Netskope SSE Demo Lab Guide
Netskope SSE Demo Lab Guide
2024
Prerequisites
1. Have access to a Netskope tenant. For the development of this guide you will be given
access to a laboratory tenant.
2. A client machine (Windows, MacOS) with administrator privileges to install the Netskope
agent.
3. Install the Netskope agent on the client machine to be used in this lab.
Amazon Workspace
A remote desktop will be enabled in Amazon Workspace to use it as a client machine and install
Netskope client. It is recommended to install the Amazon Workspaces client to have a better
experience interacting with the desktop. You can download it from the following link:
1. Navigate to Settings > Security Cloud Platform > Netskope Client > Users page
2. Click on New Users
3. Add the email address and make sure to activate the Send Email invite option.
Field Value
Template Name <User> NetskopeSSE - Activities control of Risky Apps
Logo Select an existing one, or select Create New
Title Control of Activities in Hazardous Applications
Field Value
Source Assigned user
Destination > Category Cloud Backup, Cloud Storage,
Collaboration, HR, Social, Consumer,
Web mail, File/Software Download Sites,
Files Repositories, File Converter
Activities & Constraints Upload, Download
Criteria> CCL Low, Poor & Unknown
Profile & Action > Action Block
Profile & Action > Template <User> NetskopeSSE - Activities control
of Risky Apps
Set Policy <user> SSE -Prevent uploads downloads
from untrusted apps
https://www.freepdfconvert.com/
1.13. Verify the alerts and log of blocked activities in SkopeIT. Identify to which category
the sites belong and the CCL (Cloud Confidence Level).
▪ File Storage application such as OneDrive or GDrive, on which you have a corporate
type account and a personal account.
▪ Additional cloud applications to use as possible means of exfiltration of sensitive
data; Microsoft Teams, Slack, LinkedIn.
▪ Test files with sensitive data to trigger DLP incidents, download from:
https://drive.google.com/drive/folders/1KHOwPXpPmJ7Ua9h7nbMhZ1HxGG9p73_4?usp=share_link
To control the actions that users can perform on non-corporate cloud instances, a Constrain will
be used to define non-corporate instances.
Constraint configuration
Note: In Destination Cloud App, use a cloud storage application, where you have
access to a corporate and a personal instance. Gdrive, Microsoft Office 365 OneDrive
for Business, Box, etc.
Field Value
Source User =User assigned
Destination > Google Drive, Microsoft Office 365 OneDrive for Business
Application
Activities & Constraints Activity= All > From User = <user>SSE Corporate
Profile & Action Action: Allow
Set Policy <user> SSE- Monitoring activities Corporate Instances
Note: Remember best practices regarding the order of policies, make adjustments to
the order of policies if required, so that this Corporate Instance Exception policy is at
the top before any General Blocking.
Real Time policy configuration for blocking the movement of any document with
sensitive data using PCI DLP profiles and Image Classification with ML.
Field Value
Template Name <User> Netskope SSE - Block sensitive data movement
Logo Select an existing one, or select Create New
Title Notification of unauthorized movement of sensitive data
Subtitle {{NS_ACTIVITY}} {{NS_FILENAME}} using {{NS_APP}}
Message You are attempting to make an unauthorized movement of
sensitive data outside the organization. This request has
been blocked and a DLP incident has been generated.
Action Buttons Configure actions to: Block
Acknowledge Button: OK
Field Value
Source Assigned user
Destination > Category <user>All Categories
Activities & Constraints Activity= Upload, FormPost
Profile & Action DLP Profile= Payment Card Industry Data Security
Standard PCI-DSS (predefined), ML Image Classifier
(custom)
Profile & Action Action: Block Template:<User> Netskope SSE - Block
sensitive data movement
Set Policy <user> Netskope SSE - Block sensitive data movement
Real Time policy configuration for sensitive data post blocking using PCI DLP profiles and
Image Classification with ML.
Field Value
Source Assigned user
Destination > Slack, Microsoft Teams, LinkedIn
Application
Activities & Constraints Activity= Upload, Post
Profile & Action DLP Profile= Payment Card Industry Data Security
Standard PCI-DSS (predefined), ML Image Classifier
(custom)
Profile & Action Action: Block Template:<User> Netskope SSE - Block
sensitive data movement
Set Policy <user> Netskope SSE - Block Sensitive Data post
Note: Make sure that this policy comes before the general sensitive data movement
control policy previously created.
2.36. Log in to a personal instance of One Drive/ Gdrive and try to upload the Uber
Invoice.pdf file. This action should be blocked.
2.37. Log in to One Drive/ Gdrive corporate instance and try to upload the Uber
Invoice.pdf file. This action should be allowed
2.38. Open the PDF and copy the sensitive information, user name and all credit card data
INCLUDING the date and security code,
This use case uses the malware protection and dangerous site access
policies which should always be configured as a baseline on any
Netskope tenant.
Apply the Default Malware Scan profile to all web traffic downloads.
