SentinelOne Netskope Direct Integration


Userlevel 3
Badge +15

SentinelOne Netskope Direct Integration 

There are a few ways to integrate SentinelOne and Netskope. Netskope can send them logs with Cloud Log Shipper, Cloud Threat Exchange can pull URLs and IoC hashes from SentinelOne into Netskope, and with this direct integration. You can use the Netskope application in the Singularity Marketplace for enrichment. I will be going over this last one in this document. 

 

Taken from https://community.sentinelone.com/
Configure the Netskope App to enrich threats to centralize data into one threat and accelerate investigations. Correlate your Netskope alert data and user risk scores into the SentinelOne threat enrichment view. This lets you easily ingest events from Netskope into Singularityâ„¢ Data Lake.

You can also trigger XDR Manual Response Actions in Netskope to minimize the potential expansion of an attack or compromise. These actions are available in the SentinelOne threats in the Management Console for a one-click response.

Prerequisites

  • A Netskope Tenant with a client agent running
  • The ability to generate an REST APIv2 token
  • SentinelOne agent deployed
  • A Singularity Data Lake Log Access Write key

Workflow

  • Create REST APIv2 token on Netskope
  • Add new URL List to Netskope
  • Create Data Lake token on Singularity Data Lake
  • Configure Netskope integration in Singularity Marketplace
  • Verify

 

Netskope

Create REST APIv2 token on Netskope

On your Netskope tenant go to 

Settings > Tools > REST API v2 > New Token

Add the following endpoints and copy the token when you save it. 

Read

  • /api/v2/events/data/alert
  • /api/v2/policy/urllist

Read/Write

  • /api/v2/ubadatasvc/user/uci
  • /api/v2/policy/urllist/deploy

 

It should look like this. 

AD_4nXfCjA5Q_SjvUINSb-7ew-LEPrz_08BpKs2cH-yJqeAQ7MLTjOI9AiZlpe5k38NN4cVBXAmTothNpMCUCAH7Tziur0w64mq-QUuCysKWZp42mUS7bIsdSZvwMRWlO4BGna3MVJi8wDS6jm2SiGf2XnKec8PY?key=j6LGvuu7LDrZAKkeutCEkw 

 

Add new URL List to Netskope

On your Netskope tenant go to 

Policies > Web > URL List > New URL List

Give it a name and you will need to add an IP or a URL in the text box. It won’t let you save it if it is blank. 

Save

AD_4nXdS334ADF3Qo_2ao2dn7tpgb6piqUGGSTEIYoK7Zwsb1pn9TdsELCyNENoRM3u2jGdIkYrag1PpYgU0_uTlFWAo1-HUsS_LrEcPmnP2CS4m1A8O0Po7SgpcN7Hsa_yDvBB6CJllLB3znfu5INPdpRrDHZkz?key=j6LGvuu7LDrZAKkeutCEkw

 

Create Data Lake token on Singularity Data Lake

In the SentinelOne interface go to 

> Visibility (Enhanced)

AD_4nXegJDPEDUrmpRFrL4UZqTMQAiWEgA5hHiYYo650VcvYyAk3d0b48ZGywbQCFfQYBdlUVPX9HcJV2_mdFaEEHnGN1Ho8vehZBOdXImUOtEqgTVwKAed24U8RJ7Alg7yrirTPDH2-FzwQFIotLIDzj7WRWdAH?key=j6LGvuu7LDrZAKkeutCEkw

 

Select your name > API Keys

Copy the base URL and the Key Value.

AD_4nXfhS9NPT4GrYiBzHwUCcIUsOA6qyAjRV4xccWAN_pbtyEH8KmmvR57U1bKc1d-BaM3aeAJK2qAMwOClmIHEKuiE8EKuywHtY0V_27KlBsq7kul965UhgJI_-cQZl63mf604ojmRdMEJUf7mHevRJOEu2oM4?key=j6LGvuu7LDrZAKkeutCEkw

AD_4nXfwFGhPptVD-1J1I0oI-1jVdr4eYS0bY94Y8tPheIGjWnXD7PcygfAwou-ub8hq3C1LOrDeqvn4DEv8RvUs_2YXcdkY6qugvQ2nnven0r7_g4x8qfwtCkkm0fHK4EISN-7jYNfmRONU6m2G82LxuzzoKXtL?key=j6LGvuu7LDrZAKkeutCEkw

 

Configure Netskope integration in Singularity Marketplace

In the SentinelOne interface select the Marketplace

AD_4nXe0WzfMiAM1GYJQSJnA6Td0SXzJm_N4Z5xxIwyhk2aqkHFu38BN30fH4k_dVVtg4s0Hz0ClwC8xPMI3_U_8Oy5Aznjyp72S5HhCwX-ecVJdoV-CK4_NBq3dHdqhN4qyAniqMQIt5v3yMNMqJWM_r4GhuCIs?key=j6LGvuu7LDrZAKkeutCEkw

 

Search for Netskope

AD_4nXdkrFSvNgmfUG6WuKZRXNBrbHrxYSlP1_KJeNX1Tzm6PLavpAhqvrYtyywrkX5OYyuVye059uRcVxAJX16DfruJmvCpucKk2nSFWGg_C5LEAZ2Nv2ZoGfPouA-Yxo-Pj6Xq91NXS9aGPidl3PinJKpgA073?key=j6LGvuu7LDrZAKkeutCEkw

 

Select the Netskope Application. 

