Skip to main content

Integrating SentinelOne and Netskope to leverage threat detection and enforce device classification provides a robust endpoint-to-cloud security approach.This integration facilitates effective device classification and management, enabling consistent security policies across both cloud and endpoint environments.

 

Requirements:

  1. SentinelOne Admin Access
  2. Netskope Tenant

 

Implementation:

SentinelOne Configuration

Configure the script on SentinelOne Tenant > Remote Ops > Create New

AD_4nXfxUUjPJceGLyDVfQHQT7rguFuswY_wC-TcoGFFY5gFUPgBvN5kc90QgdcUa4GxpME8YBNjl-FaEYSHwAX8hoNZkpUBwoyONyOgkuLa7Dj6tbMrWUSm2HlHTBShKwglFCg6k6O3fVvlt6c2F5yKqi-05nr4?key=q7dbh649IcZ9gJ1To56X8A








 

Click on Upload New Script and provide the script details

AD_4nXdrvly-qO-fnnsa5wHVJk1Gj2I-mjWpVUA1TKnzyyhuftncWXaGPm6kbfUWBcDcDybBm7uM7LSxYp4Q3b79TtKS-CjHMD6aRFE5fQ8elv_8Nep1xtZSxyc4l2OHCiBUQYCDNhFgZ6BcC9Aea3RyuJA07y4m?key=q7dbh649IcZ9gJ1To56X8A

 

Upload the script

 

AD_4nXe7QIkYhNF369kYJdu1R9MFzOVPgQXaog-AvJASqY_l4KwaKxUcAc54RDq1FAWKqxH3yZJRPbu-LkYS2i6iOHilp4ZTHeqw2LewpkRZelMHQBIRJYbhq6SNAJ4XuDcD8qcxM4r7_y7vuNz9LrpPbuMVrTo?key=q7dbh649IcZ9gJ1To56X8A

Script content:

This script will create an empty file with a specific file name in a specific directory that Netskope's client will look at and It will be created when there is high risk as determined by SentinelOne - and when the Netskope client sees this, it will be able to match on the device and respond appropriately.


 

# Define the directory and file path

$targetDirectory = "C:\ProgramData\Sentinel\Addons\SentinelRSO"

$filePath = Join-Path -Path $targetDirectory -ChildPath 'Netskope_S1_high.txt'

 

# Ensure the directory exists; create it if it does not

if (!(Test-Path -Path $targetDirectory)) {

   New-Item -Path $targetDirectory -ItemType Directory -Force

}

 

# Create an empty file in the specified directory

New-Item -Path $filePath -ItemType File -Force

 

# Output the exact file path

Write-Output "File created at: $filePath"


 

Script setting to be default

 

AD_4nXdLimGD7k_d57-yhFojXWDRfVpLRYUEqTbisK6IPjXkYeLvIVbm9rlUQX6jfx85PZwjwbWaYr9jp9v8uB_OggYtE4OrGf-tBY_EUZ9pdmPXT3eBZRnz_pFPw0uXJOq228SRANio18jegPPCJPTGrwQrlydL?key=q7dbh649IcZ9gJ1To56X8A

 

Click on Next and Click on Save

AD_4nXfo630rCgl9E8O01Ru0sd41ZyaWT7Y5hU2DWIOSMHJZARjJb2vYeYqhcOR5WbNTqeq_0C0NCPomMfZ7QEFLS1rkRwUrUnaiMmIpgX7MMwHGQnz6LMNdIRfCns58ApEvM6fJlvWGeC1GedkFnyNxuIZBNFEU?key=q7dbh649IcZ9gJ1To56X8A

 

Now let’s go to the Singularity Marketplace to configure the SentinelRemote Ops Plugin

 

AD_4nXcYo0LgpkItSFw9tDp1-9uWUug-ys8AeoYv1Hb33qXb9xouWri1hbTsb_5-zeEUuMKQEyFXQ7yULYUd1ZYIl5iRvE-kXJpvHegf649VBhaMsUWoHVhv5HcqblkIR22kZa-iTyX-p6NantEqnROOyAO7qxal?key=q7dbh649IcZ9gJ1To56X8A


 

Provide all the required information for the configuration to run the Script ID created in the last step. All the other details you can modify for your own requirements.

 

AD_4nXcNLWSGP94sGGsZvldqRW7guUJT4PqPu4cbys_Klh3N-VzHM6tSzhn5LRGcv6LmP4V4ijL1TsGSA3K-TSugfHetU6oFxjC3qDRtVO958RvIe6rrbUJVF_jp4CXHJrzCOEOPF4imRo8Bslhmfo3h5A0AMbrN?key=q7dbh649IcZ9gJ1To56X8A

 

Netskope Configuration

 

Create the Custom Device Classification Rule

Go to Settings > Manage > Device Classification

 

AD_4nXcFLp5vZy_SrtAMgt2Wv_o0p-qDekA2kFQTVSwFrXgh2kuF5KPbEMKb7GWIiKJ3Pd-ym5K9zZRE0sSBAsdbucHco4-PAObVjlCDaMn0aXk4VpHK6LgMvhDz-jcQIiER3HR8mvJUK2vXgKAusD4vLe_jvxM?key=q7dbh649IcZ9gJ1To56X8A

 

Put the file location you’re going to create using the automation script in the particular drive and click on save