Field Value
Template Name <User> Netskope SSE- Block Malware
Logo Select an existing one, or select Create New
Title Malware Detected
Subtitle {{NS_ACTIVITY}} {{NS_FILENAME}} using {{NS_APP}}
Acknowledge Button: OK
Field Value
Source Assigned user
Destination > Category Select all the categories that appear
Activities & Constraints Download, Upload
Profile & Action > Default Malware Scan (pre-defined)
Threat Protection
Profile
Profile & Action > Low Severity > Action: Block > Template:<User>
Threat Protection Netskope SSE- Block Malware Remediation: None
Profile Medium Severity > Action: Block > Template:<User>
Netskope SSE- Block Malware Remediation: None
High Severity > Action: Block > Template:<User>
Netskope SSE- Block Malware Remediation: None
High Severity > Action: Block > Template: <User
Netskope SSE- Block Malware Remediation: None
Set Policy <user> SSE - Block Malware Internet
https://www.eicar.org/download-anti-malware-testfile/
Field Value
Template Name <User> Netskope SSE - High Risk Activity Detected
Logo Select an existing one, or select Create New
Title High Risk Activity Detected
Message Access to the requested website has been blocked because
it is considered a high-risk site belonging to the
{{NS_CATEGORY}} category.
Acknowledge Button: OK
Field Value
Source Assigned user
Destination > Category Select all Security Risk categories
Activities & Constraints Browse
Profile & Action Action: Block Template:<User> Netskope SSE - High
Risk Activity Detected
Set Policy <user> SSE - Block Malicious Sites
https://drive.google.com/drive/folders/1IgOjhYMjohw3mFBGKlgEJuFl7jjkJwnc?usp=share_link
3.26. Check for blocked malicious sites in the Incidents > Malicious Sites section.
4.1. Login to the Netskope tenant, then Policies > Profiles > Web > URL Lists and
click on New URL List.
4.2. Name the list using the <user> Isolation URLs convention and add the following
URLs: cnet.com and *.cnet.com. Add any other sites you want to test with. Save
and Apply Changes.
4.3. Click on Custom Categories, then select New Custom category. Assign a name
using the <user> Isolation Categories convention. Add the URL list created in the
previous step in the URL List (Include) section. Click Save and Apply Changes.
Field Value
User <your user>
Destination>Category Uncategorized, Newly Registered Domain,
Parked Domains, No Content, <user>
Isolation Categories
Profile & Action Isolate
Set Policy SSE - Browser Isolation Uncategorized
WebSites
Status Enabled
Note: You will receive a warning when using a custom category, skip the warning
and continue with the policy configuration.
▪ File download disabled: Enter the following URLs and try to download any file.
Please note the result of this action.
▪ https://download.cnet.com
▪ Restricted actions (Printing & Clipboard limited): Try to print the page with the
command (win: ctrl + P, mac: Command + P). Likewise, right click on an isolated
page, check what options are available in clipboard compared to an unisolated
page. Check the result of this action.
Field Value
Template Name <User> Netskope SSE - Youtube Navigation Control
Logo Select an existing one, or select Create New
Title Access to non-corporate content
Message Access to the content of these types of channels in
{{NS_APP}} is prohibited and has been blocked by the
{{NS_POLICY_NAME}} policy.
Acknoledge Button: OK
Field Value
Source Assigned user
Destination > Application YouTube
Activities & Constraints Activity= View
Profile & Action Action: Block Template:<User> Netskope SSE -
Youtube Navigation Control
Set Policy <user> SSE - Block Cloud Apps prohibited
Field Value
Source Assigned user
Destination > Application YouTube
Activities & Constraints Activity= ViewObject Type: Education
Profile & Action Action: Allow
Set Policy <user> SSE - Granular Access to Youtube
5.19. From YouTube search type the name of any university to enter their respective
channels. The content of these YouTube channels must be allowed to be related to
Education.
5.20. Check the alerts generated in SkopeIT > Alerts. Identify the ID of the education
channels and create a policy to only allow access to this specific channel.
This scenario is going to work with an architecture on the AWS cloud, in which there are private
resources of the DogCorp.local domain, to which it is intended to have secure remote access
through ZTNA.
6.1. Navigate to Policies > Real time Protection and add your user to the Remote Access -
Windows Administrator policy. This policy only gives access to websites published on two
private servers (one with Windows Server OS and one with Ubuntu OS), as well as
administrator access via RDP to the Windows server.
7.1. Check the new behavioral anomaly rules that were incorporated in the latest releases of the
platform, go to Policies> Behavior Analytics. High-performance activities
7.2. Check your user's current trust score. Go to Incidents> Behavior Analytics. Check how many
events and what type of events have reduced your trust score.
Taking into account that the previous scenario allowed us to significantly decrease the trust
score of a user, we will use this score as a criterion to define whether to block access to
corporate instances.
Field Value
Template Name <User> Netskope SSE Risky user detected
Logo Select an existing one, or select Create New
Title Potentially risky user detection
Message Downloading and sharing files in corporate instances has
been blocked due to the risk score reported by the user.
Acknoledge Button: OK
Field Value
Source Add Criteria > Select lower than the value of your user's current
User Confidence confidence score.
Destination > App OneDrive or corporate GDrive previously defined
Instance
Activities & Constraints Download, Share