AD_4nXfAD3wtXNJeeFlzIujF0iOF0UQh1MAiEaGaAYRjakuYrVC2X8oOzuDdddCevenf52_TxmelU0C2jULAcUKjaOaGsk_Tl8p1NgrDM8jzVJqcT57w7yog2V4cUcqymcWBLiZ9aRjsDIpIWn8rcDvUQORXRmto?key=j6LGvuu7LDrZAKkeutCEkw

 

Simulation Mode - Leave this unchecked. It is for internal testing only. 

Connection - 

API URL - Add your Netskope Tenant URL. See below for example

API Token - This is the Netskope REST APIv2 that you got from your Netskope tenant. 

AD_4nXcTYTQ0M3ShtHk91MoUHfxzTdckbHcUTnoDewfg7D2eqlhVsIg5yGRv0J3h8o7ogx8xfdsKmT6zUVoQ1yskxLFTNweK0XaF3xLKNDRUpMe0S-OA9P0ZzV-FEkEZsEYW5Pn-dIXQA07W2rSPpDCQwqcCdRF7?key=j6LGvuu7LDrZAKkeutCEkw

Enrichment

In the text box you will add the domains of your clients. Netskope gets username information from the Netskope client and SentinelOne’s agent will receive client username information based on the user logging into their domain. 

Using the enrichments will add Netskope Alerts with the top option and Netskope’s user risk score with the bottom. 

AD_4nXdmr__g4VKop2hbu2JmM3aBYK2feeD2SHCwojlZecKsecopf2D9l67zSeUgAlRYwppgILT8TkbRyrNOxuTkDd3ZqSkKztFQbNNAwYMPI8qJczVWL9Pot41_4GA-SVa3vrxYgx8KeAJ0P40I4nudlbuOx-Gl?key=j6LGvuu7LDrZAKkeutCEkw

Response Actions

With response actions you can push found URL threats into Netskope so that you can block them with a Real Time Policy. The advantage of doing this is once a threat is found on any endpoint it is immediately blocked on all users using Netskope inline. 

Automation Trigger Options

  • No automated threat response
  • All threats
  • Malicious threats
  • Threats created by users using ‘Mark as Threat’
  • Threats marks as ‘True Positive’

Enter Custom URL Name

  • This is the name that you named the Netskope URL List

AD_4nXfC4mPgqnzU2mgT7w01KsdtyOWJcWb5cA_g7XrG1UcK3jF633YtfgVnnH_wd93cQ1z5uERRQsXv2IZahVVTxwJHu7ArSpg7AOnnRVmFADQsCLbb6z1WmLsMh14yqfolJUffdYJdpEvvG7Lr_1zM9uMucDM?key=j6LGvuu7LDrZAKkeutCEkw

Ingestion

Netskope alerts can be pulled into the Singularity Data Lake by selecting which ones you would like to be brought in. 

Adding the Data Lake URL and Token will bring in the ingestion. The API was gathered in one of the first steps.

AD_4nXdVwp8MxcBaSJiuaBt30tMZuu7liMSwjZUu66EPMOAgs_qa4iBn4UPHrNQ07QGs_PJeZovVBwvUrdSBKJA-0lnG5fe4R_FltmV8nt-rAL4pME-xXEdb3k8A8ZF6di25-5MRlQs9qiKYmOWDjwMci9VkvE4?key=j6LGvuu7LDrZAKkeutCEkw

 

Verify

 

Go into the Singularity Data Lake > All Data and use this as a filter dataSource.name = 'Netskope' 

Getting to the Data Lake

AD_4nXegJDPEDUrmpRFrL4UZqTMQAiWEgA5hHiYYo650VcvYyAk3d0b48ZGywbQCFfQYBdlUVPX9HcJV2_mdFaEEHnGN1Ho8vehZBOdXImUOtEqgTVwKAed24U8RJ7Alg7yrirTPDH2-FzwQFIotLIDzj7WRWdAH?key=j6LGvuu7LDrZAKkeutCEkw

 

As you can see I have DLP Alerts. To get these, I ran a test downloading fake credit card numbers which I have a policy to alert on. 

AD_4nXfI8gQEOrIuPpzLJeZxY6A-cTfNKY3wPLCJTYThb3zPvnRvmLzfp7ek4Jd8YHOzeORbmdBmdjKPf1iNXEyou_nSLqgSsglkzG2tbD1A8NpqGWw23WQf44N63Pjad4D6_uEFsHWPuRd1JLIgay6ryq6vSqyI?key=j6LGvuu7LDrZAKkeutCEkw

 

If you click on any of them you can drill down into all of the details. 

AD_4nXeooia4vYHV9tN-hVVmXdzEVLNsDLdKRbKobZYkNdZXU1XkET_Gs51E9XZkOm2oFde3WIPzIy8gbjuqjh334dSiRfv_rEQwKs6z59FUqEaeKLi-Ua8GQZH8WAvY38FiSU6TEtfan9fBbKTlp_ANHfIyLbH_?key=j6LGvuu7LDrZAKkeutCEkw

 


0 replies

Be the first to reply!

Reply