it at the “High” level. Consequently, an app that is being blocked today by a policy that is based on Cloud Confidence Levels might suddenly