 

AD_4nXerPRvazzWHL099kDPDJB6y8jnC1-olJkMhuCMByXdzVIFTbSVqNkGmFIm18u8o3yIgXMhmXvANVk2CTI_1G4bCvjmbwPBR26FNYtLI_Av4dDk_XHKbEGACrfXq2SSMyOCyy_K6BMwbEYrep5DtMqmE-FUy?key=q7dbh649IcZ9gJ1To56X8A

 

Let’s create a policy for Risky Device classification and block all the action if any malicious activity is detected by the SentinelOne

AD_4nXcZUh5zGto8jvjpZ8RMxs5pZNCzevouAcRfennhseMU8jXFdaY19U8dvrTcAyvRJCd0r-6F8x8uRwQW66CwJW3lcITKV4Qtk_YnvT2CfRFonIR-WA7vepierPIUH2XSDaPqCLeUTEU4f5Pf2IG1_Sf43hg?key=q7dbh649IcZ9gJ1To56X8A



 

Execution

 

Let’s verify and see both the SentinelOne and Netskope Agent are working

AD_4nXc_hXMVa_TH6mpxHKvWF4WM7fYppGgmCdKqWaEdSBGzPG6iYGkx8CTmFdmsxcw4ZBIc5Rk5-53q8XRy2Vnp_kLV8JHlrMX8KXF_ZvD08EwiAGkO8oq06JNatJifNj6_T_hFd9ETO1h5tvmte-H0tGVfzz8n?key=q7dbh649IcZ9gJ1To56X8A

 

AD_4nXcZ2tIGq0_kf2b7IfqVvxbT4d70gzGa3L-paNLhp5PB9R-CLzorbhcleQwOXbcnL1EGtPZ194CyhQ15FUak3PlY2ZfllKfu2egkppOVSmrMBQZ9-uU9fMYpyResxo40M_HZZPc-30u-xgnz6rxFxr0E1zRH?key=q7dbh649IcZ9gJ1To56X8A

 

And we also verify the Device Classification is currently into the unmanaged state also.

Let’s try to perform any malicious activity on the endpoint.

 

AD_4nXeNVMNBcn_Oy0ZCpBhqla86jfXAdI77qWCd3y3Dn3xTpZd3Q1uC4MgmbqajEgNNmVlNedFtpbnzqmZO1wMEtVwXVIp7Rqwe6Z8lcLUFLbap71ySzAyuPAttKOtqioAdGN9gpu6qsYXUu2Q1R4O3nkaOgBc?key=q7dbh649IcZ9gJ1To56X8A

 

SentinelOne was able to detect the Threat

AD_4nXdmjfo_Fjj2mPwiHQgEtGioiyD4NuhdXIHPRjno3s-BeeZuC4mRvgmORQBvhApEy3RhFwvPlTsp_zhwaHpnbfvCp1fnZHwEqOOY6306rNbmKq5UAWa2pzH7C_d-znozxbFhpjm9_AnNfb9DWNYfs53Lo2OA?key=q7dbh649IcZ9gJ1To56X8A

 

As soon as a threat is detected the script will start executing on the device.The script will create a empty text file which help Netskope to change the device classification on the basis of the file.

 

AD_4nXeOEm3H3lcotPAvSjs4ix5kDV_28eB6HNPc6aA67KvHoBmsfI4YgioUnWm0F5uJiA_i1MTuU-WTbb-pLwSMH7upOt3U_LhFd7IP4q7_gJzhRCu77mzS4kfLxZWJWqtdPX_gxB5yKjZ1MX822xIxEhjTH4E?key=q7dbh649IcZ9gJ1To56X8A


 

And if we check for the same result in the particular drive, we’re able to find that particular file

 

AD_4nXfhzTXQ6yhdmdViveVNXNpSkS0taMw7ARwVIDYKuZySCRihuM_N1PJGvbhAi36GYlRJRq0axBbrxsnxYhUEnDL9slwLSh8d0lZs3U-G5Ayi8p5tL58HWgqeS8C8VKW-0exneIBZ0nvgaepiBspWkhOVv-ev?key=q7dbh649IcZ9gJ1To56X8A

 

Now if we again check for the device classification, we can find the device classification has been changed to Risky Device

 

AD_4nXdDqLP-vh8TBU1FIwgc5IRXVZGGdBL5KuVhnelN53jaVAu9w9d_DE-qRemruM14SN_iLN9z7fpnn-KFEBf6WL4fZgQG73P50CF9Q8E1hM9AHaEuRnfRRFi0aFqvbfvuiOrG7MzTxuwMmw4uH_AwxX3M3lM?key=q7dbh649IcZ9gJ1To56X8A

 

If we now try to access any website from that particular device. Automatically it will be blocked by Netskope client because of the policy we enforced in the earlier steps

 

AD_4nXfzxH4YGaYRidHPqnsp127jv24qqGV7hdfaGHdpR3AD1mhqPNzKuk1EMg-HjSsCIG_Ym0GMQdS9gPye0JZB2cUFnUSfnalnL0X9cuaMQdeyaOsX6BXQ5PzLqVZYSpM6UDY5UXXTFTtwuI0NC1tDBXVW1-yz?key=q7dbh649IcZ9gJ1To56X8A

 

Be the first to reply!

Reply